Search Results for Electronic books. - Narrowed by: Sécurité informatique.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qu$003dElectronic$002bbooks.$0026qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026ps$003d300?2024-06-21T14:12:48ZThe basics of cyber safety : computer and mobile device safety made easyent://SD_ILS/0/SD_ILS:23114322024-06-21T14:12:48Z2024-06-21T14:12:48Zby Sammons, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780124166394/?ar">https://learning.oreilly.com/library/view/~/9780124166394/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124166394/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166394/?ar</a><br/>Format: Electronic Resources<br/>Solaris 8 Securityent://SD_ILS/0/SD_ILS:23196652024-06-21T14:12:48Z2024-06-21T14:12:48Zby Danielyan, Edgar, author.<br/><a href="https://learning.oreilly.com/library/view/~/1578702704">https://learning.oreilly.com/library/view/~/1578702704</a>
<a href="https://learning.oreilly.com/library/view/~/1578702704/?ar">https://learning.oreilly.com/library/view/~/1578702704/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1578702704/?ar">https://go.oreilly.com/library-access/library/view/-/1578702704/?ar</a><br/>Format: Electronic Resources<br/>Art of attack : attacker mindset for security professionals.ent://SD_ILS/0/SD_ILS:23294332024-06-21T14:12:48Z2024-06-21T14:12:48Zby Reynolds, Maxie, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119805465/?ar">https://learning.oreilly.com/library/view/~/9781119805465/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119805465">https://learning.oreilly.com/library/view/~/9781119805465</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119805465/?ar">https://go.oreilly.com/library-access/library/view/-/9781119805465/?ar</a><br/>Format: Electronic Resources<br/>Security on IBM z/VSEent://SD_ILS/0/SD_ILS:23169402024-06-21T14:12:48Z2024-06-21T14:12:48Zby Hellner, Helmut, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738456911/?ar">https://learning.oreilly.com/library/view/~/9780738456911/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738456911/?ar">https://go.oreilly.com/library-access/library/view/-/9780738456911/?ar</a><br/>Format: Electronic Resources<br/>Virtual honeypots : from botnet tracking to intrusion detectionent://SD_ILS/0/SD_ILS:22838022024-06-21T14:12:48Z2024-06-21T14:12:48Zby Provos, Niels.<br/><a href="https://learning.oreilly.com/library/view/~/9780321336323/?ar">https://learning.oreilly.com/library/view/~/9780321336323/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321336323/?ar">https://go.oreilly.com/library-access/library/view/-/9780321336323/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321336323">https://learning.oreilly.com/library/view/~/9780321336323</a><br/>Format: Electronic Resources<br/>The cybersecurity playbook for modern enterprisesent://SD_ILS/0/SD_ILS:23323232024-06-21T14:12:48Z2024-06-21T14:12:48Zby Wittkop, Jeremy, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803248639/?ar">https://go.oreilly.com/library-access/library/view/-/9781803248639/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803248639/?ar">https://learning.oreilly.com/library/view/~/9781803248639/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803248639">https://learning.oreilly.com/library/view/~/9781803248639</a><br/>Format: Electronic Resources<br/>Linux Firewalls, Third Editionent://SD_ILS/0/SD_ILS:23196682024-06-21T14:12:48Z2024-06-21T14:12:48Zby Suehring, Steve, author.<br/><a href="https://learning.oreilly.com/library/view/~/0672327716/?ar">https://learning.oreilly.com/library/view/~/0672327716/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672327716">https://learning.oreilly.com/library/view/~/0672327716</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0672327716/?ar">https://go.oreilly.com/library-access/library/view/-/0672327716/?ar</a><br/>Format: Electronic Resources<br/>Choose your InfoSec path : an interactive cybersecurity adventure for beginnersent://SD_ILS/0/SD_ILS:23289902024-06-21T14:12:48Z2024-06-21T14:12:48Zby Roxon, Alexander J.<br/><a href="https://learning.oreilly.com/library/view/~/9781484270363">https://learning.oreilly.com/library/view/~/9781484270363</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484270363/?ar">https://go.oreilly.com/library-access/library/view/-/9781484270363/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484270363/?ar">https://learning.oreilly.com/library/view/~/9781484270363/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity and Third-Party Risk : Third Party Threat Huntingent://SD_ILS/0/SD_ILS:23290002024-06-21T14:12:48Z2024-06-21T14:12:48Zby Rasner, Gregory C.<br/><a href="https://learning.oreilly.com/library/view/~/9781119809555">https://learning.oreilly.com/library/view/~/9781119809555</a>
<a href="https://learning.oreilly.com/library/view/~/9781119809555/?ar">https://learning.oreilly.com/library/view/~/9781119809555/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119809555/?ar">https://go.oreilly.com/library-access/library/view/-/9781119809555/?ar</a><br/>Format: Electronic Resources<br/>Informationssicherheit und Datenschutz : Handbuch für Praktiker und Begleitbuch zum T.I.S.P.ent://SD_ILS/0/SD_ILS:23221892024-06-21T14:12:48Z2024-06-21T14:12:48Zby Domnick, André, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098123659/?ar">https://go.oreilly.com/library-access/library/view/-/9781098123659/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098123659/?ar">https://learning.oreilly.com/library/view/~/9781098123659/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098123659">https://learning.oreilly.com/library/view/~/9781098123659</a><br/>Format: Electronic Resources<br/>Introduction to Computer Security.ent://SD_ILS/0/SD_ILS:23179802024-06-21T14:12:48Z2024-06-21T14:12:48Zby Bishop, Matt (Matthew A.), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321247442/?ar">https://go.oreilly.com/library-access/library/view/-/0321247442/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321247442/?ar">https://learning.oreilly.com/library/view/~/0321247442/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321247442">https://learning.oreilly.com/library/view/~/0321247442</a><br/>Format: Electronic Resources<br/>Computer Security : Art and Science.ent://SD_ILS/0/SD_ILS:23180122024-06-21T14:12:48Z2024-06-21T14:12:48Zby Bishop, Matthew A. (Matthew A.) author.<br/><a href="https://learning.oreilly.com/library/view/~/0201440997">https://learning.oreilly.com/library/view/~/0201440997</a>
<a href="https://learning.oreilly.com/library/view/~/0201440997/?ar">https://learning.oreilly.com/library/view/~/0201440997/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0201440997/?ar">https://go.oreilly.com/library-access/library/view/-/0201440997/?ar</a><br/>Format: Electronic Resources<br/>System assurance : beyond detecting vulnerabilitiesent://SD_ILS/0/SD_ILS:22903692024-06-21T14:12:48Z2024-06-21T14:12:48Zby Mansourov, Nikolai.<br/><a href="https://learning.oreilly.com/library/view/~/9780123814142">https://learning.oreilly.com/library/view/~/9780123814142</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780123814142/?ar">https://go.oreilly.com/library-access/library/view/-/9780123814142/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780123814142/?ar">https://learning.oreilly.com/library/view/~/9780123814142/?ar</a><br/>Format: Electronic Resources<br/>Hackers Bewareent://SD_ILS/0/SD_ILS:23197572024-06-21T14:12:48Z2024-06-21T14:12:48Zby Cole, Eric, author.<br/><a href="https://learning.oreilly.com/library/view/~/0735710090">https://learning.oreilly.com/library/view/~/0735710090</a>
<a href="https://learning.oreilly.com/library/view/~/0735710090/?ar">https://learning.oreilly.com/library/view/~/0735710090/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0735710090/?ar">https://go.oreilly.com/library-access/library/view/-/0735710090/?ar</a><br/>Format: Electronic Resources<br/>Advanced persistent threat hacking : the art and science of hacking any organizationent://SD_ILS/0/SD_ILS:23065152024-06-21T14:12:48Z2024-06-21T14:12:48Zby Wrightson, Tyler, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071828369">https://learning.oreilly.com/library/view/~/9780071828369</a>
<a href="https://learning.oreilly.com/library/view/~/9780071828369/?ar">https://learning.oreilly.com/library/view/~/9780071828369/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071828369/?ar">https://go.oreilly.com/library-access/library/view/-/9780071828369/?ar</a><br/>Format: Electronic Resources<br/>Phishing and communication channels a guide to identifying and mitigating phishing attacksent://SD_ILS/0/SD_ILS:23310582024-06-21T14:12:48Z2024-06-21T14:12:48Zby Sonowal, Gunikhan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484277447/?ar">https://go.oreilly.com/library-access/library/view/-/9781484277447/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484277447/?ar">https://learning.oreilly.com/library/view/~/9781484277447/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484277447">https://learning.oreilly.com/library/view/~/9781484277447</a><br/>Format: Electronic Resources<br/>Privacy What Developers and IT Professionals Should Knowent://SD_ILS/0/SD_ILS:23197422024-06-21T14:12:48Z2024-06-21T14:12:48Zby Cannon, J., author.<br/><a href="https://learning.oreilly.com/library/view/~/0321224094">https://learning.oreilly.com/library/view/~/0321224094</a>
<a href="https://learning.oreilly.com/library/view/~/0321224094/?ar">https://learning.oreilly.com/library/view/~/0321224094/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0321224094/?ar">https://go.oreilly.com/library-access/library/view/-/0321224094/?ar</a><br/>Format: Electronic Resources<br/>COMPTIA CYSA+ CYBERSECURITY ANALYST CERTIFICATION EXAM GUIDE (EXAM CS0-002)ent://SD_ILS/0/SD_ILS:23265162024-06-21T14:12:48Z2024-06-21T14:12:48Zby Chapman, Brent.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781260464313/?ar">https://go.oreilly.com/library-access/library/view/-/9781260464313/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781260464313">https://learning.oreilly.com/library/view/~/9781260464313</a>
<a href="https://learning.oreilly.com/library/view/~/9781260464313/?ar">https://learning.oreilly.com/library/view/~/9781260464313/?ar</a><br/>Format: Electronic Resources<br/>Who are the bad guys and what do they want?ent://SD_ILS/0/SD_ILS:23186382024-06-21T14:12:48Z2024-06-21T14:12:48Zby Fell, Gregory J., 1964- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042464">https://learning.oreilly.com/library/view/~/9781492042464</a>
<a href="https://learning.oreilly.com/library/view/~/9781492042464/?ar">https://learning.oreilly.com/library/view/~/9781492042464/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492042464/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042464/?ar</a><br/>Format: Electronic Resources<br/>Windows vista security : praxisorientierte Sicherheit für Profisent://SD_ILS/0/SD_ILS:22863082024-06-21T14:12:48Z2024-06-21T14:12:48Zby Nasarek, Marcus.<br/><a href="https://learning.oreilly.com/library/view/~/9783897214668">https://learning.oreilly.com/library/view/~/9783897214668</a>
<a href="https://learning.oreilly.com/library/view/~/9783897214668/?ar">https://learning.oreilly.com/library/view/~/9783897214668/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783897214668/?ar">https://go.oreilly.com/library-access/library/view/-/9783897214668/?ar</a><br/>Format: Electronic Resources<br/>Reduce risk and improve security on IBM mainframes. Volume 3, Mainframe subsystem and application securityent://SD_ILS/0/SD_ILS:23089712024-06-21T14:12:48Z2024-06-21T14:12:48Zby Bücker, Axel, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738441023/?ar">https://go.oreilly.com/library-access/library/view/-/9780738441023/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738441023/?ar">https://learning.oreilly.com/library/view/~/9780738441023/?ar</a><br/>Format: Electronic Resources<br/>Reduce risk and improve security on IBM mainframes. Volume 2, Mainframe communication and networking securityent://SD_ILS/0/SD_ILS:23086222024-06-21T14:12:48Z2024-06-21T14:12:48Zby Bücker, Axel, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738440941/?ar">https://learning.oreilly.com/library/view/~/9780738440941/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738440941/?ar">https://go.oreilly.com/library-access/library/view/-/9780738440941/?ar</a><br/>Format: Electronic Resources<br/>Mastering Windows security and hardening : secure and protect your Windows environment from intruders, malware attacks, and other cyber threats.ent://SD_ILS/0/SD_ILS:23259662024-06-21T14:12:48Z2024-06-21T14:12:48Zby Dunkerley, Mark, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781839216411">https://learning.oreilly.com/library/view/~/9781839216411</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781839216411/?ar">https://go.oreilly.com/library-access/library/view/-/9781839216411/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781839216411/?ar">https://learning.oreilly.com/library/view/~/9781839216411/?ar</a><br/>Format: Electronic Resources<br/>. Net Security and Cryptography.ent://SD_ILS/0/SD_ILS:23178962024-06-21T14:12:48Z2024-06-21T14:12:48Zby Thorsteinson, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/013100851X">https://learning.oreilly.com/library/view/~/013100851X</a>
<a href="https://learning.oreilly.com/library/view/~/013100851X/?ar">https://learning.oreilly.com/library/view/~/013100851X/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/013100851X/?ar">https://go.oreilly.com/library-access/library/view/-/013100851X/?ar</a><br/>Format: Electronic Resources<br/>IBM WebSphere V5.0 securityent://SD_ILS/0/SD_ILS:23001102024-06-21T14:12:48Z2024-06-21T14:12:48Zby Kovari, Peter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738425494/?ar">https://go.oreilly.com/library-access/library/view/-/0738425494/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738425494/?ar">https://learning.oreilly.com/library/view/~/0738425494/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738425494">https://learning.oreilly.com/library/view/~/0738425494</a><br/>Format: Electronic Resources<br/>Solaris security essentials.ent://SD_ILS/0/SD_ILS:22862572024-06-21T14:12:48Z2024-06-21T14:12:48Z<a href="https://learning.oreilly.com/library/view/~/9780131365414/?ar">https://learning.oreilly.com/library/view/~/9780131365414/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780131365414/?ar">https://go.oreilly.com/library-access/library/view/-/9780131365414/?ar</a><br/>Format: Electronic Resources<br/>CYBER SECURITY AND DIGITAL FORENSICSent://SD_ILS/0/SD_ILS:23314412024-06-21T14:12:48Z2024-06-21T14:12:48Z<a href="https://learning.oreilly.com/library/view/~/9781119795636">https://learning.oreilly.com/library/view/~/9781119795636</a>
<a href="https://learning.oreilly.com/library/view/~/9781119795636/?ar">https://learning.oreilly.com/library/view/~/9781119795636/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119795636/?ar">https://go.oreilly.com/library-access/library/view/-/9781119795636/?ar</a><br/>Format: Electronic Resources<br/>CompTIA Security+ SY0-601 Certification Guide - Second Editionent://SD_ILS/0/SD_ILS:23279712024-06-21T14:12:48Z2024-06-21T14:12:48Zby Neil, Ian.<br/><a href="https://learning.oreilly.com/library/view/~/9781800564244">https://learning.oreilly.com/library/view/~/9781800564244</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800564244/?ar">https://go.oreilly.com/library-access/library/view/-/9781800564244/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800564244/?ar">https://learning.oreilly.com/library/view/~/9781800564244/?ar</a><br/>Format: Electronic Resources<br/>Data-Driven Security : Analysis, Visualization and Dashboards.ent://SD_ILS/0/SD_ILS:23015562024-06-21T14:12:48Z2024-06-21T14:12:48Zby Jacobs, Jay (Data analyst)<br/><a href="https://learning.oreilly.com/library/view/~/9781118793824">https://learning.oreilly.com/library/view/~/9781118793824</a>
<a href="https://learning.oreilly.com/library/view/~/9781118793824/?ar">https://learning.oreilly.com/library/view/~/9781118793824/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118793824/?ar">https://go.oreilly.com/library-access/library/view/-/9781118793824/?ar</a><br/>Format: Electronic Resources<br/>Effective Oracle Database 10g security by designent://SD_ILS/0/SD_ILS:22850822024-06-21T14:12:48Z2024-06-21T14:12:48Zby Knox, David (David C.)<br/><a href="https://learning.oreilly.com/library/view/~/9780072231304/?ar">https://learning.oreilly.com/library/view/~/9780072231304/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780072231304/?ar">https://go.oreilly.com/library-access/library/view/-/9780072231304/?ar</a><br/>Format: Electronic Resources<br/>Serverless security : protect functions using the CLAD security modelent://SD_ILS/0/SD_ILS:23230662024-06-21T14:12:48Z2024-06-21T14:12:48Zby Podjarny, Guy, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492082538/?ar">https://go.oreilly.com/library-access/library/view/-/9781492082538/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492082538/?ar">https://learning.oreilly.com/library/view/~/9781492082538/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492082538">https://learning.oreilly.com/library/view/~/9781492082538</a><br/>Format: Electronic Resources<br/>Penetration Testing mit mimikatz : Das Praxis-Handbuch : Hacking-Angriffe verstehen und Pentests durchführenent://SD_ILS/0/SD_ILS:23213482024-06-21T14:12:48Z2024-06-21T14:12:48Zby Brabetz, Sebastian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9783958459700">https://learning.oreilly.com/library/view/~/9783958459700</a>
<a href="https://learning.oreilly.com/library/view/~/9783958459700/?ar">https://learning.oreilly.com/library/view/~/9783958459700/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783958459700/?ar">https://go.oreilly.com/library-access/library/view/-/9783958459700/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity blue team toolkitent://SD_ILS/0/SD_ILS:23192202024-06-21T14:12:48Z2024-06-21T14:12:48Zby Tanner, Nadean H., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119552932/?ar">https://go.oreilly.com/library-access/library/view/-/9781119552932/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119552932/?ar">https://learning.oreilly.com/library/view/~/9781119552932/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119552932">https://learning.oreilly.com/library/view/~/9781119552932</a><br/>Format: Electronic Resources<br/>Machine learning and security : protecting systems with data and algorithmsent://SD_ILS/0/SD_ILS:23158812024-06-21T14:12:48Z2024-06-21T14:12:48Zby Chio, Clarence.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491979891/?ar">https://go.oreilly.com/library-access/library/view/-/9781491979891/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491979891/?ar">https://learning.oreilly.com/library/view/~/9781491979891/?ar</a><br/>Format: Electronic Resources<br/>Check Point NG : next generation security administrationent://SD_ILS/0/SD_ILS:23060662024-06-21T14:12:48Z2024-06-21T14:12:48Zby Simonis, Drew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781928994749/?ar">https://learning.oreilly.com/library/view/~/9781928994749/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781928994749/?ar">https://go.oreilly.com/library-access/library/view/-/9781928994749/?ar</a><br/>Format: Electronic Resources<br/>Machine Learning et sécuritéent://SD_ILS/0/SD_ILS:23260752024-06-21T14:12:48Z2024-06-21T14:12:48Zby Chio, Clarence.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9782412043561/?ar">https://go.oreilly.com/library-access/library/view/-/9782412043561/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9782412043561">https://learning.oreilly.com/library/view/~/9782412043561</a>
<a href="https://learning.oreilly.com/library/view/~/9782412043561/?ar">https://learning.oreilly.com/library/view/~/9782412043561/?ar</a><br/>Format: Electronic Resources<br/>DataPower SOA appliance service planning, implementation, and best practicesent://SD_ILS/0/SD_ILS:22923442024-06-21T14:12:48Z2024-06-21T14:12:48Zby Shute, David.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738435732/?ar">https://go.oreilly.com/library-access/library/view/-/0738435732/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738435732/?ar">https://learning.oreilly.com/library/view/~/0738435732/?ar</a><br/>Format: Electronic Resources<br/>ISO27001 in a Windows Environment : the best practice handbook for a Microsoft Windows environmentent://SD_ILS/0/SD_ILS:22900262024-06-21T14:12:48Z2024-06-21T14:12:48Zby Honan, Brian.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280495/?ar">https://learning.oreilly.com/library/view/~/9781849280495/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849280495/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280495/?ar</a><br/>Format: Electronic Resources<br/>Malware Analysis Techniques : Tricks for the Triage of Adversarial Software.ent://SD_ILS/0/SD_ILS:23291542024-06-21T14:12:48Z2024-06-21T14:12:48Zby Barker, Dylan.<br/><a href="https://learning.oreilly.com/library/view/~/9781839212277">https://learning.oreilly.com/library/view/~/9781839212277</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781839212277/?ar">https://go.oreilly.com/library-access/library/view/-/9781839212277/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781839212277/?ar">https://learning.oreilly.com/library/view/~/9781839212277/?ar</a><br/>Format: Electronic Resources<br/>Serious cryptography : a practical introduction to modern encryptionent://SD_ILS/0/SD_ILS:23162082024-06-21T14:12:48Z2024-06-21T14:12:48Zby Aumasson, Jean-Philippe, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492067511">https://learning.oreilly.com/library/view/~/9781492067511</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492067511/?ar">https://go.oreilly.com/library-access/library/view/-/9781492067511/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492067511/?ar">https://learning.oreilly.com/library/view/~/9781492067511/?ar</a><br/>Format: Electronic Resources<br/>Microsoft Windows 2000 security handbookent://SD_ILS/0/SD_ILS:22811702024-06-21T14:12:48Z2024-06-21T14:12:48Zby Schmidt, Jeff, MCSE.<br/><a href="https://learning.oreilly.com/library/view/~/0789719991">https://learning.oreilly.com/library/view/~/0789719991</a>
<a href="https://learning.oreilly.com/library/view/~/0789719991/?ar">https://learning.oreilly.com/library/view/~/0789719991/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0789719991/?ar">https://go.oreilly.com/library-access/library/view/-/0789719991/?ar</a><br/>Format: Electronic Resources<br/>SELINUX : NSA's open source security enhanced Linuxent://SD_ILS/0/SD_ILS:22889312024-06-21T14:12:48Z2024-06-21T14:12:48Zby McCarty, Bill, 1953-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596007167/?ar">https://go.oreilly.com/library-access/library/view/-/0596007167/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596007167">https://learning.oreilly.com/library/view/~/0596007167</a>
<a href="https://learning.oreilly.com/library/view/~/0596007167/?ar">https://learning.oreilly.com/library/view/~/0596007167/?ar</a><br/>Format: Electronic Resources<br/>Cyber mayday and the day after : a leader's guide to preparing, managing, and recovering from the inevitable business disruptionsent://SD_ILS/0/SD_ILS:23297992024-06-21T14:12:48Z2024-06-21T14:12:48Zby Lohrmann, Daniel J., 1963- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119835301/?ar">https://learning.oreilly.com/library/view/~/9781119835301/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119835301/?ar">https://go.oreilly.com/library-access/library/view/-/9781119835301/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119835301">https://learning.oreilly.com/library/view/~/9781119835301</a><br/>Format: Electronic Resources<br/>Getting started with FortiGate : simplify and protect your network using the FortiGate network security applicanceent://SD_ILS/0/SD_ILS:23009402024-06-21T14:12:48Z2024-06-21T14:12:48Zby Fabbri, Rosato.<br/><a href="https://learning.oreilly.com/library/view/~/9781782178200">https://learning.oreilly.com/library/view/~/9781782178200</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781782178200/?ar">https://go.oreilly.com/library-access/library/view/-/9781782178200/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781782178200/?ar">https://learning.oreilly.com/library/view/~/9781782178200/?ar</a><br/>Format: Electronic Resources<br/>IBM eserver zSeries 990 (z990) cryptography implementationent://SD_ILS/0/SD_ILS:22832922024-06-21T14:12:48Z2024-06-21T14:12:48Zby Rayns, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/0738490369">https://learning.oreilly.com/library/view/~/0738490369</a>
<a href="https://learning.oreilly.com/library/view/~/0738490369/?ar">https://learning.oreilly.com/library/view/~/0738490369/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738490369/?ar">https://go.oreilly.com/library-access/library/view/-/0738490369/?ar</a><br/>Format: Electronic Resources<br/>Inside Java 2 platform security : architecture, API design, and implementationent://SD_ILS/0/SD_ILS:22883222024-06-21T14:12:48Z2024-06-21T14:12:48Zby Gong, Li.<br/><a href="https://learning.oreilly.com/library/view/~/0201787911">https://learning.oreilly.com/library/view/~/0201787911</a>
<a href="https://learning.oreilly.com/library/view/~/0201787911/?ar">https://learning.oreilly.com/library/view/~/0201787911/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0201787911/?ar">https://go.oreilly.com/library-access/library/view/-/0201787911/?ar</a><br/>Format: Electronic Resources<br/>Platform embedded security technology revealed : safeguarding the future of computing with Intel Embedded Security and Management Engineent://SD_ILS/0/SD_ILS:23042752024-06-21T14:12:48Z2024-06-21T14:12:48Zby Ruan, Xiaoyu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430265726/?ar">https://learning.oreilly.com/library/view/~/9781430265726/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430265726/?ar">https://go.oreilly.com/library-access/library/view/-/9781430265726/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430265726">https://learning.oreilly.com/library/view/~/9781430265726</a><br/>Format: Electronic Resources<br/>System administration ethics : ten commandments for security and compliance in a modern cyber worldent://SD_ILS/0/SD_ILS:23228662024-06-21T14:12:48Z2024-06-21T14:12:48Zby Ljubuncic, Igor, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484249888/?ar">https://go.oreilly.com/library-access/library/view/-/9781484249888/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484249888/?ar">https://learning.oreilly.com/library/view/~/9781484249888/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity essentialsent://SD_ILS/0/SD_ILS:23224822024-06-21T14:12:48Z2024-06-21T14:12:48Zby Brooks, Charles J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119362395/?ar">https://learning.oreilly.com/library/view/~/9781119362395/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119362395/?ar">https://go.oreilly.com/library-access/library/view/-/9781119362395/?ar</a><br/>Format: Electronic Resources<br/>You--for sale : protecting your personal data and privacy onlineent://SD_ILS/0/SD_ILS:23084652024-06-21T14:12:48Z2024-06-21T14:12:48Zby Sumner, Stuart, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128034231/?ar">https://learning.oreilly.com/library/view/~/9780128034231/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128034231/?ar">https://go.oreilly.com/library-access/library/view/-/9780128034231/?ar</a><br/>Format: Electronic Resources<br/>Maximum Security, Fourth Editionent://SD_ILS/0/SD_ILS:23195942024-06-21T14:12:48Z2024-06-21T14:12:48Zby Anonymous, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0672324598/?ar">https://go.oreilly.com/library-access/library/view/-/0672324598/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672324598">https://learning.oreilly.com/library/view/~/0672324598</a>
<a href="https://learning.oreilly.com/library/view/~/0672324598/?ar">https://learning.oreilly.com/library/view/~/0672324598/?ar</a><br/>Format: Electronic Resources<br/>Cloud security handbook : find out how to effectively secure cloud environments using AWS, Azure, and GCPent://SD_ILS/0/SD_ILS:23324812024-06-21T14:12:48Z2024-06-21T14:12:48Zby Estrin, Eyal, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800569195">https://learning.oreilly.com/library/view/~/9781800569195</a>
<a href="https://learning.oreilly.com/library/view/~/9781800569195/?ar">https://learning.oreilly.com/library/view/~/9781800569195/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800569195/?ar">https://go.oreilly.com/library-access/library/view/-/9781800569195/?ar</a><br/>Format: Electronic Resources<br/>Start-up secure : baking cybersecurity into your company from founding to exitent://SD_ILS/0/SD_ILS:23275242024-06-21T14:12:48Z2024-06-21T14:12:48Zby Castaldo, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119700739">https://learning.oreilly.com/library/view/~/9781119700739</a>
<a href="https://learning.oreilly.com/library/view/~/9781119700739/?ar">https://learning.oreilly.com/library/view/~/9781119700739/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119700739/?ar">https://go.oreilly.com/library-access/library/view/-/9781119700739/?ar</a><br/>Format: Electronic Resources<br/>Identity attack vectors : implementing an effective identity and access management solutionent://SD_ILS/0/SD_ILS:23227372024-06-21T14:12:48Z2024-06-21T14:12:48Zby Haber, Morey J.<br/><a href="https://learning.oreilly.com/library/view/~/9781484251652/?ar">https://learning.oreilly.com/library/view/~/9781484251652/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484251652/?ar">https://go.oreilly.com/library-access/library/view/-/9781484251652/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484251652">https://learning.oreilly.com/library/view/~/9781484251652</a><br/>Format: Electronic Resources<br/>Ransomware : defending against digital extortionent://SD_ILS/0/SD_ILS:23119732024-06-21T14:12:48Z2024-06-21T14:12:48Zby Liska, Allan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491967874/?ar">https://learning.oreilly.com/library/view/~/9781491967874/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491967874">https://learning.oreilly.com/library/view/~/9781491967874</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491967874/?ar">https://go.oreilly.com/library-access/library/view/-/9781491967874/?ar</a><br/>Format: Electronic Resources<br/>Netzwerkangriffe von innenent://SD_ILS/0/SD_ILS:22864742024-06-21T14:12:48Z2024-06-21T14:12:48Zby Ziegler, Paul Sebastian.<br/><a href="https://learning.oreilly.com/library/view/~/9783897217782">https://learning.oreilly.com/library/view/~/9783897217782</a>
<a href="https://learning.oreilly.com/library/view/~/9783897217782/?ar">https://learning.oreilly.com/library/view/~/9783897217782/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783897217782/?ar">https://go.oreilly.com/library-access/library/view/-/9783897217782/?ar</a><br/>Format: Electronic Resources<br/>Enterprise software security : a confluence of disciplinesent://SD_ILS/0/SD_ILS:23052972024-06-21T14:12:48Z2024-06-21T14:12:48Zby Van Wyk, Kenneth R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780321604378/?ar">https://learning.oreilly.com/library/view/~/9780321604378/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321604378">https://learning.oreilly.com/library/view/~/9780321604378</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321604378/?ar">https://go.oreilly.com/library-access/library/view/-/9780321604378/?ar</a><br/>Format: Electronic Resources<br/>A guide to kernel exploitation : attacking the coreent://SD_ILS/0/SD_ILS:23123612024-06-21T14:12:48Z2024-06-21T14:12:48Zby Perla, Enrico, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494861/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494861/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494861/?ar">https://learning.oreilly.com/library/view/~/9781597494861/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux intrusion and exploitation cookbook : over 70 recipes for system administrators or DevOps to master Kali Linux 2 and perform effective security assessmentsent://SD_ILS/0/SD_ILS:23132872024-06-21T14:12:48Z2024-06-21T14:12:48Zby Shah, Dhruv, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781783982165/?ar">https://go.oreilly.com/library-access/library/view/-/9781783982165/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781783982165/?ar">https://learning.oreilly.com/library/view/~/9781783982165/?ar</a><br/>Format: Electronic Resources<br/>Crafting the InfoSec playbookent://SD_ILS/0/SD_ILS:23073922024-06-21T14:12:48Z2024-06-21T14:12:48Zby Bollinger, Jeff, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491913598/?ar">https://go.oreilly.com/library-access/library/view/-/9781491913598/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491913598">https://learning.oreilly.com/library/view/~/9781491913598</a>
<a href="https://learning.oreilly.com/library/view/~/9781491913598/?ar">https://learning.oreilly.com/library/view/~/9781491913598/?ar</a><br/>Format: Electronic Resources<br/>Enterprise-wide security solutions presentation guideent://SD_ILS/0/SD_ILS:23024822024-06-21T14:12:48Z2024-06-21T14:12:48Zby Kigma, Cees.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738402087/?ar">https://go.oreilly.com/library-access/library/view/-/0738402087/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738402087/?ar">https://learning.oreilly.com/library/view/~/0738402087/?ar</a><br/>Format: Electronic Resources<br/>The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurityent://SD_ILS/0/SD_ILS:23215742024-06-21T14:12:48Z2024-06-21T14:12:48Zby Quade, Phil.<br/><a href="https://learning.oreilly.com/library/view/~/9781119617365">https://learning.oreilly.com/library/view/~/9781119617365</a>
<a href="https://learning.oreilly.com/library/view/~/9781119617365/?ar">https://learning.oreilly.com/library/view/~/9781119617365/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119617365/?ar">https://go.oreilly.com/library-access/library/view/-/9781119617365/?ar</a><br/>Format: Electronic Resources<br/>Building Python Real-Time Applications with Storm.ent://SD_ILS/0/SD_ILS:23091942024-06-21T14:12:48Z2024-06-21T14:12:48Zby Kartik Bhatnagar; Barry Hart.<br/><a href="https://learning.oreilly.com/library/view/~/9781784392857/?ar">https://learning.oreilly.com/library/view/~/9781784392857/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781784392857/?ar">https://go.oreilly.com/library-access/library/view/-/9781784392857/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781784392857">https://learning.oreilly.com/library/view/~/9781784392857</a><br/>Format: Electronic Resources<br/>Tribe of hackers red team : tribal knowledge from the best in offensive cybersecurityent://SD_ILS/0/SD_ILS:23214482024-06-21T14:12:48Z2024-06-21T14:12:48Zby Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119643326">https://learning.oreilly.com/library/view/~/9781119643326</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119643326/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643326/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643326/?ar">https://learning.oreilly.com/library/view/~/9781119643326/?ar</a><br/>Format: Electronic Resources<br/>To improve cybersecurity, think like a hackerent://SD_ILS/0/SD_ILS:23131252024-06-21T14:12:48Z2024-06-21T14:12:48Zby Esteves, José, 1970- author.<br/><a href="https://learning.oreilly.com/library/view/~/53863MIT58314">https://learning.oreilly.com/library/view/~/53863MIT58314</a>
<a href="https://go.oreilly.com/library-access/library/view/-/53863MIT58314/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT58314/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT58314/?ar">https://learning.oreilly.com/library/view/~/53863MIT58314/?ar</a><br/>Format: Electronic Resources<br/>Web application security is a stack : how to CYA (cover your apps) completelyent://SD_ILS/0/SD_ILS:23088452024-06-21T14:12:48Z2024-06-21T14:12:48Zby MacVittie, Lori A., 1969- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287050/?ar">https://learning.oreilly.com/library/view/~/9781849287050/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849287050/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287050/?ar</a><br/>Format: Electronic Resources<br/>Assessing information security : strategies, tactics, logic and frameworkent://SD_ILS/0/SD_ILS:23088442024-06-21T14:12:48Z2024-06-21T14:12:48Zby Vladimirov, Andrew A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849286008/?ar">https://go.oreilly.com/library-access/library/view/-/9781849286008/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849286008/?ar">https://learning.oreilly.com/library/view/~/9781849286008/?ar</a><br/>Format: Electronic Resources<br/>Dear Hacker : letters to the editor of 2600ent://SD_ILS/0/SD_ILS:22894682024-06-21T14:12:48Z2024-06-21T14:12:48Zby Goldstein, Emmanuel, 1959-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470620069/?ar">https://go.oreilly.com/library-access/library/view/-/9780470620069/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470620069/?ar">https://learning.oreilly.com/library/view/~/9780470620069/?ar</a><br/>Format: Electronic Resources<br/>Endpoint securityent://SD_ILS/0/SD_ILS:22831172024-06-21T14:12:48Z2024-06-21T14:12:48Zby Kadrich, Mark.<br/><a href="https://learning.oreilly.com/library/view/~/9780321436955/?ar">https://learning.oreilly.com/library/view/~/9780321436955/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321436955/?ar">https://go.oreilly.com/library-access/library/view/-/9780321436955/?ar</a><br/>Format: Electronic Resources<br/>Mastering Windows network forensics and investigationent://SD_ILS/0/SD_ILS:22991762024-06-21T14:12:48Z2024-06-21T14:12:48Zby Anson, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9781118236086/?ar">https://learning.oreilly.com/library/view/~/9781118236086/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118236086/?ar">https://go.oreilly.com/library-access/library/view/-/9781118236086/?ar</a><br/>Format: Electronic Resources<br/>The information systems security officer's guide : establishing and managing a cyber security programent://SD_ILS/0/SD_ILS:23102902024-06-21T14:12:48Z2024-06-21T14:12:48Zby Kovacich, Gerald L., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128023792/?ar">https://learning.oreilly.com/library/view/~/9780128023792/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128023792/?ar">https://go.oreilly.com/library-access/library/view/-/9780128023792/?ar</a><br/>Format: Electronic Resources<br/>Network security bibleent://SD_ILS/0/SD_ILS:22884762024-06-21T14:12:48Z2024-06-21T14:12:48Zby Cole, Eric.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470502495/?ar">https://go.oreilly.com/library-access/library/view/-/9780470502495/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470502495/?ar">https://learning.oreilly.com/library/view/~/9780470502495/?ar</a><br/>Format: Electronic Resources<br/>Cisco security professional's guide to secure intrusion detection systemsent://SD_ILS/0/SD_ILS:23062212024-06-21T14:12:48Z2024-06-21T14:12:48Zby Burton, James D., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781932266696/?ar">https://go.oreilly.com/library-access/library/view/-/9781932266696/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781932266696/?ar">https://learning.oreilly.com/library/view/~/9781932266696/?ar</a><br/>Format: Electronic Resources<br/>Trust in computer systems and the cloudent://SD_ILS/0/SD_ILS:23308502024-06-21T14:12:48Z2024-06-21T14:12:48Zby Bursell, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119692324/?ar">https://learning.oreilly.com/library/view/~/9781119692324/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119692324/?ar">https://go.oreilly.com/library-access/library/view/-/9781119692324/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119692324">https://learning.oreilly.com/library/view/~/9781119692324</a><br/>Format: Electronic Resources<br/>IT security risk control management : an audit preparation planent://SD_ILS/0/SD_ILS:23125422024-06-21T14:12:48Z2024-06-21T14:12:48Zby Pompon, Raymond, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484221402/?ar">https://learning.oreilly.com/library/view/~/9781484221402/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484221402/?ar">https://go.oreilly.com/library-access/library/view/-/9781484221402/?ar</a><br/>Format: Electronic Resources<br/>Agile Security Operations : Engineering for Agility in Cyber Defense, Detection, and Response.ent://SD_ILS/0/SD_ILS:23314912024-06-21T14:12:48Z2024-06-21T14:12:48Zby Hettema, Hinne.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801815512/?ar">https://go.oreilly.com/library-access/library/view/-/9781801815512/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801815512/?ar">https://learning.oreilly.com/library/view/~/9781801815512/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801815512">https://learning.oreilly.com/library/view/~/9781801815512</a><br/>Format: Electronic Resources<br/>Rootkits and bootkits : reversing modern malware and next generation threatsent://SD_ILS/0/SD_ILS:23143572024-06-21T14:12:48Z2024-06-21T14:12:48Zby Matrosov, Alex, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492071259/?ar">https://learning.oreilly.com/library/view/~/9781492071259/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492071259/?ar">https://go.oreilly.com/library-access/library/view/-/9781492071259/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492071259">https://learning.oreilly.com/library/view/~/9781492071259</a><br/>Format: Electronic Resources<br/>Hands-on red team tactics : a practical guide to mastering red team operationsent://SD_ILS/0/SD_ILS:23177922024-06-21T14:12:48Z2024-06-21T14:12:48Zby Sharma, Himanshu, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788995238/?ar">https://go.oreilly.com/library-access/library/view/-/9781788995238/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788995238">https://learning.oreilly.com/library/view/~/9781788995238</a>
<a href="https://learning.oreilly.com/library/view/~/9781788995238/?ar">https://learning.oreilly.com/library/view/~/9781788995238/?ar</a><br/>Format: Electronic Resources<br/>Abusing the Internet of things : blackouts, freakouts, and stakeoutsent://SD_ILS/0/SD_ILS:23080522024-06-21T14:12:48Z2024-06-21T14:12:48Zby Dhanjani, Nitesh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491902899">https://learning.oreilly.com/library/view/~/9781491902899</a>
<a href="https://learning.oreilly.com/library/view/~/9781491902899/?ar">https://learning.oreilly.com/library/view/~/9781491902899/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491902899/?ar">https://go.oreilly.com/library-access/library/view/-/9781491902899/?ar</a><br/>Format: Electronic Resources<br/>Bulletproof Android : practical advice for building secure appsent://SD_ILS/0/SD_ILS:23052982024-06-21T14:12:48Z2024-06-21T14:12:48Zby Nolan, Godfrey, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780133995121/?ar">https://learning.oreilly.com/library/view/~/9780133995121/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133995121">https://learning.oreilly.com/library/view/~/9780133995121</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780133995121/?ar">https://go.oreilly.com/library-access/library/view/-/9780133995121/?ar</a><br/>Format: Electronic Resources<br/>Security and Usability : Designing Secure Systems that People Can Use.ent://SD_ILS/0/SD_ILS:22886102024-06-21T14:12:48Z2024-06-21T14:12:48Zby Cranor, Lorrie Faith.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596008279/?ar">https://go.oreilly.com/library-access/library/view/-/0596008279/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008279/?ar">https://learning.oreilly.com/library/view/~/0596008279/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008279">https://learning.oreilly.com/library/view/~/0596008279</a><br/>Format: Electronic Resources<br/>Enterprise Java security : building secure J2EE applicationsent://SD_ILS/0/SD_ILS:22813552024-06-21T14:12:48Z2024-06-21T14:12:48Zby Pistoia, Marco.<br/><a href="https://learning.oreilly.com/library/view/~/0321118898">https://learning.oreilly.com/library/view/~/0321118898</a>
<a href="https://learning.oreilly.com/library/view/~/0321118898/?ar">https://learning.oreilly.com/library/view/~/0321118898/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0321118898/?ar">https://go.oreilly.com/library-access/library/view/-/0321118898/?ar</a><br/>Format: Electronic Resources<br/>Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocolsent://SD_ILS/0/SD_ILS:22966162024-06-21T14:12:48Z2024-06-21T14:12:48Zby Raggo, Michael T.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497435/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497435/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497435/?ar">https://learning.oreilly.com/library/view/~/9781597497435/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497435">https://learning.oreilly.com/library/view/~/9781597497435</a><br/>Format: Electronic Resources<br/>An introduction to security in a CSM 1.3 for AIX 5L environmentent://SD_ILS/0/SD_ILS:22878272024-06-21T14:12:48Z2024-06-21T14:12:48Zby Lascu, Octavian.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738427896/?ar">https://go.oreilly.com/library-access/library/view/-/0738427896/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738427896/?ar">https://learning.oreilly.com/library/view/~/0738427896/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux cookbook : effective penetration testing solutionsent://SD_ILS/0/SD_ILS:23142702024-06-21T14:12:48Z2024-06-21T14:12:48Zby Schultz, Corey P., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784390303/?ar">https://go.oreilly.com/library-access/library/view/-/9781784390303/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781784390303/?ar">https://learning.oreilly.com/library/view/~/9781784390303/?ar</a><br/>Format: Electronic Resources<br/>Securing DevOpsent://SD_ILS/0/SD_ILS:23194652024-06-21T14:12:48Z2024-06-21T14:12:48Zby Vehent, Julien, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617294136/?ar">https://go.oreilly.com/library-access/library/view/-/9781617294136/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617294136">https://learning.oreilly.com/library/view/~/9781617294136</a>
<a href="https://learning.oreilly.com/library/view/~/9781617294136/?ar">https://learning.oreilly.com/library/view/~/9781617294136/?ar</a><br/>Format: Electronic Resources<br/>Threat hunting : a guide to proactive network defenseent://SD_ILS/0/SD_ILS:23184442024-06-21T14:12:48Z2024-06-21T14:12:48Zby Collins, Michael (Michael Patrick), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492028260/?ar">https://learning.oreilly.com/library/view/~/9781492028260/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492028260">https://learning.oreilly.com/library/view/~/9781492028260</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492028260/?ar">https://go.oreilly.com/library-access/library/view/-/9781492028260/?ar</a><br/>Format: Electronic Resources<br/>Cloud security : overview and best practicesent://SD_ILS/0/SD_ILS:23155212024-06-21T14:12:48Z2024-06-21T14:12:48Zby Bond, James (Cloud chief technologist)<br/><a href="https://learning.oreilly.com/library/view/~/9781492033790">https://learning.oreilly.com/library/view/~/9781492033790</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492033790/?ar">https://go.oreilly.com/library-access/library/view/-/9781492033790/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492033790/?ar">https://learning.oreilly.com/library/view/~/9781492033790/?ar</a><br/>Format: Electronic Resources<br/>Federated identity primerent://SD_ILS/0/SD_ILS:22966982024-06-21T14:12:48Z2024-06-21T14:12:48Zby Rountree, Derrick.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124071896/?ar">https://go.oreilly.com/library-access/library/view/-/9780124071896/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124071896/?ar">https://learning.oreilly.com/library/view/~/9780124071896/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124071896">https://learning.oreilly.com/library/view/~/9780124071896</a><br/>Format: Electronic Resources<br/>Enterprise DevOps for Architectsent://SD_ILS/0/SD_ILS:23309782024-06-21T14:12:48Z2024-06-21T14:12:48Zby Mulder, Jeroen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801812153">https://learning.oreilly.com/library/view/~/9781801812153</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801812153/?ar">https://go.oreilly.com/library-access/library/view/-/9781801812153/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801812153/?ar">https://learning.oreilly.com/library/view/~/9781801812153/?ar</a><br/>Format: Electronic Resources<br/>Alice and Bob learn application security.ent://SD_ILS/0/SD_ILS:23259582024-06-21T14:12:48Z2024-06-21T14:12:48Zby Janca, Tanya.<br/><a href="https://learning.oreilly.com/library/view/~/9781119687351">https://learning.oreilly.com/library/view/~/9781119687351</a>
<a href="https://learning.oreilly.com/library/view/~/9781119687351/?ar">https://learning.oreilly.com/library/view/~/9781119687351/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119687351/?ar">https://go.oreilly.com/library-access/library/view/-/9781119687351/?ar</a><br/>Format: Electronic Resources<br/>Windows security monitoring : scenarios and patternsent://SD_ILS/0/SD_ILS:23159452024-06-21T14:12:48Z2024-06-21T14:12:48Zby Miroshnikov, Andrei, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119390640/?ar">https://go.oreilly.com/library-access/library/view/-/9781119390640/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119390640/?ar">https://learning.oreilly.com/library/view/~/9781119390640/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119390640">https://learning.oreilly.com/library/view/~/9781119390640</a><br/>Format: Electronic Resources<br/>Security for Linux on System zent://SD_ILS/0/SD_ILS:23018722024-06-21T14:12:48Z2024-06-21T14:12:48Zby Parziale, Lydia.<br/><a href="https://learning.oreilly.com/library/view/~/0738437549/?ar">https://learning.oreilly.com/library/view/~/0738437549/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738437549/?ar">https://go.oreilly.com/library-access/library/view/-/0738437549/?ar</a><br/>Format: Electronic Resources<br/>Penetration Testing mit Metasploit : Praxiswissen für mehr IT-Sicherheitent://SD_ILS/0/SD_ILS:23162552024-06-21T14:12:48Z2024-06-21T14:12:48Zby Brabetz, Sebastian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9783958455979/?ar">https://learning.oreilly.com/library/view/~/9783958455979/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958455979">https://learning.oreilly.com/library/view/~/9783958455979</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783958455979/?ar">https://go.oreilly.com/library-access/library/view/-/9783958455979/?ar</a><br/>Format: Electronic Resources<br/>Kali Linux 2 : assuring security by penetration testing : Kali Linux : achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third editionent://SD_ILS/0/SD_ILS:23116552024-06-21T14:12:48Z2024-06-21T14:12:48Zby Johansen, Gerard, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785888427/?ar">https://learning.oreilly.com/library/view/~/9781785888427/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785888427/?ar">https://go.oreilly.com/library-access/library/view/-/9781785888427/?ar</a><br/>Format: Electronic Resources<br/>Mehr Hacking mit Python : eigene Tools entwickeln für Hacker and Pentesterent://SD_ILS/0/SD_ILS:23087772024-06-21T14:12:48Z2024-06-21T14:12:48Zby Seitz, Justin, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781457196140">https://learning.oreilly.com/library/view/~/9781457196140</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781457196140/?ar">https://go.oreilly.com/library-access/library/view/-/9781457196140/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457196140/?ar">https://learning.oreilly.com/library/view/~/9781457196140/?ar</a><br/>Format: Electronic Resources<br/>Security for Wireless Sensor Networks using Identity-Based Cryptographyent://SD_ILS/0/SD_ILS:23272862024-06-21T14:12:48Z2024-06-21T14:12:48Zby Patil, Harsh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439869024">https://learning.oreilly.com/library/view/~/9781439869024</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439869024/?ar">https://go.oreilly.com/library-access/library/view/-/9781439869024/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439869024/?ar">https://learning.oreilly.com/library/view/~/9781439869024/?ar</a><br/>Format: Electronic Resources<br/>Aus dem Tagebuch eines Bughunters : wie man Softwareschwachstellen aufspürt und behebtent://SD_ILS/0/SD_ILS:22977432024-06-21T14:12:48Z2024-06-21T14:12:48Zby Klein, Tobias.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457169670/?ar">https://go.oreilly.com/library-access/library/view/-/9781457169670/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457169670/?ar">https://learning.oreilly.com/library/view/~/9781457169670/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457169670">https://learning.oreilly.com/library/view/~/9781457169670</a><br/>Format: Electronic Resources<br/>Encryption in a Windows Environment : EFS File, 802.1x wireless, IPSec transport, and S/MIME exchangeent://SD_ILS/0/SD_ILS:23107702024-06-21T14:12:48Z2024-06-21T14:12:48Zby Morimoto, Rand.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0768668298/?ar">https://go.oreilly.com/library-access/library/view/-/0768668298/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0768668298/?ar">https://learning.oreilly.com/library/view/~/0768668298/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0768668298">https://learning.oreilly.com/library/view/~/0768668298</a><br/>Format: Electronic Resources<br/>Kali Linux 2 : Windows penetration testing : Kali Linux : a complete pentesting toolkit facilitating smooth backtracking for working hackersent://SD_ILS/0/SD_ILS:23110062024-06-21T14:12:48Z2024-06-21T14:12:48Zby Halton, Wolf, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781782168492/?ar">https://learning.oreilly.com/library/view/~/9781782168492/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781782168492">https://learning.oreilly.com/library/view/~/9781782168492</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781782168492/?ar">https://go.oreilly.com/library-access/library/view/-/9781782168492/?ar</a><br/>Format: Electronic Resources<br/>Advanced host intrusion prevention with CSAent://SD_ILS/0/SD_ILS:22822002024-06-21T14:12:48Z2024-06-21T14:12:48Zby Sullivan, Chad.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1587052520/?ar">https://go.oreilly.com/library-access/library/view/-/1587052520/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587052520">https://learning.oreilly.com/library/view/~/1587052520</a>
<a href="https://learning.oreilly.com/library/view/~/1587052520/?ar">https://learning.oreilly.com/library/view/~/1587052520/?ar</a><br/>Format: Electronic Resources<br/>Computer security : art and scienceent://SD_ILS/0/SD_ILS:23184522024-06-21T14:12:48Z2024-06-21T14:12:48Zby Bishop, Matt (Matthew A.), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134097145/?ar">https://go.oreilly.com/library-access/library/view/-/9780134097145/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134097145/?ar">https://learning.oreilly.com/library/view/~/9780134097145/?ar</a><br/>Format: Electronic Resources<br/>OS X exploits and defenseent://SD_ILS/0/SD_ILS:22851572024-06-21T14:12:48Z2024-06-21T14:12:48Zby Baccas, Paul.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492546/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492546/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492546/?ar">https://learning.oreilly.com/library/view/~/9781597492546/?ar</a><br/>Format: Electronic Resources<br/>Maximum Security, Third Editionent://SD_ILS/0/SD_ILS:23197122024-06-21T14:12:48Z2024-06-21T14:12:48Zby Anonymous, author.<br/><a href="https://learning.oreilly.com/library/view/~/0672318717">https://learning.oreilly.com/library/view/~/0672318717</a>
<a href="https://learning.oreilly.com/library/view/~/0672318717/?ar">https://learning.oreilly.com/library/view/~/0672318717/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0672318717/?ar">https://go.oreilly.com/library-access/library/view/-/0672318717/?ar</a><br/>Format: Electronic Resources<br/>Securing open source libraries : managing vulnerabilities in open source code packagesent://SD_ILS/0/SD_ILS:23148902024-06-21T14:12:48Z2024-06-21T14:12:48Zby Podjarny, Guy, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491996980/?ar">https://go.oreilly.com/library-access/library/view/-/9781491996980/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491996980/?ar">https://learning.oreilly.com/library/view/~/9781491996980/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491996980">https://learning.oreilly.com/library/view/~/9781491996980</a><br/>Format: Electronic Resources<br/>Distributed Denial of Service (DDoS) : practical detection and defenseent://SD_ILS/0/SD_ILS:23181762024-06-21T14:12:48Z2024-06-21T14:12:48Zby Chou, Eric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492026181/?ar">https://go.oreilly.com/library-access/library/view/-/9781492026181/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492026181">https://learning.oreilly.com/library/view/~/9781492026181</a>
<a href="https://learning.oreilly.com/library/view/~/9781492026181/?ar">https://learning.oreilly.com/library/view/~/9781492026181/?ar</a><br/>Format: Electronic Resources<br/>Is it safe? : protecting your computer, your business, and yourself onlineent://SD_ILS/0/SD_ILS:22855542024-06-21T14:12:48Z2024-06-21T14:12:48Zby Miller, Michael, 1958-<br/><a href="https://learning.oreilly.com/library/view/~/9780768683080/?ar">https://learning.oreilly.com/library/view/~/9780768683080/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780768683080/?ar">https://go.oreilly.com/library-access/library/view/-/9780768683080/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780768683080">https://learning.oreilly.com/library/view/~/9780768683080</a><br/>Format: Electronic Resources<br/>Computer security basicsent://SD_ILS/0/SD_ILS:22823772024-06-21T14:12:48Z2024-06-21T14:12:48Zby Lehtinen, Rick.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596006691/?ar">https://go.oreilly.com/library-access/library/view/-/0596006691/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596006691">https://learning.oreilly.com/library/view/~/0596006691</a>
<a href="https://learning.oreilly.com/library/view/~/0596006691/?ar">https://learning.oreilly.com/library/view/~/0596006691/?ar</a><br/>Format: Electronic Resources<br/>Cyber security and network securityent://SD_ILS/0/SD_ILS:23325382024-06-21T14:12:48Z2024-06-21T14:12:48Zby Pramanik, Sabyasachi, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119812494">https://learning.oreilly.com/library/view/~/9781119812494</a>
<a href="https://learning.oreilly.com/library/view/~/9781119812494/?ar">https://learning.oreilly.com/library/view/~/9781119812494/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119812494/?ar">https://go.oreilly.com/library-access/library/view/-/9781119812494/?ar</a><br/>Format: Electronic Resources<br/>Snowflake access control : mastering the features for data privacy and regulatory complianceent://SD_ILS/0/SD_ILS:23319072024-06-21T14:12:48Z2024-06-21T14:12:48Zby Larson, Jessica Megan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484280386">https://learning.oreilly.com/library/view/~/9781484280386</a>
<a href="https://learning.oreilly.com/library/view/~/9781484280386/?ar">https://learning.oreilly.com/library/view/~/9781484280386/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484280386/?ar">https://go.oreilly.com/library-access/library/view/-/9781484280386/?ar</a><br/>Format: Electronic Resources<br/>Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurityent://SD_ILS/0/SD_ILS:23254512024-06-21T14:12:48Z2024-06-21T14:12:48Zby Carey, Marcus J. (Cybersecurity professional)<br/><a href="https://learning.oreilly.com/library/view/~/9781119643418">https://learning.oreilly.com/library/view/~/9781119643418</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643418/?ar">https://learning.oreilly.com/library/view/~/9781119643418/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119643418/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643418/?ar</a><br/>Format: Electronic Resources<br/>Practical security : simple practices for defending your systemsent://SD_ILS/0/SD_ILS:23194022024-06-21T14:12:48Z2024-06-21T14:12:48Zby Zabicki, Roman, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781680506679/?ar">https://go.oreilly.com/library-access/library/view/-/9781680506679/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781680506679">https://learning.oreilly.com/library/view/~/9781680506679</a>
<a href="https://learning.oreilly.com/library/view/~/9781680506679/?ar">https://learning.oreilly.com/library/view/~/9781680506679/?ar</a><br/>Format: Electronic Resources<br/>Securing your cloud : IBM z/VM security for IBM z Systems and LinuxONEent://SD_ILS/0/SD_ILS:23118042024-06-21T14:12:48Z2024-06-21T14:12:48Zby Parziale, Lydia, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738442020/?ar">https://learning.oreilly.com/library/view/~/9780738442020/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738442020/?ar">https://go.oreilly.com/library-access/library/view/-/9780738442020/?ar</a><br/>Format: Electronic Resources<br/>Beginning security with Microsoft technologies : protecting Office 365, devices, and dataent://SD_ILS/0/SD_ILS:23221232024-06-21T14:12:48Z2024-06-21T14:12:48Zby Lakshmi, Vasantha, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484248539/?ar">https://learning.oreilly.com/library/view/~/9781484248539/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484248539/?ar">https://go.oreilly.com/library-access/library/view/-/9781484248539/?ar</a><br/>Format: Electronic Resources<br/>Network intrusion prevention design guideent://SD_ILS/0/SD_ILS:22943532024-06-21T14:12:48Z2024-06-21T14:12:48Zby Bücker, Axel.<br/><a href="https://learning.oreilly.com/library/view/~/0738436216/?ar">https://learning.oreilly.com/library/view/~/0738436216/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738436216/?ar">https://go.oreilly.com/library-access/library/view/-/0738436216/?ar</a><br/>Format: Electronic Resources<br/>Malicious cryptography : exposing cryptovirologyent://SD_ILS/0/SD_ILS:23102812024-06-21T14:12:48Z2024-06-21T14:12:48Zby Young, Adam, 1972- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780764568466/?ar">https://go.oreilly.com/library-access/library/view/-/9780764568466/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780764568466">https://learning.oreilly.com/library/view/~/9780764568466</a>
<a href="https://learning.oreilly.com/library/view/~/9780764568466/?ar">https://learning.oreilly.com/library/view/~/9780764568466/?ar</a><br/>Format: Electronic Resources<br/>Fight fire with fire : proactive cybersecurity strategies for today's leadersent://SD_ILS/0/SD_ILS:23309142024-06-21T14:12:48Z2024-06-21T14:12:48Zby Tarun, Renee, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119854265/?ar">https://learning.oreilly.com/library/view/~/9781119854265/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119854265/?ar">https://go.oreilly.com/library-access/library/view/-/9781119854265/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119854265">https://learning.oreilly.com/library/view/~/9781119854265</a><br/>Format: Electronic Resources<br/>Essential cryptography for JavaScript developers : a practical guide to leveraging common cryptographic operations in Node.js and the browserent://SD_ILS/0/SD_ILS:23315702024-06-21T14:12:48Z2024-06-21T14:12:48Zby Segala, Alessandro, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801075336/?ar">https://go.oreilly.com/library-access/library/view/-/9781801075336/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801075336/?ar">https://learning.oreilly.com/library/view/~/9781801075336/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801075336">https://learning.oreilly.com/library/view/~/9781801075336</a><br/>Format: Electronic Resources<br/>We have root : even more advice from Schneier on securityent://SD_ILS/0/SD_ILS:23215732024-06-21T14:12:48Z2024-06-21T14:12:48Zby Schneier, Bruce, 1963- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119643012">https://learning.oreilly.com/library/view/~/9781119643012</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119643012/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643012/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643012/?ar">https://learning.oreilly.com/library/view/~/9781119643012/?ar</a><br/>Format: Electronic Resources<br/>Gray hat C# : a hacker's guide to creating and automating security toolsent://SD_ILS/0/SD_ILS:23125692024-06-21T14:12:48Z2024-06-21T14:12:48Zby Perry, Brandon, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492023449">https://learning.oreilly.com/library/view/~/9781492023449</a>
<a href="https://learning.oreilly.com/library/view/~/9781492023449/?ar">https://learning.oreilly.com/library/view/~/9781492023449/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492023449/?ar">https://go.oreilly.com/library-access/library/view/-/9781492023449/?ar</a><br/>Format: Electronic Resources<br/>Zabbix network monitoring : gather detailed statistics and data while monitoring the performance and availability of network devices and applications using the all-new Zabbix 3.0ent://SD_ILS/0/SD_ILS:23113162024-06-21T14:12:48Z2024-06-21T14:12:48Zby Olups, Rihards, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781782161288/?ar">https://learning.oreilly.com/library/view/~/9781782161288/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781782161288/?ar">https://go.oreilly.com/library-access/library/view/-/9781782161288/?ar</a><br/>Format: Electronic Resources<br/>Self-sovereign identity : decentralized digital identity and verifiable credentialsent://SD_ILS/0/SD_ILS:23302702024-06-21T14:12:48Z2024-06-21T14:12:48Zby Preukschat, Alexander, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617296598/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296598/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296598/?ar">https://learning.oreilly.com/library/view/~/9781617296598/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296598">https://learning.oreilly.com/library/view/~/9781617296598</a><br/>Format: Electronic Resources<br/>Hacking : der umfassende Praxis-Guide: inkl. Prüfungsvorbereitung zum CEHv10ent://SD_ILS/0/SD_ILS:23259462024-06-21T14:12:48Z2024-06-21T14:12:48Zby Amberg, Eric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9783958452206/?ar">https://go.oreilly.com/library-access/library/view/-/9783958452206/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958452206/?ar">https://learning.oreilly.com/library/view/~/9783958452206/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958452206">https://learning.oreilly.com/library/view/~/9783958452206</a><br/>Format: Electronic Resources<br/>Advanced API security : securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWEent://SD_ILS/0/SD_ILS:23042762024-06-21T14:12:48Z2024-06-21T14:12:48Zby Siriwardena, Prabath, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781430268178">https://learning.oreilly.com/library/view/~/9781430268178</a>
<a href="https://learning.oreilly.com/library/view/~/9781430268178/?ar">https://learning.oreilly.com/library/view/~/9781430268178/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430268178/?ar">https://go.oreilly.com/library-access/library/view/-/9781430268178/?ar</a><br/>Format: Electronic Resources<br/>Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systemsent://SD_ILS/0/SD_ILS:22921292024-06-21T14:12:48Z2024-06-21T14:12:48Zby Knapp, Eric.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597496452/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496452/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496452/?ar">https://learning.oreilly.com/library/view/~/9781597496452/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496452">https://learning.oreilly.com/library/view/~/9781597496452</a><br/>Format: Electronic Resources<br/>Mainframe basics for security professionals : getting started with RACFent://SD_ILS/0/SD_ILS:22843272024-06-21T14:12:48Z2024-06-21T14:12:48Zby Pomerantz, Ori.<br/><a href="https://learning.oreilly.com/library/view/~/9780137137596/?ar">https://learning.oreilly.com/library/view/~/9780137137596/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137137596/?ar">https://go.oreilly.com/library-access/library/view/-/9780137137596/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780137137596">https://learning.oreilly.com/library/view/~/9780137137596</a><br/>Format: Electronic Resources<br/>IT Governance : Guidelines for Directors.ent://SD_ILS/0/SD_ILS:22906782024-06-21T14:12:48Z2024-06-21T14:12:48Zby Calder, Alan.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281058/?ar">https://learning.oreilly.com/library/view/~/9781849281058/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849281058/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281058/?ar</a><br/>Format: Electronic Resources<br/>Computer-related risksent://SD_ILS/0/SD_ILS:22875812024-06-21T14:12:48Z2024-06-21T14:12:48Zby Neumann, Peter, 1932-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321703187/?ar">https://go.oreilly.com/library-access/library/view/-/9780321703187/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321703187/?ar">https://learning.oreilly.com/library/view/~/9780321703187/?ar</a><br/>Format: Electronic Resources<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:22839742024-06-21T14:12:48Z2024-06-21T14:12:48Zby Winkler, Ira.<br/><a href="https://learning.oreilly.com/library/view/~/9780080554747">https://learning.oreilly.com/library/view/~/9780080554747</a>
<a href="https://learning.oreilly.com/library/view/~/9780080554747/?ar">https://learning.oreilly.com/library/view/~/9780080554747/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780080554747/?ar">https://go.oreilly.com/library-access/library/view/-/9780080554747/?ar</a>
<a href="https://www.sciencedirect.com/science/book/9781597491686">https://www.sciencedirect.com/science/book/9781597491686</a><br/>Format: Electronic Resources<br/>The privacy engineer's manifesto : getting from policy to code to QA to valueent://SD_ILS/0/SD_ILS:23022962024-06-21T14:12:48Z2024-06-21T14:12:48Zby Dennedy, Michelle Finneran.<br/><a href="https://learning.oreilly.com/library/view/~/9781430263555">https://learning.oreilly.com/library/view/~/9781430263555</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430263555/?ar">https://go.oreilly.com/library-access/library/view/-/9781430263555/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430263555/?ar">https://learning.oreilly.com/library/view/~/9781430263555/?ar</a><br/>Format: Electronic Resources<br/>Privacy and the Internet of Thingsent://SD_ILS/0/SD_ILS:23166482024-06-21T14:12:48Z2024-06-21T14:12:48Zby Rosner, Gilad, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042822">https://learning.oreilly.com/library/view/~/9781492042822</a>
<a href="https://learning.oreilly.com/library/view/~/9781492042822/?ar">https://learning.oreilly.com/library/view/~/9781492042822/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492042822/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042822/?ar</a><br/>Format: Electronic Resources<br/>Securing PHP appsent://SD_ILS/0/SD_ILS:23114972024-06-21T14:12:48Z2024-06-21T14:12:48Zby Edmunds, Ben, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484221204/?ar">https://go.oreilly.com/library-access/library/view/-/9781484221204/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484221204/?ar">https://learning.oreilly.com/library/view/~/9781484221204/?ar</a><br/>Format: Electronic Resources<br/>No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfingent://SD_ILS/0/SD_ILS:22851432024-06-21T14:12:48Z2024-06-21T14:12:48Zby Long, Johnny.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492157/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492157/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492157/?ar">https://learning.oreilly.com/library/view/~/9781597492157/?ar</a><br/>Format: Electronic Resources<br/>Secure edge computing : applications, techniques and challenges.ent://SD_ILS/0/SD_ILS:23292882024-06-21T14:12:48Z2024-06-21T14:12:48Zby Ahmed, Mohiuddin (Computer scientist), editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781000427325/?ar">https://learning.oreilly.com/library/view/~/9781000427325/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781000427325">https://learning.oreilly.com/library/view/~/9781000427325</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781000427325/?ar">https://go.oreilly.com/library-access/library/view/-/9781000427325/?ar</a><br/>Format: Electronic Resources<br/>Security from first principles : a practical guide to the information security practice principlesent://SD_ILS/0/SD_ILS:23144252024-06-21T14:12:48Z2024-06-21T14:12:48Zby Jackson, Craig, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491996911/?ar">https://go.oreilly.com/library-access/library/view/-/9781491996911/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491996911/?ar">https://learning.oreilly.com/library/view/~/9781491996911/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491996911">https://learning.oreilly.com/library/view/~/9781491996911</a><br/>Format: Electronic Resources<br/>Threat hunting in the cloud : defending AWS, Azure and other cloud platforms against cyberattacksent://SD_ILS/0/SD_ILS:23299412024-06-21T14:12:48Z2024-06-21T14:12:48Zby Peiris, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119804062/?ar">https://learning.oreilly.com/library/view/~/9781119804062/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119804062/?ar">https://go.oreilly.com/library-access/library/view/-/9781119804062/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119804062">https://learning.oreilly.com/library/view/~/9781119804062</a><br/>Format: Electronic Resources<br/>Agile application security : enabling security in a continuous delivery pipelineent://SD_ILS/0/SD_ILS:23123602024-06-21T14:12:48Z2024-06-21T14:12:48Zby Bell, Laura, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491938836">https://learning.oreilly.com/library/view/~/9781491938836</a>
<a href="https://learning.oreilly.com/library/view/~/9781491938836/?ar">https://learning.oreilly.com/library/view/~/9781491938836/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491938836/?ar">https://go.oreilly.com/library-access/library/view/-/9781491938836/?ar</a><br/>Format: Electronic Resources<br/>Windows lockdown! : your XP and Vista guide against hacks, attacks, and other Internet mayhement://SD_ILS/0/SD_ILS:22855802024-06-21T14:12:48Z2024-06-21T14:12:48Zby Walker, Andy (Andy G.), 1967-<br/><a href="https://learning.oreilly.com/library/view/~/9780789736727">https://learning.oreilly.com/library/view/~/9780789736727</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780789736727/?ar">https://go.oreilly.com/library-access/library/view/-/9780789736727/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780789736727/?ar">https://learning.oreilly.com/library/view/~/9780789736727/?ar</a><br/>Format: Electronic Resources<br/>Practical cyber forensics : an incident-based approach to forensic investigationsent://SD_ILS/0/SD_ILS:23215212024-06-21T14:12:48Z2024-06-21T14:12:48Zby Reddy, Niranjan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484244609/?ar">https://learning.oreilly.com/library/view/~/9781484244609/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484244609/?ar">https://go.oreilly.com/library-access/library/view/-/9781484244609/?ar</a><br/>Format: Electronic Resources<br/>A practical guide to computer forensics investigationsent://SD_ILS/0/SD_ILS:23056322024-06-21T14:12:48Z2024-06-21T14:12:48Zby Hayes, Darren R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780132756174/?ar">https://learning.oreilly.com/library/view/~/9780132756174/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780132756174/?ar">https://go.oreilly.com/library-access/library/view/-/9780132756174/?ar</a><br/>Format: Electronic Resources<br/>Security and privacy in cyber-physical systems : foundations, principles, and applicationsent://SD_ILS/0/SD_ILS:23161522024-06-21T14:12:48Z2024-06-21T14:12:48Zby Song, Houbing, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119226048/?ar">https://learning.oreilly.com/library/view/~/9781119226048/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119226048/?ar">https://go.oreilly.com/library-access/library/view/-/9781119226048/?ar</a><br/>Format: Electronic Resources<br/>Security considerations in Lotus Notes and Domino 7 : making great security easier to implementent://SD_ILS/0/SD_ILS:22957042024-06-21T14:12:48Z2024-06-21T14:12:48Zby Dahm, Frederic.<br/><a href="https://learning.oreilly.com/library/view/~/0738497347/?ar">https://learning.oreilly.com/library/view/~/0738497347/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738497347/?ar">https://go.oreilly.com/library-access/library/view/-/0738497347/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738497347">https://learning.oreilly.com/library/view/~/0738497347</a><br/>Format: Electronic Resources<br/>Biometrics for Network Securityent://SD_ILS/0/SD_ILS:23268142024-06-21T14:12:48Z2024-06-21T14:12:48Zby Reid, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/0131015494">https://learning.oreilly.com/library/view/~/0131015494</a>
<a href="https://learning.oreilly.com/library/view/~/0131015494/?ar">https://learning.oreilly.com/library/view/~/0131015494/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0131015494/?ar">https://go.oreilly.com/library-access/library/view/-/0131015494/?ar</a><br/>Format: Electronic Resources<br/>Designing Network Security Second Editionent://SD_ILS/0/SD_ILS:23197252024-06-21T14:12:48Z2024-06-21T14:12:48Zby Kaeo, Merike, author.<br/><a href="https://learning.oreilly.com/library/view/~/1587051176/?ar">https://learning.oreilly.com/library/view/~/1587051176/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587051176">https://learning.oreilly.com/library/view/~/1587051176</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1587051176/?ar">https://go.oreilly.com/library-access/library/view/-/1587051176/?ar</a><br/>Format: Electronic Resources<br/>Security Observability with eBPFent://SD_ILS/0/SD_ILS:23325762024-06-21T14:12:48Z2024-06-21T14:12:48Zby Salazar, Jed, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492096719">https://learning.oreilly.com/library/view/~/9781492096719</a>
<a href="https://learning.oreilly.com/library/view/~/9781492096719/?ar">https://learning.oreilly.com/library/view/~/9781492096719/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492096719/?ar">https://go.oreilly.com/library-access/library/view/-/9781492096719/?ar</a><br/>Format: Electronic Resources<br/>Securing your cloud : IBM security for LinuxONEent://SD_ILS/0/SD_ILS:23215972024-06-21T14:12:48Z2024-06-21T14:12:48Zby Alves, Edi Lopes, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457949/?ar">https://learning.oreilly.com/library/view/~/9780738457949/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738457949/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457949/?ar</a><br/>Format: Electronic Resources<br/>Cyber-physical attack recovery procedures : a step-by-step preparation and response guideent://SD_ILS/0/SD_ILS:23110182024-06-21T14:12:48Z2024-06-21T14:12:48Zby Ayala, Luis, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484220658/?ar">https://go.oreilly.com/library-access/library/view/-/9781484220658/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484220658/?ar">https://learning.oreilly.com/library/view/~/9781484220658/?ar</a><br/>Format: Electronic Resources<br/>Data Mining and Machine Learning in Cybersecurityent://SD_ILS/0/SD_ILS:23135572024-06-21T14:12:48Z2024-06-21T14:12:48Zby Dua, Sumeet, author<br/><a href="https://learning.oreilly.com/library/view/~/9781439839430/?ar">https://learning.oreilly.com/library/view/~/9781439839430/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439839430/?ar">https://go.oreilly.com/library-access/library/view/-/9781439839430/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439839430">https://learning.oreilly.com/library/view/~/9781439839430</a><br/>Format: Electronic Resources<br/>Container storage and data protection for applications on Kubernetesent://SD_ILS/0/SD_ILS:23325742024-06-21T14:12:48Z2024-06-21T14:12:48Zby Conrad, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098127022/?ar">https://learning.oreilly.com/library/view/~/9781098127022/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098127022">https://learning.oreilly.com/library/view/~/9781098127022</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098127022/?ar">https://go.oreilly.com/library-access/library/view/-/9781098127022/?ar</a><br/>Format: Electronic Resources<br/>What is eBPF?ent://SD_ILS/0/SD_ILS:23326312024-06-21T14:12:48Z2024-06-21T14:12:48Zby Rice, Liz (Open Source engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492097266/?ar">https://learning.oreilly.com/library/view/~/9781492097266/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492097266">https://learning.oreilly.com/library/view/~/9781492097266</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492097266/?ar">https://go.oreilly.com/library-access/library/view/-/9781492097266/?ar</a><br/>Format: Electronic Resources<br/>Hacking : der umfassende Praxis-Guide : inkl. Prüfungsvorbereitung zum CEHv11ent://SD_ILS/0/SD_ILS:23316832024-06-21T14:12:48Z2024-06-21T14:12:48Zby Amberg, Eric, author<br/><a href="https://learning.oreilly.com/library/view/~/9783747504840">https://learning.oreilly.com/library/view/~/9783747504840</a>
<a href="https://learning.oreilly.com/library/view/~/9783747504840/?ar">https://learning.oreilly.com/library/view/~/9783747504840/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783747504840/?ar">https://go.oreilly.com/library-access/library/view/-/9783747504840/?ar</a><br/>Format: Electronic Resources<br/>Cracking security misconceptions : untangling common myths about modern information securityent://SD_ILS/0/SD_ILS:23167042024-06-21T14:12:48Z2024-06-21T14:12:48Zby Peterson, Andrew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042747">https://learning.oreilly.com/library/view/~/9781492042747</a>
<a href="https://learning.oreilly.com/library/view/~/9781492042747/?ar">https://learning.oreilly.com/library/view/~/9781492042747/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492042747/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042747/?ar</a><br/>Format: Electronic Resources<br/>Snort Intrusion Detection 2.0.ent://SD_ILS/0/SD_ILS:22869602024-06-21T14:12:48Z2024-06-21T14:12:48Zby Russell, Ryan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780080481005/?ar">https://go.oreilly.com/library-access/library/view/-/9780080481005/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780080481005/?ar">https://learning.oreilly.com/library/view/~/9780080481005/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780080481005">https://learning.oreilly.com/library/view/~/9780080481005</a><br/>Format: Electronic Resources<br/>Getting started with Linux on Z Encryption for data at-restent://SD_ILS/0/SD_ILS:23219732024-06-21T14:12:48Z2024-06-21T14:12:48Zby White, Bill (Telecommunications engineer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738457468/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457468/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738457468/?ar">https://learning.oreilly.com/library/view/~/9780738457468/?ar</a><br/>Format: Electronic Resources<br/>Enterprise Mac security : MAC OS X Snow Leopardent://SD_ILS/0/SD_ILS:22904212024-06-21T14:12:48Z2024-06-21T14:12:48Zby Edge, Charles S., Jr.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781430227304/?ar">https://go.oreilly.com/library-access/library/view/-/9781430227304/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430227304/?ar">https://learning.oreilly.com/library/view/~/9781430227304/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430227304">https://learning.oreilly.com/library/view/~/9781430227304</a><br/>Format: Electronic Resources<br/>Chained exploits : advanced hacking attacks from start to finishent://SD_ILS/0/SD_ILS:22861032024-06-21T14:12:48Z2024-06-21T14:12:48Zby Whitaker, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9780321620637">https://learning.oreilly.com/library/view/~/9780321620637</a>
<a href="https://learning.oreilly.com/library/view/~/9780321620637/?ar">https://learning.oreilly.com/library/view/~/9780321620637/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321620637/?ar">https://go.oreilly.com/library-access/library/view/-/9780321620637/?ar</a><br/>Format: Electronic Resources<br/>Securing Citrix XenApp Server in the enterpriseent://SD_ILS/0/SD_ILS:22851442024-06-21T14:12:48Z2024-06-21T14:12:48Zby Bin Azad, Tariq.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492812/?ar">https://learning.oreilly.com/library/view/~/9781597492812/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492812/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492812/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492812">https://learning.oreilly.com/library/view/~/9781597492812</a><br/>Format: Electronic Resources<br/>The art of software security assessment : identifying and preventing software vulnerabilitiesent://SD_ILS/0/SD_ILS:22828862024-06-21T14:12:48Z2024-06-21T14:12:48Zby Dowd, Mark.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321444426/?ar">https://go.oreilly.com/library-access/library/view/-/0321444426/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321444426/?ar">https://learning.oreilly.com/library/view/~/0321444426/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321444426">https://learning.oreilly.com/library/view/~/0321444426</a><br/>Format: Electronic Resources<br/>Internet forensicsent://SD_ILS/0/SD_ILS:22820552024-06-21T14:12:48Z2024-06-21T14:12:48Zby Jones, Robert, 1957 July 15-<br/><a href="https://learning.oreilly.com/library/view/~/059610006X">https://learning.oreilly.com/library/view/~/059610006X</a>
<a href="https://learning.oreilly.com/library/view/~/059610006X/?ar">https://learning.oreilly.com/library/view/~/059610006X/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/059610006X/?ar">https://go.oreilly.com/library-access/library/view/-/059610006X/?ar</a><br/>Format: Electronic Resources<br/>Data Protection and Information Lifecycle Management.ent://SD_ILS/0/SD_ILS:22904662024-06-21T14:12:48Z2024-06-21T14:12:48Zby Petrocelli, Tom, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0131927574/?ar">https://go.oreilly.com/library-access/library/view/-/0131927574/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0131927574/?ar">https://learning.oreilly.com/library/view/~/0131927574/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0131927574">https://learning.oreilly.com/library/view/~/0131927574</a><br/>Format: Electronic Resources<br/>The .NET developer's guide to Windows securityent://SD_ILS/0/SD_ILS:23241532024-06-21T14:12:48Z2024-06-21T14:12:48Zby Brown, Keith, 1967 March 16-<br/><a href="https://learning.oreilly.com/library/view/~/0321228359">https://learning.oreilly.com/library/view/~/0321228359</a>
<a href="https://learning.oreilly.com/library/view/~/0321228359/?ar">https://learning.oreilly.com/library/view/~/0321228359/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0321228359/?ar">https://go.oreilly.com/library-access/library/view/-/0321228359/?ar</a><br/>Format: Electronic Resources<br/>Security in computingent://SD_ILS/0/SD_ILS:23058972024-06-21T14:12:48Z2024-06-21T14:12:48Zby Pfleeger, Charles P., 1948- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134085074/?ar">https://learning.oreilly.com/library/view/~/9780134085074/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134085074/?ar">https://go.oreilly.com/library-access/library/view/-/9780134085074/?ar</a><br/>Format: Electronic Resources<br/>Applied security visualizationent://SD_ILS/0/SD_ILS:22854922024-06-21T14:12:48Z2024-06-21T14:12:48Zby Marty, Raffael, 1976-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321585530/?ar">https://go.oreilly.com/library-access/library/view/-/9780321585530/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321585530/?ar">https://learning.oreilly.com/library/view/~/9780321585530/?ar</a><br/>Format: Electronic Resources<br/>Applied cryptography : protocols, algorithms, and source code in Cent://SD_ILS/0/SD_ILS:22882292024-06-21T14:12:48Z2024-06-21T14:12:48Zby Schneier, Bruce, 1963-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780471117094/?ar">https://go.oreilly.com/library-access/library/view/-/9780471117094/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780471117094/?ar">https://learning.oreilly.com/library/view/~/9780471117094/?ar</a><br/>Format: Electronic Resources<br/>An introduction to cyber modeling and simulationent://SD_ILS/0/SD_ILS:23170812024-06-21T14:12:48Z2024-06-21T14:12:48Zby Couretas, Jerry M., 1966- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119420873">https://learning.oreilly.com/library/view/~/9781119420873</a>
<a href="https://learning.oreilly.com/library/view/~/9781119420873/?ar">https://learning.oreilly.com/library/view/~/9781119420873/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119420873/?ar">https://go.oreilly.com/library-access/library/view/-/9781119420873/?ar</a><br/>Format: Electronic Resources<br/>Professional ASP.NET 3.5 security, membership, and role management with C♯ and VBent://SD_ILS/0/SD_ILS:22917422024-06-21T14:12:48Z2024-06-21T14:12:48Zby Haidar, Bilal.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470379301/?ar">https://go.oreilly.com/library-access/library/view/-/9780470379301/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470379301/?ar">https://learning.oreilly.com/library/view/~/9780470379301/?ar</a><br/>Format: Electronic Resources<br/>Information assurance : dependability and security in networked systemsent://SD_ILS/0/SD_ILS:22862452024-06-21T14:12:48Z2024-06-21T14:12:48Zby Qian, Yi, 1962-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780123735669/?ar">https://go.oreilly.com/library-access/library/view/-/9780123735669/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780123735669/?ar">https://learning.oreilly.com/library/view/~/9780123735669/?ar</a><br/>Format: Electronic Resources<br/>Windows virus and malware troubleshootingent://SD_ILS/0/SD_ILS:23129372024-06-21T14:12:48Z2024-06-21T14:12:48Zby Bettany, Andrew, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484226070/?ar">https://go.oreilly.com/library-access/library/view/-/9781484226070/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484226070/?ar">https://learning.oreilly.com/library/view/~/9781484226070/?ar</a><br/>Format: Electronic Resources<br/>Security for service oriented architecturesent://SD_ILS/0/SD_ILS:23032922024-06-21T14:12:48Z2024-06-21T14:12:48Zby Williams, Walter (Telecommunications engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466584044">https://learning.oreilly.com/library/view/~/9781466584044</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466584044/?ar">https://go.oreilly.com/library-access/library/view/-/9781466584044/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466584044/?ar">https://learning.oreilly.com/library/view/~/9781466584044/?ar</a><br/>Format: Electronic Resources<br/>Enterprise security : a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterpriseent://SD_ILS/0/SD_ILS:23012512024-06-21T14:12:48Z2024-06-21T14:12:48Zby Woody, Aaron.<br/><a href="https://learning.oreilly.com/library/view/~/9781849685962/?ar">https://learning.oreilly.com/library/view/~/9781849685962/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849685962/?ar">https://go.oreilly.com/library-access/library/view/-/9781849685962/?ar</a><br/>Format: Electronic Resources<br/>125 sposobów na bezpieczeństwo siecient://SD_ILS/0/SD_ILS:22994392024-06-21T14:12:48Z2024-06-21T14:12:48Zby Lockhart, Andrew.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457176357/?ar">https://go.oreilly.com/library-access/library/view/-/9781457176357/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457176357/?ar">https://learning.oreilly.com/library/view/~/9781457176357/?ar</a><br/>Format: Electronic Resources<br/>Cyberjutsu : cybersecurity for the modern ninjaent://SD_ILS/0/SD_ILS:23265412024-06-21T14:12:48Z2024-06-21T14:12:48Zby McCarty, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098128920">https://learning.oreilly.com/library/view/~/9781098128920</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128920/?ar">https://learning.oreilly.com/library/view/~/9781098128920/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar</a><br/>Format: Electronic Resources<br/>SECURING CLOUD SERVICES;A PRAGMATIC APPROACH, SECOND EDITION.ent://SD_ILS/0/SD_ILS:23280812024-06-21T14:12:48Z2024-06-21T14:12:48Zby LEE NEWCOMBE.<br/><a href="https://learning.oreilly.com/library/view/~/9781787782075">https://learning.oreilly.com/library/view/~/9781787782075</a>
<a href="https://learning.oreilly.com/library/view/~/9781787782075/?ar">https://learning.oreilly.com/library/view/~/9781787782075/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787782075/?ar">https://go.oreilly.com/library-access/library/view/-/9781787782075/?ar</a><br/>Format: Electronic Resources<br/>Linux® hardening in hostile networks : server security from TLS to TORent://SD_ILS/0/SD_ILS:23141772024-06-21T14:12:48Z2024-06-21T14:12:48Zby Rankin, Kyle, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134173337/?ar">https://learning.oreilly.com/library/view/~/9780134173337/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134173337/?ar">https://go.oreilly.com/library-access/library/view/-/9780134173337/?ar</a><br/>Format: Electronic Resources<br/>Post-incident reviews : learning from failure for improved incident responseent://SD_ILS/0/SD_ILS:23184992024-06-21T14:12:48Z2024-06-21T14:12:48Zby Hand, Jason, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491986998/?ar">https://go.oreilly.com/library-access/library/view/-/9781491986998/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491986998">https://learning.oreilly.com/library/view/~/9781491986998</a>
<a href="https://learning.oreilly.com/library/view/~/9781491986998/?ar">https://learning.oreilly.com/library/view/~/9781491986998/?ar</a><br/>Format: Electronic Resources<br/>A practical guide to trusted computingent://SD_ILS/0/SD_ILS:22844602024-06-21T14:12:48Z2024-06-21T14:12:48Zby Challener, David.<br/><a href="https://learning.oreilly.com/library/view/~/9780132398428">https://learning.oreilly.com/library/view/~/9780132398428</a>
<a href="https://learning.oreilly.com/library/view/~/9780132398428/?ar">https://learning.oreilly.com/library/view/~/9780132398428/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780132398428/?ar">https://go.oreilly.com/library-access/library/view/-/9780132398428/?ar</a><br/>Format: Electronic Resources<br/>Understanding Windows CardSpace : an introduction to the concepts and challenges of digital identitiesent://SD_ILS/0/SD_ILS:22844022024-06-21T14:12:48Z2024-06-21T14:12:48Zby Bertocci, Vittorio.<br/><a href="https://learning.oreilly.com/library/view/~/9780321496843/?ar">https://learning.oreilly.com/library/view/~/9780321496843/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321496843/?ar">https://go.oreilly.com/library-access/library/view/-/9780321496843/?ar</a><br/>Format: Electronic Resources<br/>Computer incident response and forensics team management : conducting a successful incident responseent://SD_ILS/0/SD_ILS:23006702024-06-21T14:12:48Z2024-06-21T14:12:48Zby Johnson, Leighton, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499965/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499965/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499965/?ar">https://learning.oreilly.com/library/view/~/9781597499965/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499965">https://learning.oreilly.com/library/view/~/9781597499965</a><br/>Format: Electronic Resources<br/>The PayPal official insider guide to internet security : spot scams and protect your online businessent://SD_ILS/0/SD_ILS:22972592024-06-21T14:12:48Z2024-06-21T14:12:48Zby Savage, Michelle.<br/><a href="https://learning.oreilly.com/library/view/~/9780133154573">https://learning.oreilly.com/library/view/~/9780133154573</a>
<a href="https://learning.oreilly.com/library/view/~/9780133154573/?ar">https://learning.oreilly.com/library/view/~/9780133154573/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780133154573/?ar">https://go.oreilly.com/library-access/library/view/-/9780133154573/?ar</a><br/>Format: Electronic Resources<br/>Ninja hacking : unconventional penetration testing tactics and techniquesent://SD_ILS/0/SD_ILS:22903042024-06-21T14:12:48Z2024-06-21T14:12:48Zby Wilhelm, Thomas.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495899">https://learning.oreilly.com/library/view/~/9781597495899</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495899/?ar">https://learning.oreilly.com/library/view/~/9781597495899/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495899/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495899/?ar</a><br/>Format: Electronic Resources<br/>The Mac hacker's handbookent://SD_ILS/0/SD_ILS:22863412024-06-21T14:12:48Z2024-06-21T14:12:48Zby Miller, Charles, 1951-<br/><a href="https://learning.oreilly.com/library/view/~/9781118080337/?ar">https://learning.oreilly.com/library/view/~/9781118080337/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118080337/?ar">https://go.oreilly.com/library-access/library/view/-/9781118080337/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118080337">https://learning.oreilly.com/library/view/~/9781118080337</a><br/>Format: Electronic Resources<br/>Rootkits : subverting the Windows kernelent://SD_ILS/0/SD_ILS:22859812024-06-21T14:12:48Z2024-06-21T14:12:48Zby Hoglund, Greg.<br/><a href="https://learning.oreilly.com/library/view/~/0321294319/?ar">https://learning.oreilly.com/library/view/~/0321294319/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0321294319/?ar">https://go.oreilly.com/library-access/library/view/-/0321294319/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321294319">https://learning.oreilly.com/library/view/~/0321294319</a><br/>Format: Electronic Resources<br/>Mastering the Microsoft Deployment Toolkit : take a deep dive into the world of Windows desktop deployment using the Microsoft Deployment Toolkitent://SD_ILS/0/SD_ILS:23108132024-06-21T14:12:48Z2024-06-21T14:12:48Zby Stokes, Jeff, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781782172499/?ar">https://learning.oreilly.com/library/view/~/9781782172499/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781782172499">https://learning.oreilly.com/library/view/~/9781782172499</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781782172499/?ar">https://go.oreilly.com/library-access/library/view/-/9781782172499/?ar</a><br/>Format: Electronic Resources<br/>Practical Linux security cookbook : secure your Linux machines and keep them secured with the help of exciting recipesent://SD_ILS/0/SD_ILS:23105852024-06-21T14:12:48Z2024-06-21T14:12:48Zby Kalsi, Tajinder, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785286421/?ar">https://learning.oreilly.com/library/view/~/9781785286421/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785286421/?ar">https://go.oreilly.com/library-access/library/view/-/9781785286421/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785286421">https://learning.oreilly.com/library/view/~/9781785286421</a><br/>Format: Electronic Resources<br/>Cyber operations : building, defending, and attacking modern computer networksent://SD_ILS/0/SD_ILS:23086782024-06-21T14:12:48Z2024-06-21T14:12:48Zby O'Leary, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484204573">https://learning.oreilly.com/library/view/~/9781484204573</a>
<a href="https://learning.oreilly.com/library/view/~/9781484204573/?ar">https://learning.oreilly.com/library/view/~/9781484204573/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484204573/?ar">https://go.oreilly.com/library-access/library/view/-/9781484204573/?ar</a><br/>Format: Electronic Resources<br/>Cryptography and network securityent://SD_ILS/0/SD_ILS:22959512024-06-21T14:12:48Z2024-06-21T14:12:48Zby ITL Education Solutions. Research and Development Wing.<br/><a href="https://learning.oreilly.com/library/view/~/9788131764527/?ar">https://learning.oreilly.com/library/view/~/9788131764527/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9788131764527">https://learning.oreilly.com/library/view/~/9788131764527</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9788131764527/?ar">https://go.oreilly.com/library-access/library/view/-/9788131764527/?ar</a><br/>Format: Electronic Resources<br/>Gray hat hacking : the ethical hacker's handbookent://SD_ILS/0/SD_ILS:22908212024-06-21T14:12:48Z2024-06-21T14:12:48Zby Harper, Allen.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071742559/?ar">https://go.oreilly.com/library-access/library/view/-/9780071742559/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071742559/?ar">https://learning.oreilly.com/library/view/~/9780071742559/?ar</a><br/>Format: Electronic Resources<br/>The second economy : the race for trust, treasure and time in the cybersecurity warent://SD_ILS/0/SD_ILS:23125522024-06-21T14:12:48Z2024-06-21T14:12:48Zby Grobman, Steve, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484222294/?ar">https://learning.oreilly.com/library/view/~/9781484222294/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484222294/?ar">https://go.oreilly.com/library-access/library/view/-/9781484222294/?ar</a><br/>Format: Electronic Resources<br/>Digital forensics explainedent://SD_ILS/0/SD_ILS:23180232024-06-21T14:12:48Z2024-06-21T14:12:48Zby Gogolin, Greg, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439874950/?ar">https://learning.oreilly.com/library/view/~/9781439874950/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439874950/?ar">https://go.oreilly.com/library-access/library/view/-/9781439874950/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439874950">https://learning.oreilly.com/library/view/~/9781439874950</a><br/>Format: Electronic Resources<br/>Windows Malware analysis essentials : master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill setent://SD_ILS/0/SD_ILS:23084382024-06-21T14:12:48Z2024-06-21T14:12:48Zby Marak, Victor, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785281518">https://learning.oreilly.com/library/view/~/9781785281518</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785281518/?ar">https://go.oreilly.com/library-access/library/view/-/9781785281518/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785281518/?ar">https://learning.oreilly.com/library/view/~/9781785281518/?ar</a><br/>Format: Electronic Resources<br/>Implementing NetScaler VPX : implement the new features of Citrix NetScaler 11 to optimize and deploy secure web services on multiple virtualization platformsent://SD_ILS/0/SD_ILS:23098322024-06-21T14:12:48Z2024-06-21T14:12:48Zby Sandbu, Marius, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785288982">https://learning.oreilly.com/library/view/~/9781785288982</a>
<a href="https://learning.oreilly.com/library/view/~/9781785288982/?ar">https://learning.oreilly.com/library/view/~/9781785288982/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785288982/?ar">https://go.oreilly.com/library-access/library/view/-/9781785288982/?ar</a><br/>Format: Electronic Resources<br/>Malware : Fighting Malicious Code.ent://SD_ILS/0/SD_ILS:23179832024-06-21T14:12:48Z2024-06-21T14:12:48Zby Skoudis, Ed, author.<br/><a href="https://learning.oreilly.com/library/view/~/0131014056">https://learning.oreilly.com/library/view/~/0131014056</a>
<a href="https://learning.oreilly.com/library/view/~/0131014056/?ar">https://learning.oreilly.com/library/view/~/0131014056/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0131014056/?ar">https://go.oreilly.com/library-access/library/view/-/0131014056/?ar</a><br/>Format: Electronic Resources<br/>Metasploit revealed : secrets of the expert pentester : build your defense against complex attacks : a course in three modules.ent://SD_ILS/0/SD_ILS:23153202024-06-21T14:12:48Z2024-06-21T14:12:48Zby Rahalkar, Sagar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788624596/?ar">https://learning.oreilly.com/library/view/~/9781788624596/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788624596/?ar">https://go.oreilly.com/library-access/library/view/-/9781788624596/?ar</a><br/>Format: Electronic Resources<br/>Hacking exposed 7 : network security secrets & solutionsent://SD_ILS/0/SD_ILS:22965282024-06-21T14:12:48Z2024-06-21T14:12:48Zby McClure, Stuart.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071780285/?ar">https://go.oreilly.com/library-access/library/view/-/9780071780285/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071780285/?ar">https://learning.oreilly.com/library/view/~/9780071780285/?ar</a><br/>Format: Electronic Resources<br/>Assessing and Managing Security Risk in IT Systemsent://SD_ILS/0/SD_ILS:23263052024-06-21T14:12:48Z2024-06-21T14:12:48Zby McCumber, John.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780203490426/?ar">https://go.oreilly.com/library-access/library/view/-/9780203490426/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780203490426">https://learning.oreilly.com/library/view/~/9780203490426</a>
<a href="https://learning.oreilly.com/library/view/~/9780203490426/?ar">https://learning.oreilly.com/library/view/~/9780203490426/?ar</a><br/>Format: Electronic Resources<br/>Network Intrusion Detection, Third Editionent://SD_ILS/0/SD_ILS:23197342024-06-21T14:12:48Z2024-06-21T14:12:48Zby Northcutt, Stephen, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0735712654/?ar">https://go.oreilly.com/library-access/library/view/-/0735712654/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0735712654">https://learning.oreilly.com/library/view/~/0735712654</a>
<a href="https://learning.oreilly.com/library/view/~/0735712654/?ar">https://learning.oreilly.com/library/view/~/0735712654/?ar</a><br/>Format: Electronic Resources<br/>The complete Metasploit guide : explore effective penetration testing techniques with Metasploitent://SD_ILS/0/SD_ILS:23270772024-06-21T14:12:48Z2024-06-21T14:12:48Zby Rahalkar, Sagar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838822477/?ar">https://go.oreilly.com/library-access/library/view/-/9781838822477/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781838822477">https://learning.oreilly.com/library/view/~/9781838822477</a>
<a href="https://learning.oreilly.com/library/view/~/9781838822477/?ar">https://learning.oreilly.com/library/view/~/9781838822477/?ar</a><br/>Format: Electronic Resources<br/>Metasploit for beginners : create a threat-free environment with the best-in-class toolent://SD_ILS/0/SD_ILS:23138402024-06-21T14:12:48Z2024-06-21T14:12:48Zby Rahalkar, Sagar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788295970/?ar">https://go.oreilly.com/library-access/library/view/-/9781788295970/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788295970/?ar">https://learning.oreilly.com/library/view/~/9781788295970/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788295970">https://learning.oreilly.com/library/view/~/9781788295970</a><br/>Format: Electronic Resources<br/>Dynamic SQL : applications, performance, and security : rapid response and flexibility in the face of changing business requirementsent://SD_ILS/0/SD_ILS:23106712024-06-21T14:12:48Z2024-06-21T14:12:48Zby Pollack, Edward, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484218112/?ar">https://go.oreilly.com/library-access/library/view/-/9781484218112/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484218112/?ar">https://learning.oreilly.com/library/view/~/9781484218112/?ar</a><br/>Format: Electronic Resources<br/>Cyber security : a practitioner's guideent://SD_ILS/0/SD_ILS:23137632024-06-21T14:12:48Z2024-06-21T14:12:48Zby Sutton, David (Information security practitioner), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781780173405/?ar">https://go.oreilly.com/library-access/library/view/-/9781780173405/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780173405/?ar">https://learning.oreilly.com/library/view/~/9781780173405/?ar</a><br/>Format: Electronic Resources<br/>Integrated security technologies and solutions. Volume I, Cisco Security Solutions for advanced threat protection with next generation firewall, intrusion prevention, AMP, and content securityent://SD_ILS/0/SD_ILS:23163882024-06-21T14:12:48Z2024-06-21T14:12:48Zby Woland, Aaron T., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134807577/?ar">https://go.oreilly.com/library-access/library/view/-/9780134807577/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134807577/?ar">https://learning.oreilly.com/library/view/~/9780134807577/?ar</a><br/>Format: Electronic Resources<br/>Software security engineering : a guide for project managersent://SD_ILS/0/SD_ILS:22844702024-06-21T14:12:48Z2024-06-21T14:12:48Zby Allen, Julia H.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321559685/?ar">https://go.oreilly.com/library-access/library/view/-/9780321559685/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321559685/?ar">https://learning.oreilly.com/library/view/~/9780321559685/?ar</a><br/>Format: Electronic Resources<br/>Software piracy exposedent://SD_ILS/0/SD_ILS:22819952024-06-21T14:12:48Z2024-06-21T14:12:48Zby Craig, Paul.<br/><a href="https://learning.oreilly.com/library/view/~/9781932266986">https://learning.oreilly.com/library/view/~/9781932266986</a>
<a href="https://www.sciencedirect.com/science/book/9781932266986">https://www.sciencedirect.com/science/book/9781932266986</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781932266986/?ar">https://go.oreilly.com/library-access/library/view/-/9781932266986/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781932266986/?ar">https://learning.oreilly.com/library/view/~/9781932266986/?ar</a><br/>Format: Electronic Resources<br/>Artificial Intelligence, Cybersecurity and Cyber Defenceent://SD_ILS/0/SD_ILS:23283582024-06-21T14:12:48Z2024-06-21T14:12:48Zby Ventre, Daniel, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781786304674/?ar">https://go.oreilly.com/library-access/library/view/-/9781786304674/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786304674">https://learning.oreilly.com/library/view/~/9781786304674</a>
<a href="https://learning.oreilly.com/library/view/~/9781786304674/?ar">https://learning.oreilly.com/library/view/~/9781786304674/?ar</a><br/>Format: Electronic Resources<br/>Getting started with z/OS data set encryptionent://SD_ILS/0/SD_ILS:23169372024-06-21T14:12:48Z2024-06-21T14:12:48Zby White, Bill (Telecommunications engineer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738456874/?ar">https://go.oreilly.com/library-access/library/view/-/9780738456874/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738456874/?ar">https://learning.oreilly.com/library/view/~/9780738456874/?ar</a><br/>Format: Electronic Resources<br/>Integrated security technologies and solutions. Volume II, Cisco Security Solutions for network access control, segmentation, context sharing, secure connectivity, and virtualizationent://SD_ILS/0/SD_ILS:23189382024-06-21T14:12:48Z2024-06-21T14:12:48Zby Woland, Aaron T., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134807614/?ar">https://learning.oreilly.com/library/view/~/9780134807614/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134807614/?ar">https://go.oreilly.com/library-access/library/view/-/9780134807614/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134807614">https://learning.oreilly.com/library/view/~/9780134807614</a><br/>Format: Electronic Resources<br/>Designing secure software : a guide for developersent://SD_ILS/0/SD_ILS:23295942024-06-21T14:12:48Z2024-06-21T14:12:48Zby Kohnfelder, Loren, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098129804/?ar">https://go.oreilly.com/library-access/library/view/-/9781098129804/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098129804/?ar">https://learning.oreilly.com/library/view/~/9781098129804/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098129804">https://learning.oreilly.com/library/view/~/9781098129804</a><br/>Format: Electronic Resources<br/>Essential cybersecurity science : build, test, and evaluate secure systemsent://SD_ILS/0/SD_ILS:23091932024-06-21T14:12:48Z2024-06-21T14:12:48Zby Dykstra, Josiah, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491921050">https://learning.oreilly.com/library/view/~/9781491921050</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491921050/?ar">https://go.oreilly.com/library-access/library/view/-/9781491921050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491921050/?ar">https://learning.oreilly.com/library/view/~/9781491921050/?ar</a><br/>Format: Electronic Resources<br/>Honeypots : tracking hackersent://SD_ILS/0/SD_ILS:22808212024-06-21T14:12:48Z2024-06-21T14:12:48Zby Spitzner, Lance.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321108957/?ar">https://go.oreilly.com/library-access/library/view/-/0321108957/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321108957/?ar">https://learning.oreilly.com/library/view/~/0321108957/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321108957">https://learning.oreilly.com/library/view/~/0321108957</a><br/>Format: Electronic Resources<br/>The security development lifecycle : SDL, a process for developing demonstrably more secure softwareent://SD_ILS/0/SD_ILS:22824622024-06-21T14:12:48Z2024-06-21T14:12:48Zby Howard, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/0735622140">https://learning.oreilly.com/library/view/~/0735622140</a>
<a href="https://learning.oreilly.com/library/view/~/0735622140/?ar">https://learning.oreilly.com/library/view/~/0735622140/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0735622140/?ar">https://go.oreilly.com/library-access/library/view/-/0735622140/?ar</a><br/>Format: Electronic Resources<br/>Offensive shellcode from scratch : get to grips with shellcode countermeasures and discover how to bypass thement://SD_ILS/0/SD_ILS:23325372024-06-21T14:12:48Z2024-06-21T14:12:48Zby Pillay, Rishalin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803247427/?ar">https://go.oreilly.com/library-access/library/view/-/9781803247427/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803247427">https://learning.oreilly.com/library/view/~/9781803247427</a>
<a href="https://learning.oreilly.com/library/view/~/9781803247427/?ar">https://learning.oreilly.com/library/view/~/9781803247427/?ar</a><br/>Format: Electronic Resources<br/>Python for cybersecurity : using Python for cyber offense and defenseent://SD_ILS/0/SD_ILS:23315742024-06-21T14:12:48Z2024-06-21T14:12:48Zby Poston, Howard E.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119850649/?ar">https://go.oreilly.com/library-access/library/view/-/9781119850649/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119850649/?ar">https://learning.oreilly.com/library/view/~/9781119850649/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119850649">https://learning.oreilly.com/library/view/~/9781119850649</a><br/>Format: Electronic Resources<br/>Cybersecurity Ops with bash : attack, defend, and analyze from the command lineent://SD_ILS/0/SD_ILS:23192522024-06-21T14:12:48Z2024-06-21T14:12:48Zby Troncone, Paul, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492041306/?ar">https://go.oreilly.com/library-access/library/view/-/9781492041306/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492041306">https://learning.oreilly.com/library/view/~/9781492041306</a>
<a href="https://learning.oreilly.com/library/view/~/9781492041306/?ar">https://learning.oreilly.com/library/view/~/9781492041306/?ar</a><br/>Format: Electronic Resources<br/>Security with AI and machine learning : using advanced tools to improve application security at the edgeent://SD_ILS/0/SD_ILS:23190582024-06-21T14:12:48Z2024-06-21T14:12:48Zby Gil, Laurent, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492043133/?ar">https://go.oreilly.com/library-access/library/view/-/9781492043133/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492043133/?ar">https://learning.oreilly.com/library/view/~/9781492043133/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492043133">https://learning.oreilly.com/library/view/~/9781492043133</a><br/>Format: Electronic Resources<br/>Cryptography and network securityent://SD_ILS/0/SD_ILS:23144162024-06-21T14:12:48Z2024-06-21T14:12:48Zby Bose, S., author.<br/><a href="https://learning.oreilly.com/library/view/~/9789332579125/?ar">https://learning.oreilly.com/library/view/~/9789332579125/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9789332579125/?ar">https://go.oreilly.com/library-access/library/view/-/9789332579125/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9789332579125">https://learning.oreilly.com/library/view/~/9789332579125</a><br/>Format: Electronic Resources<br/>Information security risk assessment toolkit : practical assessments through data collection and data analysisent://SD_ILS/0/SD_ILS:22985192024-06-21T14:12:48Z2024-06-21T14:12:48Zby Talabis, Mark Ryan M.<br/><a href="https://learning.oreilly.com/library/view/~/9781597497350/?ar">https://learning.oreilly.com/library/view/~/9781597497350/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597497350/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497350/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497350">https://learning.oreilly.com/library/view/~/9781597497350</a><br/>Format: Electronic Resources<br/>The craft of system securityent://SD_ILS/0/SD_ILS:22840582024-06-21T14:12:48Z2024-06-21T14:12:48Zby Smith, Sean W., 1964-<br/><a href="https://learning.oreilly.com/library/view/~/9780321434838">https://learning.oreilly.com/library/view/~/9780321434838</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321434838/?ar">https://go.oreilly.com/library-access/library/view/-/9780321434838/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321434838/?ar">https://learning.oreilly.com/library/view/~/9780321434838/?ar</a><br/>Format: Electronic Resources<br/>Securing Windows server 2008 : prevent attacks from outside and inside your organization.ent://SD_ILS/0/SD_ILS:22851412024-06-21T14:12:48Z2024-06-21T14:12:48Z<a href="https://learning.oreilly.com/library/view/~/9781597492805">https://learning.oreilly.com/library/view/~/9781597492805</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492805/?ar">https://learning.oreilly.com/library/view/~/9781597492805/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492805/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492805/?ar</a><br/>Format: Electronic Resources<br/>Linux annoyances for geeksent://SD_ILS/0/SD_ILS:22821662024-06-21T14:12:48Z2024-06-21T14:12:48Zby Jang, Michael H.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596008015/?ar">https://go.oreilly.com/library-access/library/view/-/0596008015/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008015/?ar">https://learning.oreilly.com/library/view/~/0596008015/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008015">https://learning.oreilly.com/library/view/~/0596008015</a><br/>Format: Electronic Resources<br/>A bug hunter's diary : a guided tour through the wilds of software securityent://SD_ILS/0/SD_ILS:22939462024-06-21T14:12:48Z2024-06-21T14:12:48Zby Klein, Tobias.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781593273859/?ar">https://go.oreilly.com/library-access/library/view/-/9781593273859/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781593273859/?ar">https://learning.oreilly.com/library/view/~/9781593273859/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781593273859">https://learning.oreilly.com/library/view/~/9781593273859</a><br/>Format: Electronic Resources<br/>Secure programming with static analysisent://SD_ILS/0/SD_ILS:22834482024-06-21T14:12:48Z2024-06-21T14:12:48Zby Chess, Brian.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321424778/?ar">https://go.oreilly.com/library-access/library/view/-/9780321424778/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321424778/?ar">https://learning.oreilly.com/library/view/~/9780321424778/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321424778">https://learning.oreilly.com/library/view/~/9780321424778</a><br/>Format: Electronic Resources<br/>Computer-Forensik : Computerstraftaten erkennen, ermitteln, aufklärenent://SD_ILS/0/SD_ILS:22978602024-06-21T14:12:48Z2024-06-21T14:12:48Zby Geschonneck, Alexander.<br/><a href="https://learning.oreilly.com/library/view/~/9781457170676/?ar">https://learning.oreilly.com/library/view/~/9781457170676/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781457170676/?ar">https://go.oreilly.com/library-access/library/view/-/9781457170676/?ar</a><br/>Format: Electronic Resources<br/>Cyber security engineering : a practical approach for systems and software assuranceent://SD_ILS/0/SD_ILS:23119962024-06-21T14:12:48Z2024-06-21T14:12:48Zby Mead, Nancy R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134189857/?ar">https://go.oreilly.com/library-access/library/view/-/9780134189857/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134189857/?ar">https://learning.oreilly.com/library/view/~/9780134189857/?ar</a><br/>Format: Electronic Resources<br/>Windows forensics cookbook : 61 recipes to help you analyze Windows systemsent://SD_ILS/0/SD_ILS:23139902024-06-21T14:12:48Z2024-06-21T14:12:48Zby Sulkin, Oleg, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784390495/?ar">https://go.oreilly.com/library-access/library/view/-/9781784390495/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781784390495/?ar">https://learning.oreilly.com/library/view/~/9781784390495/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781784390495">https://learning.oreilly.com/library/view/~/9781784390495</a><br/>Format: Electronic Resources<br/>Malware forensics field guide for Windows systems : digital forensics field guidesent://SD_ILS/0/SD_ILS:22946822024-06-21T14:12:48Z2024-06-21T14:12:48Zby Malin, Cameron H.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494724/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494724/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494724/?ar">https://learning.oreilly.com/library/view/~/9781597494724/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494724">https://learning.oreilly.com/library/view/~/9781597494724</a><br/>Format: Electronic Resources<br/>IBM z/OS mainframe security and audit management using the IBM Security zSecure Suiteent://SD_ILS/0/SD_ILS:23019392024-06-21T14:12:48Z2024-06-21T14:12:48Zby Bücker, Axel.<br/><a href="https://learning.oreilly.com/library/view/~/0738435880/?ar">https://learning.oreilly.com/library/view/~/0738435880/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738435880/?ar">https://go.oreilly.com/library-access/library/view/-/0738435880/?ar</a><br/>Format: Electronic Resources<br/>How to cheat at securing your networkent://SD_ILS/0/SD_ILS:22846302024-06-21T14:12:48Z2024-06-21T14:12:48Zby Dubrawsky, Ido.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492317/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492317/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492317/?ar">https://learning.oreilly.com/library/view/~/9781597492317/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492317">https://learning.oreilly.com/library/view/~/9781597492317</a><br/>Format: Electronic Resources<br/>Maximum Linux security : a hacker's guide to protecting your Linux server and workstationent://SD_ILS/0/SD_ILS:22811372024-06-21T14:12:48Z2024-06-21T14:12:48Z<a href="https://learning.oreilly.com/library/view/~/0672316706/?ar">https://learning.oreilly.com/library/view/~/0672316706/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0672316706/?ar">https://go.oreilly.com/library-access/library/view/-/0672316706/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672316706">https://learning.oreilly.com/library/view/~/0672316706</a><br/>Format: Electronic Resources<br/>Getting Started with z/OS Data Set Encryptionent://SD_ILS/0/SD_ILS:23312522024-06-21T14:12:48Z2024-06-21T14:12:48Zby White, Bill, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460222/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460222/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460222">https://learning.oreilly.com/library/view/~/9780738460222</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460222/?ar">https://learning.oreilly.com/library/view/~/9780738460222/?ar</a><br/>Format: Electronic Resources<br/>Microsoft Azure security centerent://SD_ILS/0/SD_ILS:23220532024-06-21T14:12:48Z2024-06-21T14:12:48Zby Diogenes, Yuri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar">https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135752050/?ar">https://learning.oreilly.com/library/view/~/9780135752050/?ar</a><br/>Format: Electronic Resources<br/>The definitive guide to security in Jakarta EE : securing Java-based enterprise applications with Jakarta security, authorization, authentication and moreent://SD_ILS/0/SD_ILS:23326302024-06-21T14:12:48Z2024-06-21T14:12:48Zby Tijms, Arjan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484279458/?ar">https://learning.oreilly.com/library/view/~/9781484279458/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484279458">https://learning.oreilly.com/library/view/~/9781484279458</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484279458/?ar">https://go.oreilly.com/library-access/library/view/-/9781484279458/?ar</a><br/>Format: Electronic Resources<br/>Expert Oracle application express securityent://SD_ILS/0/SD_ILS:22990642024-06-21T14:12:48Z2024-06-21T14:12:48Zby Spendolini, Scott.<br/><a href="https://learning.oreilly.com/library/view/~/9781430247319/?ar">https://learning.oreilly.com/library/view/~/9781430247319/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430247319/?ar">https://go.oreilly.com/library-access/library/view/-/9781430247319/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430247319">https://learning.oreilly.com/library/view/~/9781430247319</a><br/>Format: Electronic Resources<br/>Vulnerability managementent://SD_ILS/0/SD_ILS:22938422024-06-21T14:12:48Z2024-06-21T14:12:48Zby Foreman, Park.<br/><a href="https://learning.oreilly.com/library/view/~/9781439801512">https://learning.oreilly.com/library/view/~/9781439801512</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439801512/?ar">https://go.oreilly.com/library-access/library/view/-/9781439801512/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439801512/?ar">https://learning.oreilly.com/library/view/~/9781439801512/?ar</a><br/>Format: Electronic Resources<br/>Computer security fundamentalsent://SD_ILS/0/SD_ILS:23109912024-06-21T14:12:48Z2024-06-21T14:12:48Zby Easttom, Chuck, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134470627/?ar">https://go.oreilly.com/library-access/library/view/-/9780134470627/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134470627/?ar">https://learning.oreilly.com/library/view/~/9780134470627/?ar</a><br/>Format: Electronic Resources<br/>Incident response techniques for ransomware attacks : understand modern ransomware attacks and build an incident response strategy to work through thement://SD_ILS/0/SD_ILS:23324112024-06-21T14:12:48Z2024-06-21T14:12:48Zby Skulkin, Oleg.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803240442/?ar">https://go.oreilly.com/library-access/library/view/-/9781803240442/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803240442/?ar">https://learning.oreilly.com/library/view/~/9781803240442/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803240442">https://learning.oreilly.com/library/view/~/9781803240442</a><br/>Format: Electronic Resources<br/>Malware data science : attack detection and attributionent://SD_ILS/0/SD_ILS:23173882024-06-21T14:12:48Z2024-06-21T14:12:48Zby Saxe, Joshua, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492067672">https://learning.oreilly.com/library/view/~/9781492067672</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492067672/?ar">https://go.oreilly.com/library-access/library/view/-/9781492067672/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492067672/?ar">https://learning.oreilly.com/library/view/~/9781492067672/?ar</a><br/>Format: Electronic Resources<br/>Anomaly detection for monitoring : a statistical approach to time series anomaly detectionent://SD_ILS/0/SD_ILS:23169072024-06-21T14:12:48Z2024-06-21T14:12:48Zby Jinka, Preetam, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492042341/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042341/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492042341">https://learning.oreilly.com/library/view/~/9781492042341</a>
<a href="https://learning.oreilly.com/library/view/~/9781492042341/?ar">https://learning.oreilly.com/library/view/~/9781492042341/?ar</a><br/>Format: Electronic Resources<br/>Microsoft windows security resource kitent://SD_ILS/0/SD_ILS:22828202024-06-21T14:12:48Z2024-06-21T14:12:48Zby Smith, Ben, 1975-<br/><a href="https://learning.oreilly.com/library/view/~/9780735621749">https://learning.oreilly.com/library/view/~/9780735621749</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780735621749/?ar">https://go.oreilly.com/library-access/library/view/-/9780735621749/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780735621749/?ar">https://learning.oreilly.com/library/view/~/9780735621749/?ar</a><br/>Format: Electronic Resources<br/>Googling security : how much does Google know about you?ent://SD_ILS/0/SD_ILS:22853502024-06-21T14:12:48Z2024-06-21T14:12:48Zby Conti, Greg.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321591265/?ar">https://go.oreilly.com/library-access/library/view/-/9780321591265/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321591265/?ar">https://learning.oreilly.com/library/view/~/9780321591265/?ar</a><br/>Format: Electronic Resources<br/>Practical intrusion analysis : prevention and detection for the twenty-first centuryent://SD_ILS/0/SD_ILS:22860802024-06-21T14:12:48Z2024-06-21T14:12:48Zby Trost, Ryan.<br/><a href="https://learning.oreilly.com/library/view/~/9780321591890/?ar">https://learning.oreilly.com/library/view/~/9780321591890/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321591890/?ar">https://go.oreilly.com/library-access/library/view/-/9780321591890/?ar</a><br/>Format: Electronic Resources<br/>Cisco DCUCI quick referenceent://SD_ILS/0/SD_ILS:22898582024-06-21T14:12:48Z2024-06-21T14:12:48Zby Casaletto, James.<br/><a href="https://learning.oreilly.com/library/view/~/9781587141881/?ar">https://learning.oreilly.com/library/view/~/9781587141881/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781587141881/?ar">https://go.oreilly.com/library-access/library/view/-/9781587141881/?ar</a><br/>Format: Electronic Resources<br/>Incident response primer : how to keep from getting pwned too hardent://SD_ILS/0/SD_ILS:23233162024-06-21T14:12:48Z2024-06-21T14:12:48Zby Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492073659/?ar">https://learning.oreilly.com/library/view/~/9781492073659/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar">https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492073659">https://learning.oreilly.com/library/view/~/9781492073659</a><br/>Format: Electronic Resources<br/>Jissen bash ni yoru saibā sekyuriti taisaku : sekyuriti gijutsusha no tame no sheru sukuriputo katsuyōjutsuent://SD_ILS/0/SD_ILS:23326572024-06-21T14:12:48Z2024-06-21T14:12:48Zby Troncone, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9784873119052/?ar">https://learning.oreilly.com/library/view/~/9784873119052/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9784873119052/?ar">https://go.oreilly.com/library-access/library/view/-/9784873119052/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9784873119052">https://learning.oreilly.com/library/view/~/9784873119052</a><br/>Format: Electronic Resources<br/>Pro ASP.NET web API security : securing ASP.NET web APIent://SD_ILS/0/SD_ILS:22986142024-06-21T14:12:48Z2024-06-21T14:12:48Zby Lakshmiraghavan, Badrinarayanan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781430257820/?ar">https://go.oreilly.com/library-access/library/view/-/9781430257820/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430257820/?ar">https://learning.oreilly.com/library/view/~/9781430257820/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430257820">https://learning.oreilly.com/library/view/~/9781430257820</a><br/>Format: Electronic Resources<br/>Check Point VPN-1/FireWall-1 on AIX : a cookbook for stand-alone and high availability solutionsent://SD_ILS/0/SD_ILS:23024892024-06-21T14:12:48Z2024-06-21T14:12:48Zby Bücker, Axel.<br/><a href="https://learning.oreilly.com/library/view/~/0738421014">https://learning.oreilly.com/library/view/~/0738421014</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738421014/?ar">https://go.oreilly.com/library-access/library/view/-/0738421014/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738421014/?ar">https://learning.oreilly.com/library/view/~/0738421014/?ar</a><br/>Format: Electronic Resources<br/>Mastering the Nmap scripting engine : master the Nmap scripting engine and the art of developing NSE scriptsent://SD_ILS/0/SD_ILS:23066302024-06-21T14:12:48Z2024-06-21T14:12:48Zby Pale, Paulino Calderon, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781782168317/?ar">https://learning.oreilly.com/library/view/~/9781782168317/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781782168317/?ar">https://go.oreilly.com/library-access/library/view/-/9781782168317/?ar</a><br/>Format: Electronic Resources<br/>Identity and access management : business performance through connected intelligenceent://SD_ILS/0/SD_ILS:23019312024-06-21T14:12:48Z2024-06-21T14:12:48Zby Osmanoglu, T. Ertem.<br/><a href="https://learning.oreilly.com/library/view/~/9780124081406/?ar">https://learning.oreilly.com/library/view/~/9780124081406/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124081406">https://learning.oreilly.com/library/view/~/9780124081406</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124081406/?ar">https://go.oreilly.com/library-access/library/view/-/9780124081406/?ar</a><br/>Format: Electronic Resources<br/>Ajax securityent://SD_ILS/0/SD_ILS:22843352024-06-21T14:12:48Z2024-06-21T14:12:48Zby Hoffman, Billy, 1980-<br/><a href="https://learning.oreilly.com/library/view/~/9780321491930">https://learning.oreilly.com/library/view/~/9780321491930</a>
<a href="https://learning.oreilly.com/library/view/~/9780321491930/?ar">https://learning.oreilly.com/library/view/~/9780321491930/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321491930/?ar">https://go.oreilly.com/library-access/library/view/-/9780321491930/?ar</a><br/>Format: Electronic Resources<br/>Absolute beginner's guide to security, spam, spyware and virusesent://SD_ILS/0/SD_ILS:22820882024-06-21T14:12:48Z2024-06-21T14:12:48Zby Walker, Andy.<br/><a href="https://learning.oreilly.com/library/view/~/0789734591">https://learning.oreilly.com/library/view/~/0789734591</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0789734591/?ar">https://go.oreilly.com/library-access/library/view/-/0789734591/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0789734591/?ar">https://learning.oreilly.com/library/view/~/0789734591/?ar</a><br/>Format: Electronic Resources<br/>Microsoft Azure security centerent://SD_ILS/0/SD_ILS:23167782024-06-21T14:12:48Z2024-06-21T14:12:48Zby Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781509307081/?ar">https://learning.oreilly.com/library/view/~/9781509307081/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781509307081/?ar">https://go.oreilly.com/library-access/library/view/-/9781509307081/?ar</a><br/>Format: Electronic Resources<br/>Nine steps to success : an ISO 27001 implementation overviewent://SD_ILS/0/SD_ILS:22897432024-06-21T14:12:48Z2024-06-21T14:12:48Zby Calder, Alan, 1957-<br/><a href="https://learning.oreilly.com/library/view/~/9781905356126/?ar">https://learning.oreilly.com/library/view/~/9781905356126/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781905356126/?ar">https://go.oreilly.com/library-access/library/view/-/9781905356126/?ar</a><br/>Format: Electronic Resources<br/>Security testing handbook for banking applicationsent://SD_ILS/0/SD_ILS:23105612024-06-21T14:12:48Z2024-06-21T14:12:48Zby Doraiswamy, Arvind, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281089/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281089/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281089/?ar">https://learning.oreilly.com/library/view/~/9781849281089/?ar</a><br/>Format: Electronic Resources<br/>Cyber resiliency solution for IBM Spectrum Scaleent://SD_ILS/0/SD_ILS:23221452024-06-21T14:12:48Z2024-06-21T14:12:48Zby IBM Storage Team, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457963/?ar">https://learning.oreilly.com/library/view/~/9780738457963/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738457963/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457963/?ar</a><br/>Format: Electronic Resources<br/>Practical reverse engineering : x86, x64, ARM, Windows Kernel, reversing tools, and obfuscationent://SD_ILS/0/SD_ILS:23026252024-06-21T14:12:48Z2024-06-21T14:12:48Zby Dang, Bruce, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118787397/?ar">https://learning.oreilly.com/library/view/~/9781118787397/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118787397/?ar">https://go.oreilly.com/library-access/library/view/-/9781118787397/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118787397">https://learning.oreilly.com/library/view/~/9781118787397</a><br/>Format: Electronic Resources<br/>VMware vSphere and virtual infrastructure security : securing the virtual environmentent://SD_ILS/0/SD_ILS:22880492024-06-21T14:12:48Z2024-06-21T14:12:48Zby Haletky, Edward.<br/><a href="https://learning.oreilly.com/library/view/~/9780136083214/?ar">https://learning.oreilly.com/library/view/~/9780136083214/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780136083214/?ar">https://go.oreilly.com/library-access/library/view/-/9780136083214/?ar</a><br/>Format: Electronic Resources<br/>Cyber resilient infrastructure : detect, protect, and mitigate threats against Brocade SAN FOS with IBM QRadarent://SD_ILS/0/SD_ILS:23320572024-06-21T14:12:48Z2024-06-21T14:12:48Zby IBM Storage Team, issuing body.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460260/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460260/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460260/?ar">https://learning.oreilly.com/library/view/~/9780738460260/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460260">https://learning.oreilly.com/library/view/~/9780738460260</a><br/>Format: Electronic Resources<br/>CEH Certified Ethical Hacker Cert guideent://SD_ILS/0/SD_ILS:23316212024-06-21T14:12:48Z2024-06-21T14:12:48Zby Gregg, Michael (Michael C.), author.<br/><a href="https://learning.oreilly.com/library/view/~/9780137489930/?ar">https://learning.oreilly.com/library/view/~/9780137489930/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137489930/?ar">https://go.oreilly.com/library-access/library/view/-/9780137489930/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780137489930">https://learning.oreilly.com/library/view/~/9780137489930</a><br/>Format: Electronic Resources<br/>Cybersecurity for hospitals and healthcare facilities : a guide to detection and preventionent://SD_ILS/0/SD_ILS:23116102024-06-21T14:12:48Z2024-06-21T14:12:48Zby Ayala, Luis, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484221556/?ar">https://go.oreilly.com/library-access/library/view/-/9781484221556/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484221556/?ar">https://learning.oreilly.com/library/view/~/9781484221556/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484221556">https://learning.oreilly.com/library/view/~/9781484221556</a><br/>Format: Electronic Resources<br/>The state of the art in intrusion prevention and detectionent://SD_ILS/0/SD_ILS:23022342024-06-21T14:12:48Z2024-06-21T14:12:48Zby Pathan, Al-Sakib Khan, editor, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482203523">https://learning.oreilly.com/library/view/~/9781482203523</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781482203523/?ar">https://go.oreilly.com/library-access/library/view/-/9781482203523/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781482203523/?ar">https://learning.oreilly.com/library/view/~/9781482203523/?ar</a><br/>Format: Electronic Resources<br/>SOA securityent://SD_ILS/0/SD_ILS:22849362024-06-21T14:12:48Z2024-06-21T14:12:48Zby Kanneganti, Ramarao.<br/><a href="https://learning.oreilly.com/library/view/~/9781932394689">https://learning.oreilly.com/library/view/~/9781932394689</a>
<a href="https://learning.oreilly.com/library/view/~/9781932394689/?ar">https://learning.oreilly.com/library/view/~/9781932394689/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781932394689/?ar">https://go.oreilly.com/library-access/library/view/-/9781932394689/?ar</a><br/>Format: Electronic Resources<br/>OSSEC host-based intrusion detection guideent://SD_ILS/0/SD_ILS:22851402024-06-21T14:12:48Z2024-06-21T14:12:48Zby Hay, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492409">https://learning.oreilly.com/library/view/~/9781597492409</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492409/?ar">https://learning.oreilly.com/library/view/~/9781597492409/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492409/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492409/?ar</a><br/>Format: Electronic Resources<br/>Secure coding in C and C++ent://SD_ILS/0/SD_ILS:22846512024-06-21T14:12:48Z2024-06-21T14:12:48Zby Seacord, Robert C.<br/><a href="https://learning.oreilly.com/library/view/~/9780768685923/?ar">https://learning.oreilly.com/library/view/~/9780768685923/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780768685923/?ar">https://go.oreilly.com/library-access/library/view/-/9780768685923/?ar</a><br/>Format: Electronic Resources<br/>Network scanning cookbook : practical network security using Nmap and Nessus 7ent://SD_ILS/0/SD_ILS:23177762024-06-21T14:12:48Z2024-06-21T14:12:48Zby Sairam, Jetty, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar">https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789346480/?ar">https://learning.oreilly.com/library/view/~/9781789346480/?ar</a><br/>Format: Electronic Resources<br/>Collaboration with cloud computing : security, social media, and unified communicationsent://SD_ILS/0/SD_ILS:23031052024-06-21T14:12:48Z2024-06-21T14:12:48Zby Messier, Ric.<br/><a href="https://learning.oreilly.com/library/view/~/9780124170407/?ar">https://learning.oreilly.com/library/view/~/9780124170407/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124170407/?ar">https://go.oreilly.com/library-access/library/view/-/9780124170407/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity for dummiesent://SD_ILS/0/SD_ILS:23227472024-06-21T14:12:48Z2024-06-21T14:12:48Zby Steinberg, Joseph (Cybersecurity expert), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781494542450">https://learning.oreilly.com/library/view/~/9781494542450</a>
<a href="https://learning.oreilly.com/library/view/~/9781494542450/?ar">https://learning.oreilly.com/library/view/~/9781494542450/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781494542450/?ar">https://go.oreilly.com/library-access/library/view/-/9781494542450/?ar</a><br/>Format: Electronic Resources<br/>Managing risk and information security : protect to enableent://SD_ILS/0/SD_ILS:22973262024-06-21T14:12:48Z2024-06-21T14:12:48Zby Harkins, Malcolm.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781430251132/?ar">https://go.oreilly.com/library-access/library/view/-/9781430251132/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430251132">https://learning.oreilly.com/library/view/~/9781430251132</a>
<a href="https://learning.oreilly.com/library/view/~/9781430251132/?ar">https://learning.oreilly.com/library/view/~/9781430251132/?ar</a><br/>Format: Electronic Resources<br/>Endpoint security and compliance management design guide : using IBM Tivoli Endpoint Managerent://SD_ILS/0/SD_ILS:22975122024-06-21T14:12:48Z2024-06-21T14:12:48Zby Bücker, Axel.<br/><a href="https://learning.oreilly.com/library/view/~/0738436984">https://learning.oreilly.com/library/view/~/0738436984</a>
<a href="https://learning.oreilly.com/library/view/~/0738436984/?ar">https://learning.oreilly.com/library/view/~/0738436984/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738436984/?ar">https://go.oreilly.com/library-access/library/view/-/0738436984/?ar</a><br/>Format: Electronic Resources<br/>The CISO evolution : business knowledge for cybersecurity executivesent://SD_ILS/0/SD_ILS:23301022024-06-21T14:12:48Z2024-06-21T14:12:48Zby Sharp, Matthew K., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119782483/?ar">https://go.oreilly.com/library-access/library/view/-/9781119782483/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119782483/?ar">https://learning.oreilly.com/library/view/~/9781119782483/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119782483">https://learning.oreilly.com/library/view/~/9781119782483</a><br/>Format: Electronic Resources<br/>Digital resilience : is your company ready for the next cyber threat?ent://SD_ILS/0/SD_ILS:23147342024-06-21T14:12:48Z2024-06-21T14:12:48Zby Rothrock, Ray A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780814439258">https://learning.oreilly.com/library/view/~/9780814439258</a>
<a href="https://learning.oreilly.com/library/view/~/9780814439258/?ar">https://learning.oreilly.com/library/view/~/9780814439258/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780814439258/?ar">https://go.oreilly.com/library-access/library/view/-/9780814439258/?ar</a><br/>Format: Electronic Resources<br/>Opportunities and challenges in the IoT : a conversation with Tim O'Reilly and Cory Doctorowent://SD_ILS/0/SD_ILS:23183842024-06-21T14:12:48Z2024-06-21T14:12:48Zby O'Reilly, Tim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492048220/?ar">https://learning.oreilly.com/library/view/~/9781492048220/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492048220">https://learning.oreilly.com/library/view/~/9781492048220</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492048220/?ar">https://go.oreilly.com/library-access/library/view/-/9781492048220/?ar</a><br/>Format: Electronic Resources<br/>Microsoft forefront security administration guideent://SD_ILS/0/SD_ILS:22845172024-06-21T14:12:48Z2024-06-21T14:12:48Zby Varsalone, Jesse.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492447">https://learning.oreilly.com/library/view/~/9781597492447</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492447/?ar">https://learning.oreilly.com/library/view/~/9781597492447/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492447/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492447/?ar</a><br/>Format: Electronic Resources<br/>Malware forensics : investigating and analyzing malicious codeent://SD_ILS/0/SD_ILS:22856932024-06-21T14:12:48Z2024-06-21T14:12:48Zby Aquilina, James M.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492683/?ar">https://learning.oreilly.com/library/view/~/9781597492683/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492683/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492683/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492683">https://learning.oreilly.com/library/view/~/9781597492683</a><br/>Format: Electronic Resources<br/>Computer forensics : incident response essentialsent://SD_ILS/0/SD_ILS:22884472024-06-21T14:12:48Z2024-06-21T14:12:48Zby Kruse, Warren G.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780672333989/?ar">https://go.oreilly.com/library-access/library/view/-/9780672333989/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780672333989/?ar">https://learning.oreilly.com/library/view/~/9780672333989/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780672333989">https://learning.oreilly.com/library/view/~/9780672333989</a><br/>Format: Electronic Resources<br/>Are your bits flipped? : overcoming tech misconceptionsent://SD_ILS/0/SD_ILS:23105992024-06-21T14:12:48Z2024-06-21T14:12:48Zby Kissell, Joe, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492017172/?ar">https://go.oreilly.com/library-access/library/view/-/9781492017172/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492017172/?ar">https://learning.oreilly.com/library/view/~/9781492017172/?ar</a><br/>Format: Electronic Resources<br/>Dissecting the hack : the V3rb0ten networkent://SD_ILS/0/SD_ILS:23092962024-06-21T14:12:48Z2024-06-21T14:12:48Zby Street, Jayson E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128042823/?ar">https://learning.oreilly.com/library/view/~/9780128042823/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar">https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar</a><br/>Format: Electronic Resources<br/>The security data lake : leveraging big data technologies to build a common data repository for securityent://SD_ILS/0/SD_ILS:23183502024-06-21T14:12:48Z2024-06-21T14:12:48Zby Marty, Raffael, 1976- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491927748/?ar">https://learning.oreilly.com/library/view/~/9781491927748/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491927748/?ar">https://go.oreilly.com/library-access/library/view/-/9781491927748/?ar</a><br/>Format: Electronic Resources<br/>Cloud Computing Security, 2nd Editionent://SD_ILS/0/SD_ILS:23311012024-06-21T14:12:48Z2024-06-21T14:12:48Zby Vacca, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780429619649">https://learning.oreilly.com/library/view/~/9780429619649</a>
<a href="https://learning.oreilly.com/library/view/~/9780429619649/?ar">https://learning.oreilly.com/library/view/~/9780429619649/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar">https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar</a><br/>Format: Electronic Resources<br/>Getting Started with Ghidraent://SD_ILS/0/SD_ILS:23226052024-06-21T14:12:48Z2024-06-21T14:12:48Zby Messier, Ric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098115265/?ar">https://go.oreilly.com/library-access/library/view/-/9781098115265/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098115265/?ar">https://learning.oreilly.com/library/view/~/9781098115265/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098115265">https://learning.oreilly.com/library/view/~/9781098115265</a><br/>Format: Electronic Resources<br/>The Complete Guide to Cybersecurity Risks and Controlsent://SD_ILS/0/SD_ILS:23245242024-06-21T14:12:48Z2024-06-21T14:12:48Zby Kohnke, Anne, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781498740579/?ar">https://go.oreilly.com/library-access/library/view/-/9781498740579/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781498740579/?ar">https://learning.oreilly.com/library/view/~/9781498740579/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781498740579">https://learning.oreilly.com/library/view/~/9781498740579</a><br/>Format: Electronic Resources<br/>Secure coding in C and C++ent://SD_ILS/0/SD_ILS:22992232024-06-21T14:12:48Z2024-06-21T14:12:48Zby Seacord, Robert C.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132981989/?ar">https://go.oreilly.com/library-access/library/view/-/9780132981989/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132981989/?ar">https://learning.oreilly.com/library/view/~/9780132981989/?ar</a><br/>Format: Electronic Resources<br/>Deployment guide series. IBM Tivoli Identity Manager 5.0ent://SD_ILS/0/SD_ILS:22858442024-06-21T14:12:48Z2024-06-21T14:12:48Zby Bücker, Axel.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738432067/?ar">https://go.oreilly.com/library-access/library/view/-/0738432067/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738432067/?ar">https://learning.oreilly.com/library/view/~/0738432067/?ar</a><br/>Format: Electronic Resources<br/>Secure XML : the New Syntax for Signatures and Encryption.ent://SD_ILS/0/SD_ILS:22904912024-06-21T14:12:48Z2024-06-21T14:12:48Zby Niles, Kitty, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0201756056/?ar">https://go.oreilly.com/library-access/library/view/-/0201756056/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0201756056">https://learning.oreilly.com/library/view/~/0201756056</a>
<a href="https://learning.oreilly.com/library/view/~/0201756056/?ar">https://learning.oreilly.com/library/view/~/0201756056/?ar</a><br/>Format: Electronic Resources<br/>Data analytics for IT networks : developing innovative use casesent://SD_ILS/0/SD_ILS:23175592024-06-21T14:12:48Z2024-06-21T14:12:48Zby Garrett, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135183496/?ar">https://learning.oreilly.com/library/view/~/9780135183496/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar">https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar</a><br/>Format: Electronic Resources<br/>Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviorsent://SD_ILS/0/SD_ILS:23195342024-06-21T14:12:48Z2024-06-21T14:12:48Zby Carpenter, Perry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119566342">https://learning.oreilly.com/library/view/~/9781119566342</a>
<a href="https://learning.oreilly.com/library/view/~/9781119566342/?ar">https://learning.oreilly.com/library/view/~/9781119566342/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119566342/?ar">https://go.oreilly.com/library-access/library/view/-/9781119566342/?ar</a><br/>Format: Electronic Resources<br/>Practical Windows forensics : leverage the power of digital forensics for Windows systemsent://SD_ILS/0/SD_ILS:23110212024-06-21T14:12:48Z2024-06-21T14:12:48Zby Shaaban, Ayman, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781783554096">https://learning.oreilly.com/library/view/~/9781783554096</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781783554096/?ar">https://go.oreilly.com/library-access/library/view/-/9781783554096/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781783554096/?ar">https://learning.oreilly.com/library/view/~/9781783554096/?ar</a><br/>Format: Electronic Resources<br/>IOS an quan fang hu = Hacking and securing iOS applicationsent://SD_ILS/0/SD_ILS:23318112024-06-21T14:12:48Z2024-06-21T14:12:48Zby Zdziarski, Jonathan A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9789862766484">https://learning.oreilly.com/library/view/~/9789862766484</a>
<a href="https://learning.oreilly.com/library/view/~/9789862766484/?ar">https://learning.oreilly.com/library/view/~/9789862766484/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9789862766484/?ar">https://go.oreilly.com/library-access/library/view/-/9789862766484/?ar</a><br/>Format: Electronic Resources<br/>Securing SQL server : protecting your database from attackersent://SD_ILS/0/SD_ILS:22909912024-06-21T14:12:48Z2024-06-21T14:12:48Zby Cherry, Denny.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496254">https://learning.oreilly.com/library/view/~/9781597496254</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496254/?ar">https://learning.oreilly.com/library/view/~/9781597496254/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597496254/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496254/?ar</a><br/>Format: Electronic Resources<br/>Adaptive Security Management Architectureent://SD_ILS/0/SD_ILS:23260642024-06-21T14:12:48Z2024-06-21T14:12:48Zby Tiller, James S.<br/><a href="https://learning.oreilly.com/library/view/~/9781420013375">https://learning.oreilly.com/library/view/~/9781420013375</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781420013375/?ar">https://go.oreilly.com/library-access/library/view/-/9781420013375/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420013375/?ar">https://learning.oreilly.com/library/view/~/9781420013375/?ar</a><br/>Format: Electronic Resources<br/>People-centric security : transforming your enterprise security cultureent://SD_ILS/0/SD_ILS:23095172024-06-21T14:12:48Z2024-06-21T14:12:48Zby Hayden, Lance, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071846790/?ar">https://learning.oreilly.com/library/view/~/9780071846790/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071846790/?ar">https://go.oreilly.com/library-access/library/view/-/9780071846790/?ar</a><br/>Format: Electronic Resources<br/>The art of intrusion the real stories behind the exploits of hackers, intruders & deceiversent://SD_ILS/0/SD_ILS:3347082024-06-21T14:12:48Z2024-06-21T14:12:48Zby Mitnick, Kevin D. (Kevin David), 1963-<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=127892">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=127892</a><br/>Format: Electronic Resources<br/>Introduction to Cryptography with Open-Source Software.ent://SD_ILS/0/SD_ILS:23070162024-06-21T14:12:48Z2024-06-21T14:12:48Zby McAndrew, Alasdair.<br/><a href="https://learning.oreilly.com/library/view/~/9781439825716">https://learning.oreilly.com/library/view/~/9781439825716</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439825716/?ar">https://go.oreilly.com/library-access/library/view/-/9781439825716/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439825716/?ar">https://learning.oreilly.com/library/view/~/9781439825716/?ar</a><br/>Format: Electronic Resources<br/>Incident response & computer forensicsent://SD_ILS/0/SD_ILS:22809582024-06-21T14:12:48Z2024-06-21T14:12:48Zby Prosise, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/9780072226966">https://learning.oreilly.com/library/view/~/9780072226966</a>
<a href="https://learning.oreilly.com/library/view/~/9780072226966/?ar">https://learning.oreilly.com/library/view/~/9780072226966/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780072226966/?ar">https://go.oreilly.com/library-access/library/view/-/9780072226966/?ar</a><br/>Format: Electronic Resources<br/>Java securityent://SD_ILS/0/SD_ILS:22806032024-06-21T14:12:48Z2024-06-21T14:12:48Zby Oaks, Scott.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1565924037/?ar">https://go.oreilly.com/library-access/library/view/-/1565924037/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1565924037">https://learning.oreilly.com/library/view/~/1565924037</a>
<a href="https://learning.oreilly.com/library/view/~/1565924037/?ar">https://learning.oreilly.com/library/view/~/1565924037/?ar</a><br/>Format: Electronic Resources<br/>Windows forensic analysis toolkit : advanced analysis techniques for Windows 8ent://SD_ILS/0/SD_ILS:23025922024-06-21T14:12:48Z2024-06-21T14:12:48Zby Carvey, Harlan A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780124171572/?ar">https://learning.oreilly.com/library/view/~/9780124171572/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124171572/?ar">https://go.oreilly.com/library-access/library/view/-/9780124171572/?ar</a><br/>Format: Electronic Resources<br/>Managing information security breaches : studies from real lifeent://SD_ILS/0/SD_ILS:23088362024-06-21T14:12:48Z2024-06-21T14:12:48Zby Krausz, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849285964/?ar">https://learning.oreilly.com/library/view/~/9781849285964/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849285964/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285964/?ar</a><br/>Format: Electronic Resources<br/>SQL injection attacks and defenseent://SD_ILS/0/SD_ILS:22953692024-06-21T14:12:48Z2024-06-21T14:12:48Zby Clarke, Justin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499637/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499637/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499637/?ar">https://learning.oreilly.com/library/view/~/9781597499637/?ar</a><br/>Format: Electronic Resources<br/>Managing catastrophic loss of sensitive dataent://SD_ILS/0/SD_ILS:22846902024-06-21T14:12:48Z2024-06-21T14:12:48Zby Photopoulos, Constantine.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492393/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492393/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492393/?ar">https://learning.oreilly.com/library/view/~/9781597492393/?ar</a><br/>Format: Electronic Resources<br/>Incident management for operationsent://SD_ILS/0/SD_ILS:23135452024-06-21T14:12:48Z2024-06-21T14:12:48Zby Schnepp, Rob, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491917619/?ar">https://learning.oreilly.com/library/view/~/9781491917619/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491917619/?ar">https://go.oreilly.com/library-access/library/view/-/9781491917619/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491917619">https://learning.oreilly.com/library/view/~/9781491917619</a><br/>Format: Electronic Resources<br/>Practical embedded security : building secure resource-constrained systemsent://SD_ILS/0/SD_ILS:22845232024-06-21T14:12:48Z2024-06-21T14:12:48Zby Stapko, Timothy John.<br/><a href="https://learning.oreilly.com/library/view/~/9780750682152/?ar">https://learning.oreilly.com/library/view/~/9780750682152/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780750682152/?ar">https://go.oreilly.com/library-access/library/view/-/9780750682152/?ar</a><br/>Format: Electronic Resources<br/>Data breaches : crisis and opportunityent://SD_ILS/0/SD_ILS:23222222024-06-21T14:12:48Z2024-06-21T14:12:48Zby Davidoff, Sherri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135964255/?ar">https://go.oreilly.com/library-access/library/view/-/9780135964255/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135964255/?ar">https://learning.oreilly.com/library/view/~/9780135964255/?ar</a><br/>Format: Electronic Resources<br/>