Search Results for Syngress.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qu$003dSyngress.$0026ps$003d300?2024-06-20T07:36:03ZSyngress IT security project management handbookent://SD_ILS/0/SD_ILS:3396822024-06-20T07:36:03Z2024-06-20T07:36:03Zby Snedaker, Susan.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=163063">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=163063</a><br/>Format: Electronic Resources<br/>Syngress IT security project management handbookent://SD_ILS/0/SD_ILS:22822992024-06-20T07:36:03Z2024-06-20T07:36:03Zby Snedaker, Susan.<br/><a href="https://learning.oreilly.com/library/view/~/1597490768/?ar">https://learning.oreilly.com/library/view/~/1597490768/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1597490768/?ar">https://go.oreilly.com/library-access/library/view/-/1597490768/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1597490768">https://learning.oreilly.com/library/view/~/1597490768</a>
<a href="https://www.sciencedirect.com/science/book/9781597490764">https://www.sciencedirect.com/science/book/9781597490764</a><br/>Format: Electronic Resources<br/>Syngress IT security project management handbookent://SD_ILS/0/SD_ILS:658732024-06-20T07:36:03Z2024-06-20T07:36:03Zby Snedaker, Susan.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490764">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Syngress IT Security Project Management Handbook.ent://SD_ILS/0/SD_ILS:11867182024-06-20T07:36:03Z2024-06-20T07:36:03Zby Snedaker, Susan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=261283">Click to View</a><br/>Format: Electronic Resources<br/>Syngress force emerging threat analysis from mischief to maliciousent://SD_ILS/0/SD_ILS:3402022024-06-20T07:36:03Z2024-06-20T07:36:03Zby Maynor, David.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174833">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174833</a><br/>Format: Electronic Resources<br/>Syngress force emerging threat analysis from mischief to maliciousent://SD_ILS/0/SD_ILS:213582024-06-20T07:36:03Z2024-06-20T07:36:03Zby Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Windows performance analysis field guideent://SD_ILS/0/SD_ILS:22078152024-06-20T07:36:03Z2024-06-20T07:36:03Zby Huffman, Clint, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1770239">Click to View</a><br/>Format: Electronic Resources<br/>Preserving electronic evidence for trial : a team approach to the litigation hold, data collection, and evidence preservationent://SD_ILS/0/SD_ILS:22096882024-06-20T07:36:03Z2024-06-20T07:36:03Zby Zeigler, Ann D., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4417195">Click to View</a><br/>Format: Electronic Resources<br/>ASP Configuration Handbook.ent://SD_ILS/0/SD_ILS:11919802024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=293994">Click to View</a><br/>Format: Electronic Resources<br/>Designing A Wireless Network : Understand How Wireless Communication Works.ent://SD_ILS/0/SD_ILS:11920152024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294079">Click to View</a><br/>Format: Electronic Resources<br/>Cisco Security Professional's Guide to Secure Intrusion Detection Systems.ent://SD_ILS/0/SD_ILS:11919952024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294035">Click to View</a><br/>Format: Electronic Resources<br/>Rick Gallahers MPLS Training Guide : Building Multi Protocol Label Switching Networks.ent://SD_ILS/0/SD_ILS:11921032024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294347">Click to View</a><br/>Format: Electronic Resources<br/>configuring exchange server 2000.ent://SD_ILS/0/SD_ILS:11920032024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294052">Click to View</a><br/>Format: Electronic Resources<br/>Security Assessment : Case Studies for Implementing the NSA IAM.ent://SD_ILS/0/SD_ILS:11921072024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294358">Click to View</a><br/>Format: Electronic Resources<br/>Ethereal Packet Sniffing.ent://SD_ILS/0/SD_ILS:11920282024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294122">Click to View</a><br/>Format: Electronic Resources<br/>Ruby Developers Guide.ent://SD_ILS/0/SD_ILS:11921052024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294352">Click to View</a><br/>Format: Electronic Resources<br/>Hack Proofing XML.ent://SD_ILS/0/SD_ILS:11920442024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294155">Click to View</a><br/>Format: Electronic Resources<br/>Managing Cisco Network Security.ent://SD_ILS/0/SD_ILS:11920652024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294234">Click to View</a><br/>Format: Electronic Resources<br/>Hackproofing Your Wireless Network.ent://SD_ILS/0/SD_ILS:11920492024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294161">Click to View</a><br/>Format: Electronic Resources<br/>Windows 2000 Active Directory.ent://SD_ILS/0/SD_ILS:11921382024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294445">Click to View</a><br/>Format: Electronic Resources<br/>Building a Cisco Wireless Lan.ent://SD_ILS/0/SD_ILS:11776882024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=139957">Click to View</a><br/>Format: Electronic Resources<br/>Hack Proofing Sun Solaris 8.ent://SD_ILS/0/SD_ILS:11920422024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294153">Click to View</a><br/>Format: Electronic Resources<br/>.NET Mobile Web Developers Guide.ent://SD_ILS/0/SD_ILS:11919682024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=293946">Click to View</a><br/>Format: Electronic Resources<br/>Hack Proofing Windows 2000 Server.ent://SD_ILS/0/SD_ILS:11920432024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294154">Click to View</a><br/>Format: Electronic Resources<br/>Building DMZs For Enterprise Networks.ent://SD_ILS/0/SD_ILS:11919882024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294015">Click to View</a><br/>Format: Electronic Resources<br/>Configuring Symantec AntiVirus Enterprise Edition.ent://SD_ILS/0/SD_ILS:11920062024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294056">Click to View</a><br/>Format: Electronic Resources<br/>Nokia Network Security Solutions Handbook.ent://SD_ILS/0/SD_ILS:11920812024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294289">Click to View</a><br/>Format: Electronic Resources<br/>Checkpoint Next Generation Security Administration.ent://SD_ILS/0/SD_ILS:11919912024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294029">Click to View</a><br/>Format: Electronic Resources<br/>Firewall Policies and VPN Configurations.ent://SD_ILS/0/SD_ILS:11883022024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=272100">Click to View</a><br/>Format: Electronic Resources<br/>Snort Intrusion Detection 2.0.ent://SD_ILS/0/SD_ILS:11921112024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294371">Click to View</a><br/>Format: Electronic Resources<br/>Building SANs with Brocade Fabric Switches.ent://SD_ILS/0/SD_ILS:11776932024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=140393">Click to View</a><br/>Format: Electronic Resources<br/>Developing .Net Web Services With XML.ent://SD_ILS/0/SD_ILS:11920172024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294084">Click to View</a><br/>Format: Electronic Resources<br/>Configuring Windows 2000 without Active Directory.ent://SD_ILS/0/SD_ILS:11920072024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294057">Click to View</a><br/>Format: Electronic Resources<br/>ASP.Net Web Developer's Guide.ent://SD_ILS/0/SD_ILS:11919812024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=293995">Click to View</a><br/>Format: Electronic Resources<br/>VB.Net Web Developer's Guide.ent://SD_ILS/0/SD_ILS:11921302024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294435">Click to View</a><br/>Format: Electronic Resources<br/>Webmasters Guide To The Wireless Internet.ent://SD_ILS/0/SD_ILS:11921362024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294442">Click to View</a><br/>Format: Electronic Resources<br/>Configuring and Troubleshooting Windows XP Professional.ent://SD_ILS/0/SD_ILS:11920002024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294047">Click to View</a><br/>Format: Electronic Resources<br/>Hack Proofing Your Network 2E.ent://SD_ILS/0/SD_ILS:11920462024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294158">Click to View</a><br/>Format: Electronic Resources<br/>MCSE : Study Guide & DVD Training System.ent://SD_ILS/0/SD_ILS:11920762024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294257">Click to View</a><br/>Format: Electronic Resources<br/>The Best Damn Firewall Book Period.ent://SD_ILS/0/SD_ILS:11921212024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294396">Click to View</a><br/>Format: Electronic Resources<br/>The Best Damn Cisco Internetworking Book Period.ent://SD_ILS/0/SD_ILS:11921202024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294395">Click to View</a><br/>Format: Electronic Resources<br/>Configuring Cisco Voice Over IP 2E.ent://SD_ILS/0/SD_ILS:11920012024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294049">Click to View</a><br/>Format: Electronic Resources<br/>Cisco Security Specialists Guide to PIX Firewall.ent://SD_ILS/0/SD_ILS:11919962024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294036">Click to View</a><br/>Format: Electronic Resources<br/>Security + Study Guide and DVD Training System.ent://SD_ILS/0/SD_ILS:11921062024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294357">Click to View</a><br/>Format: Electronic Resources<br/>Consumers Guide to Cell Phones and Wireless Service Plans.ent://SD_ILS/0/SD_ILS:12893232024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3008648">Click to View</a><br/>Format: Electronic Resources<br/>Configuring ISA Server 2000 : Building Firewalls for Windows 2000.ent://SD_ILS/0/SD_ILS:11920042024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294054">Click to View</a><br/>Format: Electronic Resources<br/>Configuring Citrix MetaFrame XP for Windows : Including Feature Release 1.ent://SD_ILS/0/SD_ILS:11920022024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294051">Click to View</a><br/>Format: Electronic Resources<br/>Biz Talk Server 2000 Developer's Guide : Developer's Guide.ent://SD_ILS/0/SD_ILS:11919862024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294006">Click to View</a><br/>Format: Electronic Resources<br/>CheckPoint NG VPN 1/Firewall 1 : Advanced Configuration and Troubleshooting.ent://SD_ILS/0/SD_ILS:11919922024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294030">Click to View</a><br/>Format: Electronic Resources<br/>Special Ops : Host and Network Security for Microsoft Unix and Oracle.ent://SD_ILS/0/SD_ILS:11921132024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294373">Click to View</a><br/>Format: Electronic Resources<br/>SSCP Systems Security Certified Practitioner Study Guide and DVD Training System.ent://SD_ILS/0/SD_ILS:11921142024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294375">Click to View</a><br/>Format: Electronic Resources<br/>Journey to the Center of the Internet : Now Showing in 3D.ent://SD_ILS/0/SD_ILS:12893242024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3008649">Click to View</a><br/>Format: Electronic Resources<br/>Administering Cisco QoS in IP Networks : Including CallManager 3.0, QoS, and uOne.ent://SD_ILS/0/SD_ILS:11919702024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=293956">Click to View</a><br/>Format: Electronic Resources<br/>Hack Proofing ColdFusion : The Only Way to Stop a Hacker Is to Think Like One.ent://SD_ILS/0/SD_ILS:11920402024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294151">Click to View</a><br/>Format: Electronic Resources<br/>Dr Tom Shinder's ISA Server and Beyond : Real World Security Solutions for Microsoft Enterprise Networks.ent://SD_ILS/0/SD_ILS:11920212024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294093">Click to View</a><br/>Format: Electronic Resources<br/>Hack Proofing Your Web Applications : The Only Way to Stop a Hacker Is to Think Like One.ent://SD_ILS/0/SD_ILS:11920472024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294159">Click to View</a><br/>Format: Electronic Resources<br/>MCSE Designing Security for a Windows Server 2003 Network (Exam 70-298) : Study Guide and DVD Training System.ent://SD_ILS/0/SD_ILS:11920722024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294253">Click to View</a><br/>Format: Electronic Resources<br/>MCSA/MCSE Managing and Maintaining a Windows Server 2003 Environment (Exam 70-290) : Study Guide & DVD Training System.ent://SD_ILS/0/SD_ILS:11920692024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294250">Click to View</a><br/>Format: Electronic Resources<br/>MCSE Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (Exam 70-293) : Guide & DVD Training System.ent://SD_ILS/0/SD_ILS:11920732024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294254">Click to View</a><br/>Format: Electronic Resources<br/>10 Cool Lego Mindstorm Dark Side Robots Transports and Creatures : Amazing Projects You Can Build in Under an Hour.ent://SD_ILS/0/SD_ILS:12893252024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3008650">Click to View</a><br/>Format: Electronic Resources<br/>MCSE Designing a Windows Server 2003 Active Directory and Network Infrastructure(Exam 70-297) : Study Guide & DVD Training System.ent://SD_ILS/0/SD_ILS:11920712024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294252">Click to View</a><br/>Format: Electronic Resources<br/>Hack Proofing Your E-commerce Web Site : The Only Way to Stop a Hacker is to Think Like One.ent://SD_ILS/0/SD_ILS:11920452024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294156">Click to View</a><br/>Format: Electronic Resources<br/>MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network (Exam 70-214) : Study Guide and DVD Training System.ent://SD_ILS/0/SD_ILS:11920752024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294256">Click to View</a><br/>Format: Electronic Resources<br/>MCSE Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure (Exam 70-294) : Study Guide and DVD Training System.ent://SD_ILS/0/SD_ILS:11920742024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294255">Click to View</a><br/>Format: Electronic Resources<br/>MCSA/MCSE Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (Exam 70-291) : Study Guide and DVD Training System.ent://SD_ILS/0/SD_ILS:11920682024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294249">Click to View</a><br/>Format: Electronic Resources<br/>The basics of hacking and penetration testing : ethical hacking and penetration testing made easyent://SD_ILS/0/SD_ILS:22930572024-06-20T07:36:03Z2024-06-20T07:36:03Zby Engebretson, Pat (Patrick Henry), 1974-<br/><a href="https://learning.oreilly.com/library/view/~/9781597496551">https://learning.oreilly.com/library/view/~/9781597496551</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496551/?ar">https://learning.oreilly.com/library/view/~/9781597496551/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597496551/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496551/?ar</a><br/>Format: Electronic Resources<br/>Network+ Study Guide & Practice Exams : Exam N10-003.ent://SD_ILS/0/SD_ILS:11860532024-06-20T07:36:03Z2024-06-20T07:36:03Zby Shimonski, Robert.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254841">Click to View</a><br/>Format: Electronic Resources<br/>MCSE implementing and administering a Microsoft .NET server network infrastructure (exam 70-276) study guide and DVD training system.ent://SD_ILS/0/SD_ILS:656522024-06-20T07:36:03Z2024-06-20T07:36:03Zby ScienceDirect (Online service)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836937">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>IP Addressing and Subnetting INC IPV6ent://SD_ILS/0/SD_ILS:23205002024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781928994015">https://learning.oreilly.com/library/view/~/9781928994015</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781928994015/?ar">https://go.oreilly.com/library-access/library/view/-/9781928994015/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781928994015/?ar">https://learning.oreilly.com/library/view/~/9781928994015/?ar</a><br/>Format: Electronic Resources<br/>Security + Study Guide and DVD Training Systement://SD_ILS/0/SD_ILS:23205992024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781931836722">https://learning.oreilly.com/library/view/~/9781931836722</a>
<a href="https://learning.oreilly.com/library/view/~/9781931836722/?ar">https://learning.oreilly.com/library/view/~/9781931836722/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781931836722/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836722/?ar</a><br/>Format: Electronic Resources<br/>Configuring Cisco AVVIDent://SD_ILS/0/SD_ILS:656722024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress Media, Inc.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994145">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>E-mail virus protection handbook.ent://SD_ILS/0/SD_ILS:22807552024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress Media, Inc.<br/><a href="https://www.sciencedirect.com/science/book/9781928994237">https://www.sciencedirect.com/science/book/9781928994237</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781928994237/?ar">https://go.oreilly.com/library-access/library/view/-/9781928994237/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781928994237/?ar">https://learning.oreilly.com/library/view/~/9781928994237/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781928994237">https://learning.oreilly.com/library/view/~/9781928994237</a><br/>Format: Electronic Resources<br/>Managing Windows 2000 network servicesent://SD_ILS/0/SD_ILS:657642024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress Media, Inc.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994060">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>E-mail virus protection handbookent://SD_ILS/0/SD_ILS:657602024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress Media, Inc.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994237">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Troubleshooting Windows 2000 TCP/IP.ent://SD_ILS/0/SD_ILS:658642024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress Media, Inc.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994114">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Windows 2000 server system administration handbook.ent://SD_ILS/0/SD_ILS:658072024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress Media, Inc.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994091">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>MCSE. Microsoft TCP/IP on Windows NT 4.0 study guide : (exam 70-59)ent://SD_ILS/0/SD_ILS:20443822024-06-20T07:36:03Z2024-06-20T07:36:03Zby Syngress Media, Inc.<br/>Format: Books<br/>The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practiceent://SD_ILS/0/SD_ILS:22966252024-06-20T07:36:03Z2024-06-20T07:36:03Zby Winterfeld, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9780124047372/?ar">https://learning.oreilly.com/library/view/~/9780124047372/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124047372/?ar">https://go.oreilly.com/library-access/library/view/-/9780124047372/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124047372">https://learning.oreilly.com/library/view/~/9780124047372</a><br/>Format: Electronic Resources<br/>Smart grid security : innovative solutions for a modernized grident://SD_ILS/0/SD_ILS:20981382024-06-20T07:36:03Z2024-06-20T07:36:03Zby Skopik, Florian, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2146995">Click to View</a><br/>Format: Electronic Resources<br/>Automating open source intelligence : algorithms for OSINTent://SD_ILS/0/SD_ILS:20984092024-06-20T07:36:03Z2024-06-20T07:36:03Zby Layton, Robert, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4186519">Click to View</a><br/>Format: Electronic Resources<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:23032942024-06-20T07:36:03Z2024-06-20T07:36:03Zby Andress, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128007440/?ar">https://learning.oreilly.com/library/view/~/9780128007440/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128007440/?ar">https://go.oreilly.com/library-access/library/view/-/9780128007440/?ar</a><br/>Format: Electronic Resources<br/>Eleventh hour network+ : exam N10-004 study guideent://SD_ILS/0/SD_ILS:22871812024-06-20T07:36:03Z2024-06-20T07:36:03Zby Alpern, Naomi J.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494281/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494281/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494281/?ar">https://learning.oreilly.com/library/view/~/9781597494281/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494281">https://learning.oreilly.com/library/view/~/9781597494281</a><br/>Format: Electronic Resources<br/>Seven deadliest Microsoft attacksent://SD_ILS/0/SD_ILS:22898492024-06-20T07:36:03Z2024-06-20T07:36:03Zby Kraus, Rob.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495516/?ar">https://learning.oreilly.com/library/view/~/9781597495516/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495516/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495516/?ar</a><br/>Format: Electronic Resources<br/>Seven deadliest Unified Communications attacksent://SD_ILS/0/SD_ILS:22887222024-06-20T07:36:03Z2024-06-20T07:36:03Zby York, Dan.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495479">https://learning.oreilly.com/library/view/~/9781597495479</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495479/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495479/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495479/?ar">https://learning.oreilly.com/library/view/~/9781597495479/?ar</a><br/>Format: Electronic Resources<br/>Seven deadliest web application attacksent://SD_ILS/0/SD_ILS:22895522024-06-20T07:36:03Z2024-06-20T07:36:03Zby Shema, Mike.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495431/?ar">https://learning.oreilly.com/library/view/~/9781597495431/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495431/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495431/?ar</a><br/>Format: Electronic Resources<br/>Seven deadliest USB attacksent://SD_ILS/0/SD_ILS:22887212024-06-20T07:36:03Z2024-06-20T07:36:03Zby Anderson, Brian (Brian James)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495547/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495547/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495547/?ar">https://learning.oreilly.com/library/view/~/9781597495547/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495547">https://learning.oreilly.com/library/view/~/9781597495547</a><br/>Format: Electronic Resources<br/>Seven deadliest wireless technologies attacksent://SD_ILS/0/SD_ILS:22887202024-06-20T07:36:03Z2024-06-20T07:36:03Zby Haines, Brad.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495417/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495417/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495417/?ar">https://learning.oreilly.com/library/view/~/9781597495417/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495417">https://learning.oreilly.com/library/view/~/9781597495417</a><br/>Format: Electronic Resources<br/>Seven deadliest social network attacksent://SD_ILS/0/SD_ILS:22897182024-06-20T07:36:03Z2024-06-20T07:36:03Zby Timm, Carl.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495455/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495455/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495455/?ar">https://learning.oreilly.com/library/view/~/9781597495455/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495455">https://learning.oreilly.com/library/view/~/9781597495455</a><br/>Format: Electronic Resources<br/>Mobile security and privacy : advances, challenges and future research directionsent://SD_ILS/0/SD_ILS:22107842024-06-20T07:36:03Z2024-06-20T07:36:03Zby Au, Man-Ho, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4689767">Click to View</a><br/>Format: Electronic Resources<br/>Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systemsent://SD_ILS/0/SD_ILS:22109262024-06-20T07:36:03Z2024-06-20T07:36:03Zby Griffor, Edward, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4711751">Click to View</a><br/>Format: Electronic Resources<br/>Mobile security and privacy : advances, challenges and future research directionsent://SD_ILS/0/SD_ILS:23116392024-06-20T07:36:03Z2024-06-20T07:36:03Zby Au, Man-Ho, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128047460/?ar">https://learning.oreilly.com/library/view/~/9780128047460/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128047460/?ar">https://go.oreilly.com/library-access/library/view/-/9780128047460/?ar</a><br/>Format: Electronic Resources<br/>Contemporary digital forensic investigations of cloud and mobile applicationsent://SD_ILS/0/SD_ILS:23120082024-06-20T07:36:03Z2024-06-20T07:36:03Zby Choo, Kim-Kwang Raymond, editor.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128054482/?ar">https://go.oreilly.com/library-access/library/view/-/9780128054482/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128054482/?ar">https://learning.oreilly.com/library/view/~/9780128054482/?ar</a><br/>Format: Electronic Resources<br/>Smart grid security : innovative solutions for a modernized grident://SD_ILS/0/SD_ILS:23080492024-06-20T07:36:03Z2024-06-20T07:36:03Zby Skopik, Florian, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128023549">https://learning.oreilly.com/library/view/~/9780128023549</a>
<a href="https://learning.oreilly.com/library/view/~/9780128023549/?ar">https://learning.oreilly.com/library/view/~/9780128023549/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128023549/?ar">https://go.oreilly.com/library-access/library/view/-/9780128023549/?ar</a><br/>Format: Electronic Resources<br/>Seven deadliest network attacksent://SD_ILS/0/SD_ILS:22901742024-06-20T07:36:03Z2024-06-20T07:36:03Zby Prowell, Stacy J.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495493/?ar">https://learning.oreilly.com/library/view/~/9781597495493/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495493/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495493/?ar</a><br/>Format: Electronic Resources<br/>Audio content security : attack analysis on audio watermarkingent://SD_ILS/0/SD_ILS:23110452024-06-20T07:36:03Z2024-06-20T07:36:03Zby Ghorbani, Sogand, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128113844/?ar">https://learning.oreilly.com/library/view/~/9780128113844/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128113844/?ar">https://go.oreilly.com/library-access/library/view/-/9780128113844/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128113844">https://learning.oreilly.com/library/view/~/9780128113844</a><br/>Format: Electronic Resources<br/>A study of black hole attack solutions : on AODV routing protocol in MANETent://SD_ILS/0/SD_ILS:23090382024-06-20T07:36:03Z2024-06-20T07:36:03Zby Fazeldehkordi, Elahe, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128053799/?ar">https://go.oreilly.com/library-access/library/view/-/9780128053799/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128053799/?ar">https://learning.oreilly.com/library/view/~/9780128053799/?ar</a><br/>Format: Electronic Resources<br/>Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systemsent://SD_ILS/0/SD_ILS:23116092024-06-20T07:36:03Z2024-06-20T07:36:03Zby Griffor, Edward R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128038383/?ar">https://learning.oreilly.com/library/view/~/9780128038383/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128038383/?ar">https://go.oreilly.com/library-access/library/view/-/9780128038383/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128038383">https://learning.oreilly.com/library/view/~/9780128038383</a><br/>Format: Electronic Resources<br/>11th hour Linux+ study guide : exam XK0-003 study guideent://SD_ILS/0/SD_ILS:22968992024-06-20T07:36:03Z2024-06-20T07:36:03Zby Speake, Graham.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494977/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494977/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494977/?ar">https://learning.oreilly.com/library/view/~/9781597494977/?ar</a><br/>Format: Electronic Resources<br/>Eleventh hour security+ : exam SYO-201 study guideent://SD_ILS/0/SD_ILS:22944772024-06-20T07:36:03Z2024-06-20T07:36:03Zby Dubrawsky, Ido.<br/><a href="https://learning.oreilly.com/library/view/~/9781597494274/?ar">https://learning.oreilly.com/library/view/~/9781597494274/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597494274/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494274/?ar</a><br/>Format: Electronic Resources<br/>Hardware hacking : have fun while voiding your warrantyent://SD_ILS/0/SD_ILS:22833992024-06-20T07:36:03Z2024-06-20T07:36:03Zby Grand, Joe.<br/><a href="https://learning.oreilly.com/library/view/~/9781932266832/?ar">https://learning.oreilly.com/library/view/~/9781932266832/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781932266832/?ar">https://go.oreilly.com/library-access/library/view/-/9781932266832/?ar</a>
<a href="https://www.sciencedirect.com/science/book/9781932266832">https://www.sciencedirect.com/science/book/9781932266832</a>
<a href="https://learning.oreilly.com/library/view/~/9781932266832">https://learning.oreilly.com/library/view/~/9781932266832</a><br/>Format: Electronic Resources<br/>DBA's guide to databases on Linuxent://SD_ILS/0/SD_ILS:657672024-06-20T07:36:03Z2024-06-20T07:36:03Zby Rogers, Chris.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994046">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Nessus network auditingent://SD_ILS/0/SD_ILS:659852024-06-20T07:36:03Z2024-06-20T07:36:03Zby Deraison, Renaud.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836081">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Hack proofing your e-commerce site the only way to stop a hacker is to think like oneent://SD_ILS/0/SD_ILS:657332024-06-20T07:36:03Z2024-06-20T07:36:03Zby Russell, Ryan.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994275">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Designing a wireless networkent://SD_ILS/0/SD_ILS:656642024-06-20T07:36:03Z2024-06-20T07:36:03Zby Wheat, Jeffery A.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994459">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>IP addressing and subnetting, including IPv6ent://SD_ILS/0/SD_ILS:656832024-06-20T07:36:03Z2024-06-20T07:36:03Zby Blanchet, Marc, 1964-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994015">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Nessus, Snort, & Ethereal power tools : customizing open source security applicationsent://SD_ILS/0/SD_ILS:22819942024-06-20T07:36:03Z2024-06-20T07:36:03Zby Archibald, Neil.<br/><a href="https://www.sciencedirect.com/science/book/9781597490207">https://www.sciencedirect.com/science/book/9781597490207</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490207">https://learning.oreilly.com/library/view/~/9781597490207</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490207/?ar">https://learning.oreilly.com/library/view/~/9781597490207/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490207/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490207/?ar</a><br/>Format: Electronic Resources<br/>Ethereal : packet sniffingent://SD_ILS/0/SD_ILS:22813312024-06-20T07:36:03Z2024-06-20T07:36:03Zby Orebaugh, Angela.<br/><a href="https://learning.oreilly.com/library/view/~/9781932266825">https://learning.oreilly.com/library/view/~/9781932266825</a>
<a href="https://www.sciencedirect.com/science/book/9781932266825">https://www.sciencedirect.com/science/book/9781932266825</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781932266825/?ar">https://go.oreilly.com/library-access/library/view/-/9781932266825/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781932266825/?ar">https://learning.oreilly.com/library/view/~/9781932266825/?ar</a><br/>Format: Electronic Resources<br/>Hardware hacking have fun while voiding your warrantyent://SD_ILS/0/SD_ILS:657422024-06-20T07:36:03Z2024-06-20T07:36:03Zby Grand, Joe.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266832">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Nessus, Snort, & Ethereal power tools customizing open source security applicationsent://SD_ILS/0/SD_ILS:657872024-06-20T07:36:03Z2024-06-20T07:36:03Zby Archibald, Neil.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490207">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Ethereal packet sniffingent://SD_ILS/0/SD_ILS:656452024-06-20T07:36:03Z2024-06-20T07:36:03Zby Orebaugh, Angela.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266825">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Snort 2.0 intrusion detection.ent://SD_ILS/0/SD_ILS:146182024-06-20T07:36:03Z2024-06-20T07:36:03Zby Beale, Jay.<br/>Format: Books<br/>Hack proofing your wireless networkent://SD_ILS/0/SD_ILS:123212024-06-20T07:36:03Z2024-06-20T07:36:03Zby Barnes, Christian.<br/>Format: Books<br/>Federated identity primerent://SD_ILS/0/SD_ILS:22060712024-06-20T07:36:03Z2024-06-20T07:36:03Zby Rountree, Derrick.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1081145">Click to View</a><br/>Format: Electronic Resources<br/>Practical anonymity hiding in plain sight onlineent://SD_ILS/0/SD_ILS:22061652024-06-20T07:36:03Z2024-06-20T07:36:03Zby Loshin, Peter.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115167">Click to View</a><br/>Format: Electronic Resources<br/>UTM security with Fortinet Mastering FortiOSent://SD_ILS/0/SD_ILS:22060322024-06-20T07:36:03Z2024-06-20T07:36:03Zby Tam, Kenneth.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1068442">Click to View</a><br/>Format: Electronic Resources<br/>Practical lock picking a physical penetration tester's training guideent://SD_ILS/0/SD_ILS:22058522024-06-20T07:36:03Z2024-06-20T07:36:03Zby Ollam, Deviant.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=982556">Click to View</a><br/>Format: Electronic Resources<br/>Simple steps to data encryption a practical guide to secure computingent://SD_ILS/0/SD_ILS:22061692024-06-20T07:36:03Z2024-06-20T07:36:03Zby Loshin, Pete.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115182">Click to View</a><br/>Format: Electronic Resources<br/>The Wireshark field guide analyzing and troubleshooting network trafficent://SD_ILS/0/SD_ILS:22061702024-06-20T07:36:03Z2024-06-20T07:36:03Zby Shimonski, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115183">Click to View</a><br/>Format: Electronic Resources<br/>CISSP study guideent://SD_ILS/0/SD_ILS:22058932024-06-20T07:36:03Z2024-06-20T07:36:03Zby Conrad, Eric.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1014262">Click to View</a><br/>Format: Electronic Resources<br/>Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineersent://SD_ILS/0/SD_ILS:20517122024-06-20T07:36:03Z2024-06-20T07:36:03Zby O'Connor, T. J.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1073021">Click to View</a><br/>Format: Electronic Resources<br/>Advanced persistent threat understanding the danger and how to protect your organizationent://SD_ILS/0/SD_ILS:22060462024-06-20T07:36:03Z2024-06-20T07:36:03Zby Cole, Eric.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1073020">Click to View</a><br/>Format: Electronic Resources<br/>Wireless reconnaissance in penetration testingent://SD_ILS/0/SD_ILS:22060272024-06-20T07:36:03Z2024-06-20T07:36:03Zby Neely, Matthew.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1059696">Click to View</a><br/>Format: Electronic Resources<br/>Data hiding exposing concealed data in multimedia, operating systems, mobile devices, and network protocolsent://SD_ILS/0/SD_ILS:22060432024-06-20T07:36:03Z2024-06-20T07:36:03Zby Raggo, Michael T.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1073014">Click to View</a><br/>Format: Electronic Resources<br/>Securing SQL servers protecting your database from attackersent://SD_ILS/0/SD_ILS:22058462024-06-20T07:36:03Z2024-06-20T07:36:03Zby Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=980013">Click to View</a><br/>Format: Electronic Resources<br/>Keys to the kingdom impressioning, privilege escalation, bumping, and other key-based attacks against physical locksent://SD_ILS/0/SD_ILS:22058702024-06-20T07:36:03Z2024-06-20T07:36:03Zby Ollam, Deviant.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=998614">Click to View</a><br/>Format: Electronic Resources<br/>Migrating to the cloud Oracle client/server modernizationent://SD_ILS/0/SD_ILS:22054762024-06-20T07:36:03Z2024-06-20T07:36:03Zby Laszewski, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=776183">Click to View</a><br/>Format: Electronic Resources<br/>Windows 2012 server network security securing your windows network systems and infrastructureent://SD_ILS/0/SD_ILS:22061632024-06-20T07:36:03Z2024-06-20T07:36:03Zby Rountree, Derrick.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115160">Click to View</a><br/>Format: Electronic Resources<br/>The hacker's guide to OS X exploiting OS X from the root upent://SD_ILS/0/SD_ILS:22060562024-06-20T07:36:03Z2024-06-20T07:36:03Zby Bathurst, Rob.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1074430">Click to View</a><br/>Format: Electronic Resources<br/>Logging and log management the authoritative guide to understanding the concepts surrounding logging and log managementent://SD_ILS/0/SD_ILS:22060602024-06-20T07:36:03Z2024-06-20T07:36:03Zby Chuvakin, Anton A.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1077419">Click to View</a><br/>Format: Electronic Resources<br/>Placing the suspect behind the keyboard using digital forensics and investigative techniques to identify cybercrime suspectsent://SD_ILS/0/SD_ILS:22061722024-06-20T07:36:03Z2024-06-20T07:36:03Zby Shavers, Brett.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115188">Click to View</a><br/>Format: Electronic Resources<br/>Network and system securityent://SD_ILS/0/SD_ILS:23011702024-06-20T07:36:03Z2024-06-20T07:36:03Zby Vacca, John R.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124166899/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166899/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124166899/?ar">https://learning.oreilly.com/library/view/~/9780124166899/?ar</a><br/>Format: Electronic Resources<br/>Cyber security and IT infrastructure protectionent://SD_ILS/0/SD_ILS:22998012024-06-20T07:36:03Z2024-06-20T07:36:03Zby Vacca, John R.<br/><a href="https://learning.oreilly.com/library/view/~/9780124166813/?ar">https://learning.oreilly.com/library/view/~/9780124166813/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124166813/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166813/?ar</a><br/>Format: Electronic Resources<br/>Malware forensics field guide for Windows systems digital forensics field guidesent://SD_ILS/0/SD_ILS:22057382024-06-20T07:36:03Z2024-06-20T07:36:03Zby Malin, Cameron H.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=921016">Click to View</a><br/>Format: Electronic Resources<br/>Windows forensic analysis toolkit advanced analysis techniques for Windows 7ent://SD_ILS/0/SD_ILS:22055812024-06-20T07:36:03Z2024-06-20T07:36:03Zby Carvey, Harlan A.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=850700">Click to View</a><br/>Format: Electronic Resources<br/>Best damn firewall book periodent://SD_ILS/0/SD_ILS:22845152024-06-20T07:36:03Z2024-06-20T07:36:03Zby Behrens, Thorsten.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492188/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492188/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492188/?ar">https://learning.oreilly.com/library/view/~/9781597492188/?ar</a><br/>Format: Electronic Resources<br/>Configuring Citrix MetaFrame for Windows 2000 terminal servicesent://SD_ILS/0/SD_ILS:656952024-06-20T07:36:03Z2024-06-20T07:36:03Zby ScienceDirect (Online service)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994183">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>The basics of cloud computing : understanding the fundamentals of cloud computing in theory and practiceent://SD_ILS/0/SD_ILS:23012292024-06-20T07:36:03Z2024-06-20T07:36:03Zby Rountree, Derrick.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124059320/?ar">https://go.oreilly.com/library-access/library/view/-/9780124059320/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124059320/?ar">https://learning.oreilly.com/library/view/~/9780124059320/?ar</a><br/>Format: Electronic Resources<br/>Risk management framework a lab-based approach to securing information systemsent://SD_ILS/0/SD_ILS:22061682024-06-20T07:36:03Z2024-06-20T07:36:03Zby Broad, James.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115181">Click to View</a><br/>Format: Electronic Resources<br/>Blackhatonomics : an inside look at the economics of cybercrimeent://SD_ILS/0/SD_ILS:22985302024-06-20T07:36:03Z2024-06-20T07:36:03Zby Gragido, Will.<br/><a href="https://learning.oreilly.com/library/view/~/9781597497404/?ar">https://learning.oreilly.com/library/view/~/9781597497404/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597497404/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497404/?ar</a><br/>Format: Electronic Resources<br/>Client-side attacks and defenseent://SD_ILS/0/SD_ILS:22985182024-06-20T07:36:03Z2024-06-20T07:36:03Zby Shimonski, Robert.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495905/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495905/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495905/?ar">https://learning.oreilly.com/library/view/~/9781597495905/?ar</a><br/>Format: Electronic Resources<br/>Securing the smart grid : next generation power grid securityent://SD_ILS/0/SD_ILS:22910272024-06-20T07:36:03Z2024-06-20T07:36:03Zby Flick, Tony.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495707/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495707/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495707/?ar">https://learning.oreilly.com/library/view/~/9781597495707/?ar</a><br/>Format: Electronic Resources<br/>Techno security's guide to e-discovery and digital forensicsent://SD_ILS/0/SD_ILS:3432012024-06-20T07:36:03Z2024-06-20T07:36:03Zby Wiles, Jack.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=239209">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=239209</a><br/>Format: Electronic Resources<br/>Building robots with Lego Mindstorms NXTent://SD_ILS/0/SD_ILS:22868662024-06-20T07:36:03Z2024-06-20T07:36:03Zby Astolfo, David.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597491525/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491525/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491525/?ar">https://learning.oreilly.com/library/view/~/9781597491525/?ar</a><br/>Format: Electronic Resources<br/>Firewall policies and VPN configurationsent://SD_ILS/0/SD_ILS:3399792024-06-20T07:36:03Z2024-06-20T07:36:03Zby Henmi, Anne.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=170636">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=170636</a><br/>Format: Electronic Resources<br/>How to cheat at managing Windows Server update servicesent://SD_ILS/0/SD_ILS:3395832024-06-20T07:36:03Z2024-06-20T07:36:03Zby Barber, Brian.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=149587">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=149587</a><br/>Format: Electronic Resources<br/>Unified communications forensics : anatomy of common UC attacksent://SD_ILS/0/SD_ILS:23014182024-06-20T07:36:03Z2024-06-20T07:36:03Zby Grant, Nicholas, 1978-<br/><a href="https://learning.oreilly.com/library/view/~/9781597499927/?ar">https://learning.oreilly.com/library/view/~/9781597499927/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597499927/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499927/?ar</a><br/>Format: Electronic Resources<br/>Blackhatonomics an inside look at the economics of cybercrimeent://SD_ILS/0/SD_ILS:22060642024-06-20T07:36:03Z2024-06-20T07:36:03Zby Gragido, Will.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1079784">Click to View</a><br/>Format: Electronic Resources<br/>FISMA compliance handbookent://SD_ILS/0/SD_ILS:22061622024-06-20T07:36:03Z2024-06-20T07:36:03Zby Taylor, Laura P.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115157">Click to View</a><br/>Format: Electronic Resources<br/>Assessing vendors : a hands-on guide to assessing Infosec and IT vendorsent://SD_ILS/0/SD_ILS:22989592024-06-20T07:36:03Z2024-06-20T07:36:03Zby More, Josh.<br/><a href="https://learning.oreilly.com/library/view/~/9780124096073/?ar">https://learning.oreilly.com/library/view/~/9780124096073/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124096073/?ar">https://go.oreilly.com/library-access/library/view/-/9780124096073/?ar</a><br/>Format: Electronic Resources<br/>Wireless reconnaissance in penetration testingent://SD_ILS/0/SD_ILS:22985292024-06-20T07:36:03Z2024-06-20T07:36:03Zby Neely, Matthew.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497312/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497312/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497312/?ar">https://learning.oreilly.com/library/view/~/9781597497312/?ar</a><br/>Format: Electronic Resources<br/>Keys to the kingdom : impressioning, privilege escalation, bumping, and other key-based attacks against physical locksent://SD_ILS/0/SD_ILS:22985322024-06-20T07:36:03Z2024-06-20T07:36:03Zby Ollam, Deviant.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499835/?ar">https://learning.oreilly.com/library/view/~/9781597499835/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597499835/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499835/?ar</a><br/>Format: Electronic Resources<br/>Digital triage forensics : processing the digital crime sceneent://SD_ILS/0/SD_ILS:22906522024-06-20T07:36:03Z2024-06-20T07:36:03Zby Pearson, Stephen, 1963-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495967/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495967/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495967/?ar">https://learning.oreilly.com/library/view/~/9781597495967/?ar</a><br/>Format: Electronic Resources<br/>Building a digital forensic laboratory : establishing and managing a successful facilityent://SD_ILS/0/SD_ILS:22868152024-06-20T07:36:03Z2024-06-20T07:36:03Zby Jones, Andy, 1952-<br/><a href="https://learning.oreilly.com/library/view/~/9780080949536/?ar">https://learning.oreilly.com/library/view/~/9780080949536/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780080949536/?ar">https://go.oreilly.com/library-access/library/view/-/9780080949536/?ar</a><br/>Format: Electronic Resources<br/>The IT/digital legal companion a comprehensive business guide to software, Internet, and IP law : includes contracts and web formsent://SD_ILS/0/SD_ILS:21238922024-06-20T07:36:03Z2024-06-20T07:36:03Zby Landy, Gene K.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=405534">Click to View</a><br/>Format: Electronic Resources<br/>OS X exploits and defenseent://SD_ILS/0/SD_ILS:22851572024-06-20T07:36:03Z2024-06-20T07:36:03Zby Baccas, Paul.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492546/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492546/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492546/?ar">https://learning.oreilly.com/library/view/~/9781597492546/?ar</a><br/>Format: Electronic Resources<br/>Nessus network auditingent://SD_ILS/0/SD_ILS:22846892024-06-20T07:36:03Z2024-06-20T07:36:03Zby Rogers, Russ.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492089/?ar">https://learning.oreilly.com/library/view/~/9781597492089/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492089/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492089/?ar</a><br/>Format: Electronic Resources<br/>The best damn server virtualization book periodent://SD_ILS/0/SD_ILS:22845132024-06-20T07:36:03Z2024-06-20T07:36:03Zby Buytaert, Kris.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492171/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492171/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492171/?ar">https://learning.oreilly.com/library/view/~/9781597492171/?ar</a><br/>Format: Electronic Resources<br/>Network security assessment : from vulnerability to patchent://SD_ILS/0/SD_ILS:22862422024-06-20T07:36:03Z2024-06-20T07:36:03Zby Manzuik, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491013/?ar">https://learning.oreilly.com/library/view/~/9781597491013/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491013/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491013/?ar</a><br/>Format: Electronic Resources<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:22876822024-06-20T07:36:03Z2024-06-20T07:36:03Zby Bayles, Aaron W.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492133/?ar">https://learning.oreilly.com/library/view/~/9781597492133/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492133/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492133/?ar</a><br/>Format: Electronic Resources<br/>Juniper(r) Networks secure access SSL VPN configuration guideent://SD_ILS/0/SD_ILS:22864442024-06-20T07:36:03Z2024-06-20T07:36:03Zby Wyler, Neil R.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492003/?ar">https://learning.oreilly.com/library/view/~/9781597492003/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492003/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492003/?ar</a><br/>Format: Electronic Resources<br/>Configuring Juniper Networks NetScreen & SSG firewallsent://SD_ILS/0/SD_ILS:22861842024-06-20T07:36:03Z2024-06-20T07:36:03Zby Cameron, Rob.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597491181/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491181/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491181/?ar">https://learning.oreilly.com/library/view/~/9781597491181/?ar</a><br/>Format: Electronic Resources<br/>The best damn IT security management book periodent://SD_ILS/0/SD_ILS:22846982024-06-20T07:36:03Z2024-06-20T07:36:03Zby Susan Snedaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492270/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492270/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492270/?ar">https://learning.oreilly.com/library/view/~/9781597492270/?ar</a><br/>Format: Electronic Resources<br/>Open source fuzzing toolsent://SD_ILS/0/SD_ILS:22850852024-06-20T07:36:03Z2024-06-20T07:36:03Zby Evron, Gadi.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491952/?ar">https://learning.oreilly.com/library/view/~/9781597491952/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491952/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491952/?ar</a><br/>Format: Electronic Resources<br/>Combating spyware in the enterpriseent://SD_ILS/0/SD_ILS:3399752024-06-20T07:36:03Z2024-06-20T07:36:03Zby Baskin, Brian.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=173423">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=173423</a><br/>Format: Electronic Resources<br/>Hack the stack using snort and ethereal to master the 8 layers of an insecure networkent://SD_ILS/0/SD_ILS:3399852024-06-20T07:36:03Z2024-06-20T07:36:03Zby Gregg, Michael (Michael C.)<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174832">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174832</a><br/>Format: Electronic Resources<br/>Scripting VMware power tools for automating virtual infrastructure administrationent://SD_ILS/0/SD_ILS:3400552024-06-20T07:36:03Z2024-06-20T07:36:03Zby Muller, Al.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=176006">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=176006</a><br/>Format: Electronic Resources<br/>Secure your network for free : using Nmap, Wireshark, Snort, Nessus, and MRGTent://SD_ILS/0/SD_ILS:22864772024-06-20T07:36:03Z2024-06-20T07:36:03Zby Seagren, Eric.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597491235/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491235/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491235/?ar">https://learning.oreilly.com/library/view/~/9781597491235/?ar</a><br/>Format: Electronic Resources<br/>Introduction to social media investigation : a hands-on approachent://SD_ILS/0/SD_ILS:23066412024-06-20T07:36:03Z2024-06-20T07:36:03Zby Golbeck, Jennifer.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128016565/?ar">https://go.oreilly.com/library-access/library/view/-/9780128016565/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128016565/?ar">https://learning.oreilly.com/library/view/~/9780128016565/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128016565">https://learning.oreilly.com/library/view/~/9780128016565</a><br/>Format: Electronic Resources<br/>The cloud security ecosystem : technical, legal, business and management issuesent://SD_ILS/0/SD_ILS:23076492024-06-20T07:36:03Z2024-06-20T07:36:03Zby Ko, Ryan, editor.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128017807/?ar">https://go.oreilly.com/library-access/library/view/-/9780128017807/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128017807/?ar">https://learning.oreilly.com/library/view/~/9780128017807/?ar</a><br/>Format: Electronic Resources<br/>Targeted cyber attacks : multi-staged attacks driven by exploits and malwareent://SD_ILS/0/SD_ILS:23031552024-06-20T07:36:03Z2024-06-20T07:36:03Zby Sood, Aditya K.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128006047/?ar">https://go.oreilly.com/library-access/library/view/-/9780128006047/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128006047/?ar">https://learning.oreilly.com/library/view/~/9780128006047/?ar</a><br/>Format: Electronic Resources<br/>The Wireshark field guide : analyzing and troubleshooting network trafficent://SD_ILS/0/SD_ILS:22988682024-06-20T07:36:03Z2024-06-20T07:36:03Zby Shimonski, Robert.<br/><a href="https://learning.oreilly.com/library/view/~/9780124104136/?ar">https://learning.oreilly.com/library/view/~/9780124104136/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124104136/?ar">https://go.oreilly.com/library-access/library/view/-/9780124104136/?ar</a><br/>Format: Electronic Resources<br/>The Basics of Hacking and Penetration Testing : Ethical Hacking and Penetration Testing Made Easyent://SD_ILS/0/SD_ILS:22995202024-06-20T07:36:03Z2024-06-20T07:36:03Zby Engebretson, Patrick.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124116443/?ar">https://go.oreilly.com/library-access/library/view/-/9780124116443/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124116443/?ar">https://learning.oreilly.com/library/view/~/9780124116443/?ar</a><br/>Format: Electronic Resources<br/>Professional penetration testing : creating and learning in a hacking labent://SD_ILS/0/SD_ILS:22994832024-06-20T07:36:03Z2024-06-20T07:36:03Zby Wilhelm, Thomas.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499934/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499934/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499934/?ar">https://learning.oreilly.com/library/view/~/9781597499934/?ar</a><br/>Format: Electronic Resources<br/>Coding for penetration testers : building better toolsent://SD_ILS/0/SD_ILS:22954512024-06-20T07:36:03Z2024-06-20T07:36:03Zby Andress, Jason.<br/><a href="https://learning.oreilly.com/library/view/~/9781597497305/?ar">https://learning.oreilly.com/library/view/~/9781597497305/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597497305/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497305/?ar</a><br/>Format: Electronic Resources<br/>SQL injection attacks and defenseent://SD_ILS/0/SD_ILS:22953692024-06-20T07:36:03Z2024-06-20T07:36:03Zby Clarke, Justin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499637/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499637/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499637/?ar">https://learning.oreilly.com/library/view/~/9781597499637/?ar</a><br/>Format: Electronic Resources<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:22923682024-06-20T07:36:03Z2024-06-20T07:36:03Zby Faircloth, Jeremy.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496278/?ar">https://learning.oreilly.com/library/view/~/9781597496278/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597496278/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496278/?ar</a><br/>Format: Electronic Resources<br/>How to cheat at VoIP securityent://SD_ILS/0/SD_ILS:23040972024-06-20T07:36:03Z2024-06-20T07:36:03Zby Porter, Thomas.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491693/?ar">https://learning.oreilly.com/library/view/~/9781597491693/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491693/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491693/?ar</a><br/>Format: Electronic Resources<br/>Professional penetration testing : creating and operating a formal hacking labent://SD_ILS/0/SD_ILS:22875382024-06-20T07:36:03Z2024-06-20T07:36:03Zby Wilhelm, Thomas.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494250/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494250/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494250/?ar">https://learning.oreilly.com/library/view/~/9781597494250/?ar</a><br/>Format: Electronic Resources<br/>Virtualization and forensics : a digital forensic investigator's guide to virtual environmentsent://SD_ILS/0/SD_ILS:22900412024-06-20T07:36:03Z2024-06-20T07:36:03Zby Barrett, Diane.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495578/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495578/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495578/?ar">https://learning.oreilly.com/library/view/~/9781597495578/?ar</a><br/>Format: Electronic Resources<br/>Managing catastrophic loss of sensitive dataent://SD_ILS/0/SD_ILS:22846902024-06-20T07:36:03Z2024-06-20T07:36:03Zby Photopoulos, Constantine.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492393/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492393/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492393/?ar">https://learning.oreilly.com/library/view/~/9781597492393/?ar</a><br/>Format: Electronic Resources<br/>The IT regulatory and standards compliance handbookent://SD_ILS/0/SD_ILS:22851462024-06-20T07:36:03Z2024-06-20T07:36:03Zby Wright, Craig.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492669/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492669/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492669/?ar">https://learning.oreilly.com/library/view/~/9781597492669/?ar</a><br/>Format: Electronic Resources<br/>Best damn Exchange, SQL and IIS book periodent://SD_ILS/0/SD_ILS:22856592024-06-20T07:36:03Z2024-06-20T07:36:03Zby Agramont, Conrad H., Jr.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492195/?ar">https://learning.oreilly.com/library/view/~/9781597492195/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492195/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492195/?ar</a><br/>Format: Electronic Resources<br/>How to cheat at administering Office communications server 2007ent://SD_ILS/0/SD_ILS:22845122024-06-20T07:36:03Z2024-06-20T07:36:03Zby Piltzecker, Tony, 1975-<br/><a href="https://learning.oreilly.com/library/view/~/9781597492126/?ar">https://learning.oreilly.com/library/view/~/9781597492126/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492126/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492126/?ar</a><br/>Format: Electronic Resources<br/>How to cheat at configuring VmWare ESX serverent://SD_ILS/0/SD_ILS:22846972024-06-20T07:36:03Z2024-06-20T07:36:03Zby Rule, David.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491945/?ar">https://learning.oreilly.com/library/view/~/9781597491945/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491945/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491945/?ar</a><br/>Format: Electronic Resources<br/>Web application vulnerabilities : detect, exploit, preventent://SD_ILS/0/SD_ILS:22856422024-06-20T07:36:03Z2024-06-20T07:36:03Zby Cross, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9781597492096/?ar">https://learning.oreilly.com/library/view/~/9781597492096/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492096/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492096/?ar</a><br/>Format: Electronic Resources<br/>How to cheat at deploying and securing RFIDent://SD_ILS/0/SD_ILS:22856562024-06-20T07:36:03Z2024-06-20T07:36:03Zby Sanghera, Paul.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492300/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492300/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492300/?ar">https://learning.oreilly.com/library/view/~/9781597492300/?ar</a><br/>Format: Electronic Resources<br/>Video conferencing over IP configure, secure, and troubleshootent://SD_ILS/0/SD_ILS:658272024-06-20T07:36:03Z2024-06-20T07:36:03Zby Gough, Michael.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490634">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Implementing digital forensic readiness : from reactive to proactive processent://SD_ILS/0/SD_ILS:23099882024-06-20T07:36:03Z2024-06-20T07:36:03Zby Sachowski, Jason, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128045015/?ar">https://go.oreilly.com/library-access/library/view/-/9780128045015/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128045015/?ar">https://learning.oreilly.com/library/view/~/9780128045015/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128045015">https://learning.oreilly.com/library/view/~/9780128045015</a><br/>Format: Electronic Resources<br/>How to define and build an effective cyber threat intelligence capabilityent://SD_ILS/0/SD_ILS:23054472024-06-20T07:36:03Z2024-06-20T07:36:03Zby Dalziel, Henry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128027301/?ar">https://learning.oreilly.com/library/view/~/9780128027301/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128027301">https://learning.oreilly.com/library/view/~/9780128027301</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128027301/?ar">https://go.oreilly.com/library-access/library/view/-/9780128027301/?ar</a><br/>Format: Electronic Resources<br/>Collaboration with cloud computing : security, social media, and unified communicationsent://SD_ILS/0/SD_ILS:23031052024-06-20T07:36:03Z2024-06-20T07:36:03Zby Messier, Ric.<br/><a href="https://learning.oreilly.com/library/view/~/9780124170407/?ar">https://learning.oreilly.com/library/view/~/9780124170407/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124170407/?ar">https://go.oreilly.com/library-access/library/view/-/9780124170407/?ar</a><br/>Format: Electronic Resources<br/>Federated identity primerent://SD_ILS/0/SD_ILS:22966982024-06-20T07:36:03Z2024-06-20T07:36:03Zby Rountree, Derrick.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124071896/?ar">https://go.oreilly.com/library-access/library/view/-/9780124071896/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124071896/?ar">https://learning.oreilly.com/library/view/~/9780124071896/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124071896">https://learning.oreilly.com/library/view/~/9780124071896</a><br/>Format: Electronic Resources<br/>Digital forensics processing and procedures : meeting the requirements of ISO 17020, ISO 17025, ISO 27001 and best practice requirementsent://SD_ILS/0/SD_ILS:23011602024-06-20T07:36:03Z2024-06-20T07:36:03Zby Watson, David (David Lilburn)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497428/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497428/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497428/?ar">https://learning.oreilly.com/library/view/~/9781597497428/?ar</a><br/>Format: Electronic Resources<br/>Augmented reality : an emerging technologies guide to ARent://SD_ILS/0/SD_ILS:22980602024-06-20T07:36:03Z2024-06-20T07:36:03Zby Kipper, Gregory.<br/><a href="https://learning.oreilly.com/library/view/~/9781597497336/?ar">https://learning.oreilly.com/library/view/~/9781597497336/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597497336/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497336/?ar</a><br/>Format: Electronic Resources<br/>Simple steps to data encryption : a practical guide to secure computingent://SD_ILS/0/SD_ILS:23004102024-06-20T07:36:03Z2024-06-20T07:36:03Zby Loshin, Peter.<br/><a href="https://learning.oreilly.com/library/view/~/9780124114838">https://learning.oreilly.com/library/view/~/9780124114838</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124114838/?ar">https://go.oreilly.com/library-access/library/view/-/9780124114838/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124114838/?ar">https://learning.oreilly.com/library/view/~/9780124114838/?ar</a><br/>Format: Electronic Resources<br/>Web application obfuscation : '-/WAFs.evasion.filters//alert (/obfuscation/)-'ent://SD_ILS/0/SD_ILS:22905082024-06-20T07:36:03Z2024-06-20T07:36:03Zby Heiderich, Mario.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496049/?ar">https://learning.oreilly.com/library/view/~/9781597496049/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597496049/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496049/?ar</a><br/>Format: Electronic Resources<br/>Practical lock picking : a physical penetration tester's training guideent://SD_ILS/0/SD_ILS:22900042024-06-20T07:36:03Z2024-06-20T07:36:03Zby Ollam, Deviant.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496124">https://learning.oreilly.com/library/view/~/9781597496124</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496124/?ar">https://learning.oreilly.com/library/view/~/9781597496124/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597496124/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496124/?ar</a><br/>Format: Electronic Resources<br/>SQL injection attacks and defenseent://SD_ILS/0/SD_ILS:22871882024-06-20T07:36:03Z2024-06-20T07:36:03Zby Clarke, Justin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780080958576/?ar">https://go.oreilly.com/library-access/library/view/-/9780080958576/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780080958576/?ar">https://learning.oreilly.com/library/view/~/9780080958576/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780080958576">https://learning.oreilly.com/library/view/~/9780080958576</a><br/>Format: Electronic Resources<br/>Nmap in the enterprise : your guide to network scanningent://SD_ILS/0/SD_ILS:22845182024-06-20T07:36:03Z2024-06-20T07:36:03Zby Orebaugh, Angela.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492416/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492416/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492416/?ar">https://learning.oreilly.com/library/view/~/9781597492416/?ar</a><br/>Format: Electronic Resources<br/>The best damn Windows Server 2008 book periodent://SD_ILS/0/SD_ILS:22865082024-06-20T07:36:03Z2024-06-20T07:36:03Zby Piltzecker, Tony, 1975-<br/><a href="https://learning.oreilly.com/library/view/~/9781597492737/?ar">https://learning.oreilly.com/library/view/~/9781597492737/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492737/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492737/?ar</a><br/>Format: Electronic Resources<br/>No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfingent://SD_ILS/0/SD_ILS:22851432024-06-20T07:36:03Z2024-06-20T07:36:03Zby Long, Johnny.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492157/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492157/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492157/?ar">https://learning.oreilly.com/library/view/~/9781597492157/?ar</a><br/>Format: Electronic Resources<br/>The art of war for security managers : 10 steps to enhancing organizational effectivenessent://SD_ILS/0/SD_ILS:22837462024-06-20T07:36:03Z2024-06-20T07:36:03Zby Watson, Scott A.<br/><a href="https://learning.oreilly.com/library/view/~/9780750679855/?ar">https://learning.oreilly.com/library/view/~/9780750679855/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780750679855/?ar">https://go.oreilly.com/library-access/library/view/-/9780750679855/?ar</a><br/>Format: Electronic Resources<br/>ASP.NET web developer's guideent://SD_ILS/0/SD_ILS:22877852024-06-20T07:36:03Z2024-06-20T07:36:03Zby Āhamada, Mesabāha.<br/><a href="https://learning.oreilly.com/library/view/~/9781928994510">https://learning.oreilly.com/library/view/~/9781928994510</a>
<a href="https://learning.oreilly.com/library/view/~/9781928994510/?ar">https://learning.oreilly.com/library/view/~/9781928994510/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781928994510/?ar">https://go.oreilly.com/library-access/library/view/-/9781928994510/?ar</a><br/>Format: Electronic Resources<br/>Integrating Python with Leading Computer Forensics Platforms.ent://SD_ILS/0/SD_ILS:23116132024-06-20T07:36:03Z2024-06-20T07:36:03Zby Hosmer, Chet.<br/><a href="https://learning.oreilly.com/library/view/~/9780128099506">https://learning.oreilly.com/library/view/~/9780128099506</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128099506/?ar">https://go.oreilly.com/library-access/library/view/-/9780128099506/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128099506/?ar">https://learning.oreilly.com/library/view/~/9780128099506/?ar</a><br/>Format: Electronic Resources<br/>The cloud security ecosystem : technical, legal, business and management issuesent://SD_ILS/0/SD_ILS:22087262024-06-20T07:36:03Z2024-06-20T07:36:03Zby Ko, Ryan, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2060804">Click to View</a><br/>Format: Electronic Resources<br/>Information hiding in speech signals for secure communicationent://SD_ILS/0/SD_ILS:23045652024-06-20T07:36:03Z2024-06-20T07:36:03Zby Wu, Zhijun, 1965 May-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128013281/?ar">https://go.oreilly.com/library-access/library/view/-/9780128013281/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128013281/?ar">https://learning.oreilly.com/library/view/~/9780128013281/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128013281">https://learning.oreilly.com/library/view/~/9780128013281</a><br/>Format: Electronic Resources<br/>Social engineering penetration testing : executing social engineering pen tests, assessments and defenseent://SD_ILS/0/SD_ILS:23032722024-06-20T07:36:03Z2024-06-20T07:36:03Zby Watson, Gavin, 1982- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780124201248">https://learning.oreilly.com/library/view/~/9780124201248</a>
<a href="https://learning.oreilly.com/library/view/~/9780124201248/?ar">https://learning.oreilly.com/library/view/~/9780124201248/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124201248/?ar">https://go.oreilly.com/library-access/library/view/-/9780124201248/?ar</a><br/>Format: Electronic Resources<br/>Investigating internet crimes : an introduction to solving crimes in cyberspaceent://SD_ILS/0/SD_ILS:23009182024-06-20T07:36:03Z2024-06-20T07:36:03Zby Shipley, Todd G.<br/><a href="https://learning.oreilly.com/library/view/~/9780124078178">https://learning.oreilly.com/library/view/~/9780124078178</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124078178/?ar">https://go.oreilly.com/library-access/library/view/-/9780124078178/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124078178/?ar">https://learning.oreilly.com/library/view/~/9780124078178/?ar</a><br/>Format: Electronic Resources<br/>FISMA and the risk management framework the new practice of federal cyber securityent://SD_ILS/0/SD_ILS:22060532024-06-20T07:36:03Z2024-06-20T07:36:03Zby Gantz, Stephen D.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1074427">Click to View</a><br/>Format: Electronic Resources<br/>Advanced persistent threat : understanding the danger and how to protect your organizationent://SD_ILS/0/SD_ILS:22968452024-06-20T07:36:03Z2024-06-20T07:36:03Zby Cole, Eric.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499491">https://learning.oreilly.com/library/view/~/9781597499491</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499491/?ar">https://learning.oreilly.com/library/view/~/9781597499491/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597499491/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499491/?ar</a><br/>Format: Electronic Resources<br/>UTM security with Fortinet : Mastering FortiOSent://SD_ILS/0/SD_ILS:22966172024-06-20T07:36:03Z2024-06-20T07:36:03Zby Tam, Kenneth.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497473/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497473/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497473/?ar">https://learning.oreilly.com/library/view/~/9781597497473/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497473">https://learning.oreilly.com/library/view/~/9781597497473</a><br/>Format: Electronic Resources<br/>Applied network security monitoring : collection, detection, and analysisent://SD_ILS/0/SD_ILS:23011512024-06-20T07:36:03Z2024-06-20T07:36:03Zby Sanders, Chris.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124172081/?ar">https://go.oreilly.com/library-access/library/view/-/9780124172081/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124172081/?ar">https://learning.oreilly.com/library/view/~/9780124172081/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124172081">https://learning.oreilly.com/library/view/~/9780124172081</a><br/>Format: Electronic Resources<br/>Moving to the cloud developing apps in the new world of cloud computingent://SD_ILS/0/SD_ILS:22055732024-06-20T07:36:03Z2024-06-20T07:36:03Zby Sitaram, Dinkar.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=847478">Click to View</a><br/>Format: Electronic Resources<br/>Securing SQL server : protecting your database from attackersent://SD_ILS/0/SD_ILS:22953532024-06-20T07:36:03Z2024-06-20T07:36:03Zby Cherry, Denny.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499477/?ar">https://learning.oreilly.com/library/view/~/9781597499477/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597499477/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499477/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499477">https://learning.oreilly.com/library/view/~/9781597499477</a><br/>Format: Electronic Resources<br/>Migrating to the cloud : Oracle client/server modernizationent://SD_ILS/0/SD_ILS:22926492024-06-20T07:36:03Z2024-06-20T07:36:03Zby Laszewski, Tom.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496476/?ar">https://learning.oreilly.com/library/view/~/9781597496476/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597496476/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496476/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496476">https://learning.oreilly.com/library/view/~/9781597496476</a><br/>Format: Electronic Resources<br/>Low tech hacking : street smarts for security professionalsent://SD_ILS/0/SD_ILS:22932292024-06-20T07:36:03Z2024-06-20T07:36:03Zby Wiles, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496650">https://learning.oreilly.com/library/view/~/9781597496650</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496650/?ar">https://learning.oreilly.com/library/view/~/9781597496650/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597496650/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496650/?ar</a><br/>Format: Electronic Resources<br/>The basics of digital forensics : the primer for getting started in digital forensicsent://SD_ILS/0/SD_ILS:22938072024-06-20T07:36:03Z2024-06-20T07:36:03Zby Sammons, John.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496612">https://learning.oreilly.com/library/view/~/9781597496612</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496612/?ar">https://learning.oreilly.com/library/view/~/9781597496612/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597496612/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496612/?ar</a><br/>Format: Electronic Resources<br/>Metrics and methods for security risk managementent://SD_ILS/0/SD_ILS:22893692024-06-20T07:36:03Z2024-06-20T07:36:03Zby Young, Carl S.<br/><a href="https://learning.oreilly.com/library/view/~/9781856179782">https://learning.oreilly.com/library/view/~/9781856179782</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781856179782/?ar">https://go.oreilly.com/library-access/library/view/-/9781856179782/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781856179782/?ar">https://learning.oreilly.com/library/view/~/9781856179782/?ar</a><br/>Format: Electronic Resources<br/>Network and system securityent://SD_ILS/0/SD_ILS:22888372024-06-20T07:36:03Z2024-06-20T07:36:03Zby Vacca, John R.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495356">https://learning.oreilly.com/library/view/~/9781597495356</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495356/?ar">https://learning.oreilly.com/library/view/~/9781597495356/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495356/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495356/?ar</a><br/>Format: Electronic Resources<br/>Microsoft virtualization : master Microsoft Server, dektop, application, and presentation virtualizationent://SD_ILS/0/SD_ILS:22897102024-06-20T07:36:03Z2024-06-20T07:36:03Zby Olzak, Thomas.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494311/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494311/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494311/?ar">https://learning.oreilly.com/library/view/~/9781597494311/?ar</a><br/>Format: Electronic Resources<br/>Next generation SSH2 implementation : securing data in motionent://SD_ILS/0/SD_ILS:22859862024-06-20T07:36:03Z2024-06-20T07:36:03Zby Liu, Dale.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492836/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492836/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492836/?ar">https://learning.oreilly.com/library/view/~/9781597492836/?ar</a><br/>Format: Electronic Resources<br/>Google hacking for penetration testers. Volume 2ent://SD_ILS/0/SD_ILS:22845092024-06-20T07:36:03Z2024-06-20T07:36:03Zby Long, Johnny.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491761/?ar">https://learning.oreilly.com/library/view/~/9781597491761/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491761/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491761/?ar</a><br/>Format: Electronic Resources<br/>Secrets stolen, fortunes lost : preventing intellectual property theft and economic espionage in the 21st centuryent://SD_ILS/0/SD_ILS:22845202024-06-20T07:36:03Z2024-06-20T07:36:03Zby Burgess, Christopher.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492553/?ar">https://learning.oreilly.com/library/view/~/9781597492553/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492553/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492553/?ar</a><br/>Format: Electronic Resources<br/>The official CHFI study guide (Exam 312-49) : for computer hacking forensic investigator.ent://SD_ILS/0/SD_ILS:22837092024-06-20T07:36:03Z2024-06-20T07:36:03Zby Kleiman, Dave.<br/><a href="https://www.sciencedirect.com/science/book/9781597491976">https://www.sciencedirect.com/science/book/9781597491976</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491976/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491976/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491976/?ar">https://learning.oreilly.com/library/view/~/9781597491976/?ar</a><br/>Format: Electronic Resources<br/>Cyber crime investigations : bridging the gaps between security professionals, law enforcement, and prosecutorsent://SD_ILS/0/SD_ILS:22835662024-06-20T07:36:03Z2024-06-20T07:36:03Zby Reyes, Anthony.<br/><a href="https://www.sciencedirect.com/science/book/9781597491334">https://www.sciencedirect.com/science/book/9781597491334</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491334/?ar">https://learning.oreilly.com/library/view/~/9781597491334/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491334/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491334/?ar</a><br/>Format: Electronic Resources<br/>FISMA certification & accreditation handbookent://SD_ILS/0/SD_ILS:22836392024-06-20T07:36:03Z2024-06-20T07:36:03Zby Taylor, Laura.<br/><a href="https://www.sciencedirect.com/science/book/9781597491167">https://www.sciencedirect.com/science/book/9781597491167</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491167/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491167/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491167/?ar">https://learning.oreilly.com/library/view/~/9781597491167/?ar</a><br/>Format: Electronic Resources<br/>Techno security's guide to securing SCADAent://SD_ILS/0/SD_ILS:22851452024-06-20T07:36:03Z2024-06-20T07:36:03Zby Wiles, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492829/?ar">https://learning.oreilly.com/library/view/~/9781597492829/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492829/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492829/?ar</a><br/>Format: Electronic Resources<br/>How to own a shadow : the chase for Knuthent://SD_ILS/0/SD_ILS:23029392024-06-20T07:36:03Z2024-06-20T07:36:03Zby Long, Johnny.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490818/?ar">https://learning.oreilly.com/library/view/~/9781597490818/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490818/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490818/?ar</a><br/>Format: Electronic Resources<br/>Configuring SonicWALL firewallsent://SD_ILS/0/SD_ILS:22821622024-06-20T07:36:03Z2024-06-20T07:36:03Zby Lathem, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/1597492507">https://learning.oreilly.com/library/view/~/1597492507</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1597492507/?ar">https://go.oreilly.com/library-access/library/view/-/1597492507/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1597492507/?ar">https://learning.oreilly.com/library/view/~/1597492507/?ar</a><br/>Format: Electronic Resources<br/>Building a VoIP network with Nortel's multimedia communication server 5100ent://SD_ILS/0/SD_ILS:22833792024-06-20T07:36:03Z2024-06-20T07:36:03Zby Chafflin, Larry.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490788">https://learning.oreilly.com/library/view/~/9781597490788</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490788/?ar">https://learning.oreilly.com/library/view/~/9781597490788/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490788/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490788/?ar</a><br/>Format: Electronic Resources<br/>Snort Intrusion Detection 2.0.ent://SD_ILS/0/SD_ILS:22869602024-06-20T07:36:03Z2024-06-20T07:36:03Zby Russell, Ryan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780080481005/?ar">https://go.oreilly.com/library-access/library/view/-/9780080481005/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780080481005/?ar">https://learning.oreilly.com/library/view/~/9780080481005/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780080481005">https://learning.oreilly.com/library/view/~/9780080481005</a><br/>Format: Electronic Resources<br/>VB.Net Web Developer's Guide.ent://SD_ILS/0/SD_ILS:22869612024-06-20T07:36:03Z2024-06-20T07:36:03Zby Wakefield, Cameron.<br/><a href="https://learning.oreilly.com/library/view/~/9781928994480/?ar">https://learning.oreilly.com/library/view/~/9781928994480/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781928994480/?ar">https://go.oreilly.com/library-access/library/view/-/9781928994480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781928994480">https://learning.oreilly.com/library/view/~/9781928994480</a><br/>Format: Electronic Resources<br/>Executing Windows command line investigations : while ensuring evidentiary integrityent://SD_ILS/0/SD_ILS:23108062024-06-20T07:36:03Z2024-06-20T07:36:03Zby Hosmer, Chet.<br/><a href="https://learning.oreilly.com/library/view/~/9780128092712">https://learning.oreilly.com/library/view/~/9780128092712</a>
<a href="https://learning.oreilly.com/library/view/~/9780128092712/?ar">https://learning.oreilly.com/library/view/~/9780128092712/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128092712/?ar">https://go.oreilly.com/library-access/library/view/-/9780128092712/?ar</a><br/>Format: Electronic Resources<br/>Windows performance analysis field guideent://SD_ILS/0/SD_ILS:23043352024-06-20T07:36:03Z2024-06-20T07:36:03Zby Huffman, Clint.<br/><a href="https://learning.oreilly.com/library/view/~/9780124167018">https://learning.oreilly.com/library/view/~/9780124167018</a>
<a href="https://learning.oreilly.com/library/view/~/9780124167018/?ar">https://learning.oreilly.com/library/view/~/9780124167018/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124167018/?ar">https://go.oreilly.com/library-access/library/view/-/9780124167018/?ar</a><br/>Format: Electronic Resources<br/>Cyber reconnaissance surveillance and defenseent://SD_ILS/0/SD_ILS:23049792024-06-20T07:36:03Z2024-06-20T07:36:03Zby Shimonski, Robert, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128013083">https://learning.oreilly.com/library/view/~/9780128013083</a>
<a href="https://learning.oreilly.com/library/view/~/9780128013083/?ar">https://learning.oreilly.com/library/view/~/9780128013083/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128013083/?ar">https://go.oreilly.com/library-access/library/view/-/9780128013083/?ar</a><br/>Format: Electronic Resources<br/>Job reconnaissance : using hacking skills to win the job hunt gameent://SD_ILS/0/SD_ILS:23011692024-06-20T07:36:03Z2024-06-20T07:36:03Zby More, Josh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780124166011">https://learning.oreilly.com/library/view/~/9780124166011</a>
<a href="https://learning.oreilly.com/library/view/~/9780124166011/?ar">https://learning.oreilly.com/library/view/~/9780124166011/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124166011/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166011/?ar</a><br/>Format: Electronic Resources<br/>Optimizing IEEE 802.11i resource and security essentials : for mobile and stationary devicesent://SD_ILS/0/SD_ILS:23054462024-06-20T07:36:03Z2024-06-20T07:36:03Zby Naraei, Parisa, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128022221/?ar">https://go.oreilly.com/library-access/library/view/-/9780128022221/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128022221">https://learning.oreilly.com/library/view/~/9780128022221</a>
<a href="https://learning.oreilly.com/library/view/~/9780128022221/?ar">https://learning.oreilly.com/library/view/~/9780128022221/?ar</a><br/>Format: Electronic Resources<br/>Hacking with Kali : practical penetration testing techniquesent://SD_ILS/0/SD_ILS:23019462024-06-20T07:36:03Z2024-06-20T07:36:03Zby Broad, James.<br/><a href="https://learning.oreilly.com/library/view/~/9780124077492">https://learning.oreilly.com/library/view/~/9780124077492</a>
<a href="https://learning.oreilly.com/library/view/~/9780124077492/?ar">https://learning.oreilly.com/library/view/~/9780124077492/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124077492/?ar">https://go.oreilly.com/library-access/library/view/-/9780124077492/?ar</a><br/>Format: Electronic Resources<br/>Identity and access management : business performance through connected intelligenceent://SD_ILS/0/SD_ILS:23019312024-06-20T07:36:03Z2024-06-20T07:36:03Zby Osmanoglu, T. Ertem.<br/><a href="https://learning.oreilly.com/library/view/~/9780124081406/?ar">https://learning.oreilly.com/library/view/~/9780124081406/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124081406">https://learning.oreilly.com/library/view/~/9780124081406</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124081406/?ar">https://go.oreilly.com/library-access/library/view/-/9780124081406/?ar</a><br/>Format: Electronic Resources<br/>The basics of IT audit : Purposes, processes, and practical information.ent://SD_ILS/0/SD_ILS:23015012024-06-20T07:36:03Z2024-06-20T07:36:03Zby Gantz, Stephen D.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124171596/?ar">https://go.oreilly.com/library-access/library/view/-/9780124171596/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124171596/?ar">https://learning.oreilly.com/library/view/~/9780124171596/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124171596">https://learning.oreilly.com/library/view/~/9780124171596</a><br/>Format: Electronic Resources<br/>Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocolsent://SD_ILS/0/SD_ILS:22966162024-06-20T07:36:03Z2024-06-20T07:36:03Zby Raggo, Michael T.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497435/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497435/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497435/?ar">https://learning.oreilly.com/library/view/~/9781597497435/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497435">https://learning.oreilly.com/library/view/~/9781597497435</a><br/>Format: Electronic Resources<br/>Windows 2012 server network security : securing your windows network systems and infrastructureent://SD_ILS/0/SD_ILS:22984942024-06-20T07:36:03Z2024-06-20T07:36:03Zby Rountree, Derrick.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499583/?ar">https://learning.oreilly.com/library/view/~/9781597499583/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597499583/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499583/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499583">https://learning.oreilly.com/library/view/~/9781597499583</a><br/>Format: Electronic Resources<br/>Cybercrime investigative case management : using digital forensics and investigative techniques to identify cybercrime suspectsent://SD_ILS/0/SD_ILS:22985262024-06-20T07:36:03Z2024-06-20T07:36:03Zby Shavers, Brett.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124095069/?ar">https://go.oreilly.com/library-access/library/view/-/9780124095069/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124095069">https://learning.oreilly.com/library/view/~/9780124095069</a>
<a href="https://learning.oreilly.com/library/view/~/9780124095069/?ar">https://learning.oreilly.com/library/view/~/9780124095069/?ar</a><br/>Format: Electronic Resources<br/>The hacker's guide to OS X : exploiting OS X from the root-upent://SD_ILS/0/SD_ILS:22985312024-06-20T07:36:03Z2024-06-20T07:36:03Zby Bathurst, Robert.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499507">https://learning.oreilly.com/library/view/~/9781597499507</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597499507/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499507/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499507/?ar">https://learning.oreilly.com/library/view/~/9781597499507/?ar</a><br/>Format: Electronic Resources<br/>Logging and log management : the authoritative guide to understanding the concepts surrounding logging and log managementent://SD_ILS/0/SD_ILS:22968512024-06-20T07:36:03Z2024-06-20T07:36:03Zby Chuvakin, Anton A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597496353/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496353/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496353/?ar">https://learning.oreilly.com/library/view/~/9781597496353/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496353">https://learning.oreilly.com/library/view/~/9781597496353</a><br/>Format: Electronic Resources<br/>Applied cyber security and the smart grid : implementing security controls into the modern power infrastructureent://SD_ILS/0/SD_ILS:22989172024-06-20T07:36:03Z2024-06-20T07:36:03Zby Knapp, Eric D.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499989/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499989/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499989/?ar">https://learning.oreilly.com/library/view/~/9781597499989/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499989">https://learning.oreilly.com/library/view/~/9781597499989</a><br/>Format: Electronic Resources<br/>The basics of web hacking : tools and techniques to attack the webent://SD_ILS/0/SD_ILS:23000582024-06-20T07:36:03Z2024-06-20T07:36:03Zby Pauli, Joshua J.<br/><a href="https://learning.oreilly.com/library/view/~/9780124166004/?ar">https://learning.oreilly.com/library/view/~/9780124166004/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124166004/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166004/?ar</a><br/>Format: Electronic Resources<br/>Introduction to cyber-warfare : a multidisciplinary approachent://SD_ILS/0/SD_ILS:23001962024-06-20T07:36:03Z2024-06-20T07:36:03Zby Shakarian, Paulo.<br/><a href="https://learning.oreilly.com/library/view/~/9780124078147">https://learning.oreilly.com/library/view/~/9780124078147</a>
<a href="https://learning.oreilly.com/library/view/~/9780124078147/?ar">https://learning.oreilly.com/library/view/~/9780124078147/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124078147/?ar">https://go.oreilly.com/library-access/library/view/-/9780124078147/?ar</a><br/>Format: Electronic Resources<br/>Coding for penetration testers building better toolsent://SD_ILS/0/SD_ILS:22054702024-06-20T07:36:03Z2024-06-20T07:36:03Zby Andress, Jason.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=773396">Click to View</a><br/>Format: Electronic Resources<br/>PCI compliance : understand and implement effective PCI data security standard compliance, third editionent://SD_ILS/0/SD_ILS:22980672024-06-20T07:36:03Z2024-06-20T07:36:03Zby Williams, Branden R.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499484/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499484/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499484/?ar">https://learning.oreilly.com/library/view/~/9781597499484/?ar</a><br/>Format: Electronic Resources<br/>Windows forensic analysis toolkitent://SD_ILS/0/SD_ILS:22958232024-06-20T07:36:03Z2024-06-20T07:36:03Zby Carvey, Harlan A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497275/?ar">https://learning.oreilly.com/library/view/~/9781597497275/?ar</a><br/>Format: Electronic Resources<br/>Network intrusion analysis : methodologies, tools, and techniques for incident analysis and responseent://SD_ILS/0/SD_ILS:22963922024-06-20T07:36:03Z2024-06-20T07:36:03Zby Fichera, Joe, 1966-<br/><a href="https://learning.oreilly.com/library/view/~/9781597499620">https://learning.oreilly.com/library/view/~/9781597499620</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499620/?ar">https://learning.oreilly.com/library/view/~/9781597499620/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597499620/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499620/?ar</a><br/>Format: Electronic Resources<br/>Information security risk assessment toolkit : practical assessments through data collection and data analysisent://SD_ILS/0/SD_ILS:22985192024-06-20T07:36:03Z2024-06-20T07:36:03Zby Talabis, Mark Ryan M.<br/><a href="https://learning.oreilly.com/library/view/~/9781597497350/?ar">https://learning.oreilly.com/library/view/~/9781597497350/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597497350/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497350/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497350">https://learning.oreilly.com/library/view/~/9781597497350</a><br/>Format: Electronic Resources<br/>Hacking web apps : detecting and preventing web application security problemsent://SD_ILS/0/SD_ILS:22959122024-06-20T07:36:03Z2024-06-20T07:36:03Zby Shema, Mike.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499514/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499514/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499514/?ar">https://learning.oreilly.com/library/view/~/9781597499514/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499514">https://learning.oreilly.com/library/view/~/9781597499514</a><br/>Format: Electronic Resources<br/>Malware forensics field guide for Windows systems : digital forensics field guidesent://SD_ILS/0/SD_ILS:22946822024-06-20T07:36:03Z2024-06-20T07:36:03Zby Malin, Cameron H.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494724/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494724/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494724/?ar">https://learning.oreilly.com/library/view/~/9781597494724/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494724">https://learning.oreilly.com/library/view/~/9781597494724</a><br/>Format: Electronic Resources<br/>Security risk management : building an information security risk management program from the ground upent://SD_ILS/0/SD_ILS:22913512024-06-20T07:36:03Z2024-06-20T07:36:03Zby Wheeler, Evan.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496155">https://learning.oreilly.com/library/view/~/9781597496155</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496155/?ar">https://learning.oreilly.com/library/view/~/9781597496155/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597496155/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496155/?ar</a><br/>Format: Electronic Resources<br/>Moving to the cloud : developing apps in the new world of cloud computingent://SD_ILS/0/SD_ILS:22931412024-06-20T07:36:03Z2024-06-20T07:36:03Zby Sitaram, Dinkar.<br/><a href="https://learning.oreilly.com/library/view/~/9781597497251">https://learning.oreilly.com/library/view/~/9781597497251</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497251/?ar">https://learning.oreilly.com/library/view/~/9781597497251/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597497251/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497251/?ar</a><br/>Format: Electronic Resources<br/>Security for Microsoft Windows system administrators : introduction to key information security conceptsent://SD_ILS/0/SD_ILS:22902872024-06-20T07:36:03Z2024-06-20T07:36:03Zby Rountree, Derrick.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495943/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495943/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495943/?ar">https://learning.oreilly.com/library/view/~/9781597495943/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495943">https://learning.oreilly.com/library/view/~/9781597495943</a><br/>Format: Electronic Resources<br/>Ninja hacking : unconventional penetration testing tactics and techniquesent://SD_ILS/0/SD_ILS:22903042024-06-20T07:36:03Z2024-06-20T07:36:03Zby Wilhelm, Thomas.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495899">https://learning.oreilly.com/library/view/~/9781597495899</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495899/?ar">https://learning.oreilly.com/library/view/~/9781597495899/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495899/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495899/?ar</a><br/>Format: Electronic Resources<br/>Xbox 360 forensics : a digital forensics guide to examining artifactsent://SD_ILS/0/SD_ILS:22909782024-06-20T07:36:03Z2024-06-20T07:36:03Zby Bolt, Steven.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496230">https://learning.oreilly.com/library/view/~/9781597496230</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597496230/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496230/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496230/?ar">https://learning.oreilly.com/library/view/~/9781597496230/?ar</a><br/>Format: Electronic Resources<br/>Cyber warfare : techniques, tactics and tools for security practitionersent://SD_ILS/0/SD_ILS:22925012024-06-20T07:36:03Z2024-06-20T07:36:03Zby Andress, Jason.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597496377/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496377/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496377/?ar">https://learning.oreilly.com/library/view/~/9781597496377/?ar</a><br/>Format: Electronic Resources<br/>Cybercrime and espionage : an analysis of subversive multi-vector threatsent://SD_ILS/0/SD_ILS:22908382024-06-20T07:36:03Z2024-06-20T07:36:03Zby Gragido, Will.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597496148/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496148/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496148">https://learning.oreilly.com/library/view/~/9781597496148</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496148/?ar">https://learning.oreilly.com/library/view/~/9781597496148/?ar</a><br/>Format: Electronic Resources<br/>Securing SQL server : protecting your database from attackersent://SD_ILS/0/SD_ILS:22909912024-06-20T07:36:03Z2024-06-20T07:36:03Zby Cherry, Denny.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496254">https://learning.oreilly.com/library/view/~/9781597496254</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496254/?ar">https://learning.oreilly.com/library/view/~/9781597496254/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597496254/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496254/?ar</a><br/>Format: Electronic Resources<br/>Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systemsent://SD_ILS/0/SD_ILS:22921292024-06-20T07:36:03Z2024-06-20T07:36:03Zby Knapp, Eric.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597496452/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496452/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496452/?ar">https://learning.oreilly.com/library/view/~/9781597496452/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496452">https://learning.oreilly.com/library/view/~/9781597496452</a><br/>Format: Electronic Resources<br/>Securing the cloud : cloud computer security techniques and tacticsent://SD_ILS/0/SD_ILS:22924912024-06-20T07:36:03Z2024-06-20T07:36:03Zby Winkler, J. R. (Joachim R.)<br/><a href="https://learning.oreilly.com/library/view/~/9781597495929">https://learning.oreilly.com/library/view/~/9781597495929</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495929/?ar">https://learning.oreilly.com/library/view/~/9781597495929/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495929/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495929/?ar</a><br/>Format: Electronic Resources<br/>Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and dataent://SD_ILS/0/SD_ILS:22891492024-06-20T07:36:03Z2024-06-20T07:36:03Zby Lillard, Terrence.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495387/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495387/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495387/?ar">https://learning.oreilly.com/library/view/~/9781597495387/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495387">https://learning.oreilly.com/library/view/~/9781597495387</a><br/>Format: Electronic Resources<br/>PCI compliance : understand and implement effective PCI data security standard compliance.ent://SD_ILS/0/SD_ILS:22886412024-06-20T07:36:03Z2024-06-20T07:36:03Zby Chuvakin, Anton.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494991/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494991/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494991/?ar">https://learning.oreilly.com/library/view/~/9781597494991/?ar</a><br/>Format: Electronic Resources<br/>Microsoft Windows Server 2008 R2 administrator's reference : the administrator's essential guideent://SD_ILS/0/SD_ILS:22896942024-06-20T07:36:03Z2024-06-20T07:36:03Zby Hannifin, Dustin.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495783">https://learning.oreilly.com/library/view/~/9781597495783</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495783/?ar">https://learning.oreilly.com/library/view/~/9781597495783/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495783/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495783/?ar</a><br/>Format: Electronic Resources<br/>Citrix XenDesktop implementation : a practical guide for IT professionalsent://SD_ILS/0/SD_ILS:22898032024-06-20T07:36:03Z2024-06-20T07:36:03Zby James, Gareth R.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495820">https://learning.oreilly.com/library/view/~/9781597495820</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495820/?ar">https://learning.oreilly.com/library/view/~/9781597495820/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495820/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495820/?ar</a><br/>Format: Electronic Resources<br/>Dissecting the hack : the f0rb1dd3n networkent://SD_ILS/0/SD_ILS:22907002024-06-20T07:36:03Z2024-06-20T07:36:03Zby Street, Jayson E.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495684/?ar">https://learning.oreilly.com/library/view/~/9781597495684/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495684/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495684/?ar</a><br/>Format: Electronic Resources<br/>Cisco router and switch forensics : investigating and analyzing malicious network activityent://SD_ILS/0/SD_ILS:22871802024-06-20T07:36:03Z2024-06-20T07:36:03Zby Liu, Dale.<br/><a href="https://learning.oreilly.com/library/view/~/9781597494182">https://learning.oreilly.com/library/view/~/9781597494182</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494182/?ar">https://learning.oreilly.com/library/view/~/9781597494182/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597494182/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494182/?ar</a><br/>Format: Electronic Resources<br/>E-discovery : creating and managing an enterprisewide program : a technical guide to digital investigation and litigation supportent://SD_ILS/0/SD_ILS:22865292024-06-20T07:36:03Z2024-06-20T07:36:03Zby Schuler, Karen.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492966/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492966/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492966/?ar">https://learning.oreilly.com/library/view/~/9781597492966/?ar</a><br/>Format: Electronic Resources<br/>Mobile malware attacks and defenseent://SD_ILS/0/SD_ILS:22944762024-06-20T07:36:03Z2024-06-20T07:36:03Zby Dunham, Ken.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492980/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492980/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492980/?ar">https://learning.oreilly.com/library/view/~/9781597492980/?ar</a><br/>Format: Electronic Resources<br/>Cisco CCNA/CCENT exam 640-802, 640-822, 640-816 preparation kitent://SD_ILS/0/SD_ILS:22876292024-06-20T07:36:03Z2024-06-20T07:36:03Zby Liu, Dale.<br/><a href="https://learning.oreilly.com/library/view/~/9781597493062/?ar">https://learning.oreilly.com/library/view/~/9781597493062/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597493062/?ar">https://go.oreilly.com/library-access/library/view/-/9781597493062/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597493062">https://learning.oreilly.com/library/view/~/9781597493062</a><br/>Format: Electronic Resources<br/>OSSEC host-based intrusion detection guideent://SD_ILS/0/SD_ILS:22851402024-06-20T07:36:03Z2024-06-20T07:36:03Zby Hay, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492409">https://learning.oreilly.com/library/view/~/9781597492409</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492409/?ar">https://learning.oreilly.com/library/view/~/9781597492409/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492409/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492409/?ar</a><br/>Format: Electronic Resources<br/>Microsoft forefront security administration guideent://SD_ILS/0/SD_ILS:22845172024-06-20T07:36:03Z2024-06-20T07:36:03Zby Varsalone, Jesse.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492447">https://learning.oreilly.com/library/view/~/9781597492447</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492447/?ar">https://learning.oreilly.com/library/view/~/9781597492447/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492447/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492447/?ar</a><br/>Format: Electronic Resources<br/>Check Point NGX R65 security administrationent://SD_ILS/0/SD_ILS:22845192024-06-20T07:36:03Z2024-06-20T07:36:03Zby Bonnell, Ralph.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492454/?ar">https://learning.oreilly.com/library/view/~/9781597492454/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492454/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492454/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492454">https://learning.oreilly.com/library/view/~/9781597492454</a><br/>Format: Electronic Resources<br/>Malware forensics : investigating and analyzing malicious codeent://SD_ILS/0/SD_ILS:22856932024-06-20T07:36:03Z2024-06-20T07:36:03Zby Aquilina, James M.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492683/?ar">https://learning.oreilly.com/library/view/~/9781597492683/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492683/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492683/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492683">https://learning.oreilly.com/library/view/~/9781597492683</a><br/>Format: Electronic Resources<br/>Securing Windows server 2008 : prevent attacks from outside and inside your organization.ent://SD_ILS/0/SD_ILS:22851412024-06-20T07:36:03Z2024-06-20T07:36:03Z<a href="https://learning.oreilly.com/library/view/~/9781597492805">https://learning.oreilly.com/library/view/~/9781597492805</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492805/?ar">https://learning.oreilly.com/library/view/~/9781597492805/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492805/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492805/?ar</a><br/>Format: Electronic Resources<br/>Securing Citrix XenApp Server in the enterpriseent://SD_ILS/0/SD_ILS:22851442024-06-20T07:36:03Z2024-06-20T07:36:03Zby Bin Azad, Tariq.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492812/?ar">https://learning.oreilly.com/library/view/~/9781597492812/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492812/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492812/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492812">https://learning.oreilly.com/library/view/~/9781597492812</a><br/>Format: Electronic Resources<br/>Integrating ISA Server 2006 with Microsoft Exchange 2007ent://SD_ILS/0/SD_ILS:22851472024-06-20T07:36:03Z2024-06-20T07:36:03Zby Strachan, Fergus.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492751/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492751/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492751/?ar">https://learning.oreilly.com/library/view/~/9781597492751/?ar</a><br/>Format: Electronic Resources<br/>Kismet hackingent://SD_ILS/0/SD_ILS:22851482024-06-20T07:36:03Z2024-06-20T07:36:03Zby Haines, Brad.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491174">https://learning.oreilly.com/library/view/~/9781597491174</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491174/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491174/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491174/?ar">https://learning.oreilly.com/library/view/~/9781597491174/?ar</a><br/>Format: Electronic Resources<br/>Reverse engineering code with IDA Proent://SD_ILS/0/SD_ILS:22851512024-06-20T07:36:03Z2024-06-20T07:36:03Zby Ferguson, Justin.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492379/?ar">https://learning.oreilly.com/library/view/~/9781597492379/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492379/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492379/?ar</a><br/>Format: Electronic Resources<br/>Nagios 3 enterprise network monitoring : including plug-ins and hardware devicesent://SD_ILS/0/SD_ILS:22851532024-06-20T07:36:03Z2024-06-20T07:36:03Zby Schubert, Max.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492676/?ar">https://learning.oreilly.com/library/view/~/9781597492676/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492676/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492676/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492676">https://learning.oreilly.com/library/view/~/9781597492676</a><br/>Format: Electronic Resources<br/>XSS attacks : cross-site scripting exploits and defenseent://SD_ILS/0/SD_ILS:22839902024-06-20T07:36:03Z2024-06-20T07:36:03Zby Grossman, Jeremiah.<br/><a href="https://learning.oreilly.com/library/view/~/9780080553405/?ar">https://learning.oreilly.com/library/view/~/9780080553405/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780080553405/?ar">https://go.oreilly.com/library-access/library/view/-/9780080553405/?ar</a>
<a href="https://www.sciencedirect.com/science/book/9781597491549">https://www.sciencedirect.com/science/book/9781597491549</a><br/>Format: Electronic Resources<br/>How to cheat at securing your networkent://SD_ILS/0/SD_ILS:22846302024-06-20T07:36:03Z2024-06-20T07:36:03Zby Dubrawsky, Ido.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492317/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492317/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492317/?ar">https://learning.oreilly.com/library/view/~/9781597492317/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492317">https://learning.oreilly.com/library/view/~/9781597492317</a><br/>Format: Electronic Resources<br/>How to cheat at configuring Exchange server 2007 : including Outlook web, mobile, and voice accessent://SD_ILS/0/SD_ILS:22835672024-06-20T07:36:03Z2024-06-20T07:36:03Zby Walther, Henrik.<br/><a href="https://www.sciencedirect.com/science/book/9781597491372">https://www.sciencedirect.com/science/book/9781597491372</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491372/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491372/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491372/?ar">https://learning.oreilly.com/library/view/~/9781597491372/?ar</a><br/>Format: Electronic Resources<br/>Alternate data storage forensicsent://SD_ILS/0/SD_ILS:22835692024-06-20T07:36:03Z2024-06-20T07:36:03Zby Schroader, Amber.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780080554754/?ar">https://go.oreilly.com/library-access/library/view/-/9780080554754/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780080554754/?ar">https://learning.oreilly.com/library/view/~/9780080554754/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780080554754">https://learning.oreilly.com/library/view/~/9780080554754</a>
<a href="https://www.sciencedirect.com/science/book/9781597491631">https://www.sciencedirect.com/science/book/9781597491631</a><br/>Format: Electronic Resources<br/>Techno security's guide to e-discovery and digital forensicsent://SD_ILS/0/SD_ILS:22845142024-06-20T07:36:03Z2024-06-20T07:36:03Zby Wiles, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492232">https://learning.oreilly.com/library/view/~/9781597492232</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492232/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492232/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492232/?ar">https://learning.oreilly.com/library/view/~/9781597492232/?ar</a><br/>Format: Electronic Resources<br/>Perl scripting for Windows security : live response, forensic analysis, and monitoringent://SD_ILS/0/SD_ILS:22849532024-06-20T07:36:03Z2024-06-20T07:36:03Zby Carvey, Harlan A.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491730/?ar">https://learning.oreilly.com/library/view/~/9781597491730/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491730/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491730/?ar</a><br/>Format: Electronic Resources<br/>Metasploit toolkit for penetration testing, exploit development, and vulnerability researchent://SD_ILS/0/SD_ILS:22841672024-06-20T07:36:03Z2024-06-20T07:36:03Zby Maynor, David.<br/><a href="https://www.sciencedirect.com/science/book/9781597490740">https://www.sciencedirect.com/science/book/9781597490740</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490740/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490740/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490740/?ar">https://learning.oreilly.com/library/view/~/9781597490740/?ar</a><br/>Format: Electronic Resources<br/>BigNum math : implementing cryptographic multiple precision arithmeticent://SD_ILS/0/SD_ILS:22822902024-06-20T07:36:03Z2024-06-20T07:36:03Zby St. Denis, Tom.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597491129/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491129/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491129/?ar">https://learning.oreilly.com/library/view/~/9781597491129/?ar</a>
<a href="https://www.sciencedirect.com/science/book/9781597491129">https://www.sciencedirect.com/science/book/9781597491129</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491129">https://learning.oreilly.com/library/view/~/9781597491129</a><br/>Format: Electronic Resources<br/>Dictionary of information securityent://SD_ILS/0/SD_ILS:22823182024-06-20T07:36:03Z2024-06-20T07:36:03Zby Slade, Robert.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491150">https://learning.oreilly.com/library/view/~/9781597491150</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491150/?ar">https://learning.oreilly.com/library/view/~/9781597491150/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491150/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491150/?ar</a><br/>Format: Electronic Resources<br/>Cisco security specialist's guide to PIX firewallsent://SD_ILS/0/SD_ILS:22807862024-06-20T07:36:03Z2024-06-20T07:36:03Zby Osipav, Vitaly.<br/><a href="https://www.sciencedirect.com/science/book/9781931836630">https://www.sciencedirect.com/science/book/9781931836630</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781931836630/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836630/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781931836630/?ar">https://learning.oreilly.com/library/view/~/9781931836630/?ar</a><br/>Format: Electronic Resources<br/>Building robots with Lego Mindstorms : the ultimate tool for Mindstorms maniacsent://SD_ILS/0/SD_ILS:22877842024-06-20T07:36:03Z2024-06-20T07:36:03Zby Ferrari, Mario.<br/><a href="https://learning.oreilly.com/library/view/~/9781928994671">https://learning.oreilly.com/library/view/~/9781928994671</a>
<a href="https://learning.oreilly.com/library/view/~/9781928994671/?ar">https://learning.oreilly.com/library/view/~/9781928994671/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781928994671/?ar">https://go.oreilly.com/library-access/library/view/-/9781928994671/?ar</a><br/>Format: Electronic Resources<br/>Bluetooth application developer's guide : the short range interconnect solutionent://SD_ILS/0/SD_ILS:22913372024-06-20T07:36:03Z2024-06-20T07:36:03Zby Krammer, David.<br/><a href="https://learning.oreilly.com/library/view/~/9781928994428/?ar">https://learning.oreilly.com/library/view/~/9781928994428/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781928994428">https://learning.oreilly.com/library/view/~/9781928994428</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781928994428/?ar">https://go.oreilly.com/library-access/library/view/-/9781928994428/?ar</a><br/>Format: Electronic Resources<br/>Violent Python : a cookbook for hackers, forensic analysts, penetration testers and security engineersent://SD_ILS/0/SD_ILS:22966242024-06-20T07:36:03Z2024-06-20T07:36:03Zby O'Connor, T. J.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499576/?ar">https://learning.oreilly.com/library/view/~/9781597499576/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597499576/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499576/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499576">https://learning.oreilly.com/library/view/~/9781597499576</a><br/>Format: Electronic Resources<br/>Placing the suspect behind the keyboard : using digital forensics and investigative techniques to identify cybercrime suspectsent://SD_ILS/0/SD_ILS:22980552024-06-20T07:36:03Z2024-06-20T07:36:03Zby Shavers, Brett.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499859/?ar">https://learning.oreilly.com/library/view/~/9781597499859/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597499859/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499859/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499859">https://learning.oreilly.com/library/view/~/9781597499859</a><br/>Format: Electronic Resources<br/>Windows Server 2012 security from end to edge and beyond : architecting, designing, planning, and deploying Windows Server 2012 security solutionsent://SD_ILS/0/SD_ILS:22996622024-06-20T07:36:03Z2024-06-20T07:36:03Zby Shinder, Thomas W.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499804">https://learning.oreilly.com/library/view/~/9781597499804</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499804/?ar">https://learning.oreilly.com/library/view/~/9781597499804/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597499804/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499804/?ar</a><br/>Format: Electronic Resources<br/>Cybercrime case presentation : using digital forensics and investigative techniques to identify cybercrime suspectsent://SD_ILS/0/SD_ILS:22985172024-06-20T07:36:03Z2024-06-20T07:36:03Zby Shavers, Brett.<br/><a href="https://learning.oreilly.com/library/view/~/9780124095045/?ar">https://learning.oreilly.com/library/view/~/9780124095045/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124095045">https://learning.oreilly.com/library/view/~/9780124095045</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124095045/?ar">https://go.oreilly.com/library-access/library/view/-/9780124095045/?ar</a><br/>Format: Electronic Resources<br/>Digital forensics for legal professionals : understanding digital evidence from the warrant to the courtrooment://SD_ILS/0/SD_ILS:22926462024-06-20T07:36:03Z2024-06-20T07:36:03Zby Daniel, Larry (Larry E.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597496438/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496438/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496438/?ar">https://learning.oreilly.com/library/view/~/9781597496438/?ar</a><br/>Format: Electronic Resources<br/>