Search Results for Syngress. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qu$003dSyngress.$0026ps$003d300? 2024-06-20T07:36:03Z Syngress IT security project management handbook ent://SD_ILS/0/SD_ILS:339682 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Snedaker, Susan.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=163063">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=163063</a><br/>Format:&#160;Electronic Resources<br/> Syngress IT security project management handbook ent://SD_ILS/0/SD_ILS:2282299 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Snedaker, Susan.<br/><a href="https://learning.oreilly.com/library/view/~/1597490768/?ar">https://learning.oreilly.com/library/view/~/1597490768/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/1597490768/?ar">https://go.oreilly.com/library-access/library/view/-/1597490768/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1597490768">https://learning.oreilly.com/library/view/~/1597490768</a> <a href="https://www.sciencedirect.com/science/book/9781597490764">https://www.sciencedirect.com/science/book/9781597490764</a><br/>Format:&#160;Electronic Resources<br/> Syngress IT security project management handbook ent://SD_ILS/0/SD_ILS:65873 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Snedaker, Susan.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490764">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Syngress IT Security Project Management Handbook. ent://SD_ILS/0/SD_ILS:1186718 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Snedaker, Susan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=261283">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Syngress force emerging threat analysis from mischief to malicious ent://SD_ILS/0/SD_ILS:340202 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Maynor, David.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174833">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174833</a><br/>Format:&#160;Electronic Resources<br/> Syngress force emerging threat analysis from mischief to malicious ent://SD_ILS/0/SD_ILS:21358 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Windows performance analysis field guide ent://SD_ILS/0/SD_ILS:2207815 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Huffman, Clint, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1770239">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Preserving electronic evidence for trial : a team approach to the litigation hold, data collection, and evidence preservation ent://SD_ILS/0/SD_ILS:2209688 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Zeigler, Ann D., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4417195">Click to View</a><br/>Format:&#160;Electronic Resources<br/> ASP Configuration Handbook. ent://SD_ILS/0/SD_ILS:1191980 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=293994">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Designing A Wireless Network : Understand How Wireless Communication Works. ent://SD_ILS/0/SD_ILS:1192015 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294079">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cisco Security Professional's Guide to Secure Intrusion Detection Systems. ent://SD_ILS/0/SD_ILS:1191995 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294035">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Rick Gallahers MPLS Training Guide : Building Multi Protocol Label Switching Networks. ent://SD_ILS/0/SD_ILS:1192103 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294347">Click to View</a><br/>Format:&#160;Electronic Resources<br/> configuring exchange server 2000. ent://SD_ILS/0/SD_ILS:1192003 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294052">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security Assessment : Case Studies for Implementing the NSA IAM. ent://SD_ILS/0/SD_ILS:1192107 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294358">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Ethereal Packet Sniffing. ent://SD_ILS/0/SD_ILS:1192028 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294122">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Ruby Developers Guide. ent://SD_ILS/0/SD_ILS:1192105 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294352">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hack Proofing XML. ent://SD_ILS/0/SD_ILS:1192044 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294155">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Managing Cisco Network Security. ent://SD_ILS/0/SD_ILS:1192065 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294234">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hackproofing Your Wireless Network. ent://SD_ILS/0/SD_ILS:1192049 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294161">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Windows 2000 Active Directory. ent://SD_ILS/0/SD_ILS:1192138 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294445">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Building a Cisco Wireless Lan. ent://SD_ILS/0/SD_ILS:1177688 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=139957">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hack Proofing Sun Solaris 8. ent://SD_ILS/0/SD_ILS:1192042 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294153">Click to View</a><br/>Format:&#160;Electronic Resources<br/> .NET Mobile Web Developers Guide. ent://SD_ILS/0/SD_ILS:1191968 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=293946">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hack Proofing Windows 2000 Server. ent://SD_ILS/0/SD_ILS:1192043 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294154">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Building DMZs For Enterprise Networks. ent://SD_ILS/0/SD_ILS:1191988 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294015">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Configuring Symantec AntiVirus Enterprise Edition. ent://SD_ILS/0/SD_ILS:1192006 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294056">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Nokia Network Security Solutions Handbook. ent://SD_ILS/0/SD_ILS:1192081 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294289">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Checkpoint Next Generation Security Administration. ent://SD_ILS/0/SD_ILS:1191991 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294029">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Firewall Policies and VPN Configurations. ent://SD_ILS/0/SD_ILS:1188302 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=272100">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Snort Intrusion Detection 2.0. ent://SD_ILS/0/SD_ILS:1192111 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294371">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Building SANs with Brocade Fabric Switches. ent://SD_ILS/0/SD_ILS:1177693 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=140393">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Developing .Net Web Services With XML. ent://SD_ILS/0/SD_ILS:1192017 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294084">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Configuring Windows 2000 without Active Directory. ent://SD_ILS/0/SD_ILS:1192007 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294057">Click to View</a><br/>Format:&#160;Electronic Resources<br/> ASP.Net Web Developer's Guide. ent://SD_ILS/0/SD_ILS:1191981 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=293995">Click to View</a><br/>Format:&#160;Electronic Resources<br/> VB.Net Web Developer's Guide. ent://SD_ILS/0/SD_ILS:1192130 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294435">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Webmasters Guide To The Wireless Internet. ent://SD_ILS/0/SD_ILS:1192136 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294442">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Configuring and Troubleshooting Windows XP Professional. ent://SD_ILS/0/SD_ILS:1192000 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294047">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hack Proofing Your Network 2E. ent://SD_ILS/0/SD_ILS:1192046 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294158">Click to View</a><br/>Format:&#160;Electronic Resources<br/> MCSE : Study Guide &amp; DVD Training System. ent://SD_ILS/0/SD_ILS:1192076 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294257">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The Best Damn Firewall Book Period. ent://SD_ILS/0/SD_ILS:1192121 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294396">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The Best Damn Cisco Internetworking Book Period. ent://SD_ILS/0/SD_ILS:1192120 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294395">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Configuring Cisco Voice Over IP 2E. ent://SD_ILS/0/SD_ILS:1192001 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294049">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cisco Security Specialists Guide to PIX Firewall. ent://SD_ILS/0/SD_ILS:1191996 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294036">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security + Study Guide and DVD Training System. ent://SD_ILS/0/SD_ILS:1192106 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294357">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Consumers Guide to Cell Phones and Wireless Service Plans. ent://SD_ILS/0/SD_ILS:1289323 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3008648">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Configuring ISA Server 2000 : Building Firewalls for Windows 2000. ent://SD_ILS/0/SD_ILS:1192004 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294054">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Configuring Citrix MetaFrame XP for Windows : Including Feature Release 1. ent://SD_ILS/0/SD_ILS:1192002 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294051">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Biz Talk Server 2000 Developer's Guide : Developer's Guide. ent://SD_ILS/0/SD_ILS:1191986 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294006">Click to View</a><br/>Format:&#160;Electronic Resources<br/> CheckPoint NG VPN 1/Firewall 1 : Advanced Configuration and Troubleshooting. ent://SD_ILS/0/SD_ILS:1191992 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294030">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Special Ops : Host and Network Security for Microsoft Unix and Oracle. ent://SD_ILS/0/SD_ILS:1192113 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294373">Click to View</a><br/>Format:&#160;Electronic Resources<br/> SSCP Systems Security Certified Practitioner Study Guide and DVD Training System. ent://SD_ILS/0/SD_ILS:1192114 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294375">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Journey to the Center of the Internet : Now Showing in 3D. ent://SD_ILS/0/SD_ILS:1289324 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3008649">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Administering Cisco QoS in IP Networks : Including CallManager 3.0, QoS, and uOne. ent://SD_ILS/0/SD_ILS:1191970 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=293956">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hack Proofing ColdFusion : The Only Way to Stop a Hacker Is to Think Like One. ent://SD_ILS/0/SD_ILS:1192040 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294151">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Dr Tom Shinder's ISA Server and Beyond : Real World Security Solutions for Microsoft Enterprise Networks. ent://SD_ILS/0/SD_ILS:1192021 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294093">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hack Proofing Your Web Applications : The Only Way to Stop a Hacker Is to Think Like One. ent://SD_ILS/0/SD_ILS:1192047 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294159">Click to View</a><br/>Format:&#160;Electronic Resources<br/> MCSE Designing Security for a Windows Server 2003 Network (Exam 70-298) : Study Guide and DVD Training System. ent://SD_ILS/0/SD_ILS:1192072 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294253">Click to View</a><br/>Format:&#160;Electronic Resources<br/> MCSA/MCSE Managing and Maintaining a Windows Server 2003 Environment (Exam 70-290) : Study Guide &amp; DVD Training System. ent://SD_ILS/0/SD_ILS:1192069 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294250">Click to View</a><br/>Format:&#160;Electronic Resources<br/> MCSE Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (Exam 70-293) : Guide &amp; DVD Training System. ent://SD_ILS/0/SD_ILS:1192073 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294254">Click to View</a><br/>Format:&#160;Electronic Resources<br/> 10 Cool Lego Mindstorm Dark Side Robots Transports and Creatures : Amazing Projects You Can Build in Under an Hour. ent://SD_ILS/0/SD_ILS:1289325 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3008650">Click to View</a><br/>Format:&#160;Electronic Resources<br/> MCSE Designing a Windows Server 2003 Active Directory and Network Infrastructure(Exam 70-297) : Study Guide &amp; DVD Training System. ent://SD_ILS/0/SD_ILS:1192071 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294252">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hack Proofing Your E-commerce Web Site : The Only Way to Stop a Hacker is to Think Like One. ent://SD_ILS/0/SD_ILS:1192045 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294156">Click to View</a><br/>Format:&#160;Electronic Resources<br/> MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network (Exam 70-214) : Study Guide and DVD Training System. ent://SD_ILS/0/SD_ILS:1192075 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294256">Click to View</a><br/>Format:&#160;Electronic Resources<br/> MCSE Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure (Exam 70-294) : Study Guide and DVD Training System. ent://SD_ILS/0/SD_ILS:1192074 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294255">Click to View</a><br/>Format:&#160;Electronic Resources<br/> MCSA/MCSE Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (Exam 70-291) : Study Guide and DVD Training System. ent://SD_ILS/0/SD_ILS:1192068 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294249">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The basics of hacking and penetration testing : ethical hacking and penetration testing made easy ent://SD_ILS/0/SD_ILS:2293057 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Engebretson, Pat (Patrick Henry), 1974-<br/><a href="https://learning.oreilly.com/library/view/~/9781597496551">https://learning.oreilly.com/library/view/~/9781597496551</a> <a href="https://learning.oreilly.com/library/view/~/9781597496551/?ar">https://learning.oreilly.com/library/view/~/9781597496551/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597496551/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496551/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network+ Study Guide &amp; Practice Exams : Exam N10-003. ent://SD_ILS/0/SD_ILS:1186053 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Shimonski, Robert.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254841">Click to View</a><br/>Format:&#160;Electronic Resources<br/> MCSE implementing and administering a Microsoft .NET server network infrastructure (exam 70-276) study guide and DVD training system. ent://SD_ILS/0/SD_ILS:65652 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;ScienceDirect (Online service)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836937">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> IP Addressing and Subnetting INC IPV6 ent://SD_ILS/0/SD_ILS:2320500 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781928994015">https://learning.oreilly.com/library/view/~/9781928994015</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781928994015/?ar">https://go.oreilly.com/library-access/library/view/-/9781928994015/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781928994015/?ar">https://learning.oreilly.com/library/view/~/9781928994015/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security + Study Guide and DVD Training System ent://SD_ILS/0/SD_ILS:2320599 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781931836722">https://learning.oreilly.com/library/view/~/9781931836722</a> <a href="https://learning.oreilly.com/library/view/~/9781931836722/?ar">https://learning.oreilly.com/library/view/~/9781931836722/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781931836722/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836722/?ar</a><br/>Format:&#160;Electronic Resources<br/> Configuring Cisco AVVID ent://SD_ILS/0/SD_ILS:65672 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress Media, Inc.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994145">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> E-mail virus protection handbook. ent://SD_ILS/0/SD_ILS:2280755 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress Media, Inc.<br/><a href="https://www.sciencedirect.com/science/book/9781928994237">https://www.sciencedirect.com/science/book/9781928994237</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781928994237/?ar">https://go.oreilly.com/library-access/library/view/-/9781928994237/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781928994237/?ar">https://learning.oreilly.com/library/view/~/9781928994237/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781928994237">https://learning.oreilly.com/library/view/~/9781928994237</a><br/>Format:&#160;Electronic Resources<br/> Managing Windows 2000 network services ent://SD_ILS/0/SD_ILS:65764 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress Media, Inc.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994060">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> E-mail virus protection handbook ent://SD_ILS/0/SD_ILS:65760 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress Media, Inc.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994237">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Troubleshooting Windows 2000 TCP/IP. ent://SD_ILS/0/SD_ILS:65864 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress Media, Inc.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994114">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Windows 2000 server system administration handbook. ent://SD_ILS/0/SD_ILS:65807 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress Media, Inc.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994091">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> MCSE. Microsoft TCP/IP on Windows NT 4.0 study guide : (exam 70-59) ent://SD_ILS/0/SD_ILS:2044382 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Syngress Media, Inc.<br/>Format:&#160;Books<br/> The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practice ent://SD_ILS/0/SD_ILS:2296625 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Winterfeld, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9780124047372/?ar">https://learning.oreilly.com/library/view/~/9780124047372/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124047372/?ar">https://go.oreilly.com/library-access/library/view/-/9780124047372/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124047372">https://learning.oreilly.com/library/view/~/9780124047372</a><br/>Format:&#160;Electronic Resources<br/> Smart grid security : innovative solutions for a modernized grid ent://SD_ILS/0/SD_ILS:2098138 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Skopik, Florian, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2146995">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Automating open source intelligence : algorithms for OSINT ent://SD_ILS/0/SD_ILS:2098409 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Layton, Robert, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4186519">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:2303294 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Andress, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128007440/?ar">https://learning.oreilly.com/library/view/~/9780128007440/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128007440/?ar">https://go.oreilly.com/library-access/library/view/-/9780128007440/?ar</a><br/>Format:&#160;Electronic Resources<br/> Eleventh hour network+ : exam N10-004 study guide ent://SD_ILS/0/SD_ILS:2287181 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Alpern, Naomi J.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494281/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494281/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597494281/?ar">https://learning.oreilly.com/library/view/~/9781597494281/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597494281">https://learning.oreilly.com/library/view/~/9781597494281</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest Microsoft attacks ent://SD_ILS/0/SD_ILS:2289849 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Kraus, Rob.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495516/?ar">https://learning.oreilly.com/library/view/~/9781597495516/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597495516/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495516/?ar</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest Unified Communications attacks ent://SD_ILS/0/SD_ILS:2288722 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;York, Dan.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495479">https://learning.oreilly.com/library/view/~/9781597495479</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597495479/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495479/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495479/?ar">https://learning.oreilly.com/library/view/~/9781597495479/?ar</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest web application attacks ent://SD_ILS/0/SD_ILS:2289552 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Shema, Mike.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495431/?ar">https://learning.oreilly.com/library/view/~/9781597495431/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597495431/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495431/?ar</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest USB attacks ent://SD_ILS/0/SD_ILS:2288721 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Anderson, Brian (Brian James)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495547/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495547/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495547/?ar">https://learning.oreilly.com/library/view/~/9781597495547/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495547">https://learning.oreilly.com/library/view/~/9781597495547</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest wireless technologies attacks ent://SD_ILS/0/SD_ILS:2288720 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Haines, Brad.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495417/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495417/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495417/?ar">https://learning.oreilly.com/library/view/~/9781597495417/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495417">https://learning.oreilly.com/library/view/~/9781597495417</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest social network attacks ent://SD_ILS/0/SD_ILS:2289718 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Timm, Carl.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495455/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495455/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495455/?ar">https://learning.oreilly.com/library/view/~/9781597495455/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495455">https://learning.oreilly.com/library/view/~/9781597495455</a><br/>Format:&#160;Electronic Resources<br/> Mobile security and privacy : advances, challenges and future research directions ent://SD_ILS/0/SD_ILS:2210784 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Au, Man-Ho, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4689767">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems ent://SD_ILS/0/SD_ILS:2210926 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Griffor, Edward, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4711751">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mobile security and privacy : advances, challenges and future research directions ent://SD_ILS/0/SD_ILS:2311639 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Au, Man-Ho, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128047460/?ar">https://learning.oreilly.com/library/view/~/9780128047460/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128047460/?ar">https://go.oreilly.com/library-access/library/view/-/9780128047460/?ar</a><br/>Format:&#160;Electronic Resources<br/> Contemporary digital forensic investigations of cloud and mobile applications ent://SD_ILS/0/SD_ILS:2312008 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Choo, Kim-Kwang Raymond, editor.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128054482/?ar">https://go.oreilly.com/library-access/library/view/-/9780128054482/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128054482/?ar">https://learning.oreilly.com/library/view/~/9780128054482/?ar</a><br/>Format:&#160;Electronic Resources<br/> Smart grid security : innovative solutions for a modernized grid ent://SD_ILS/0/SD_ILS:2308049 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Skopik, Florian, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128023549">https://learning.oreilly.com/library/view/~/9780128023549</a> <a href="https://learning.oreilly.com/library/view/~/9780128023549/?ar">https://learning.oreilly.com/library/view/~/9780128023549/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128023549/?ar">https://go.oreilly.com/library-access/library/view/-/9780128023549/?ar</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest network attacks ent://SD_ILS/0/SD_ILS:2290174 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Prowell, Stacy J.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495493/?ar">https://learning.oreilly.com/library/view/~/9781597495493/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597495493/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495493/?ar</a><br/>Format:&#160;Electronic Resources<br/> Audio content security : attack analysis on audio watermarking ent://SD_ILS/0/SD_ILS:2311045 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Ghorbani, Sogand, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128113844/?ar">https://learning.oreilly.com/library/view/~/9780128113844/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128113844/?ar">https://go.oreilly.com/library-access/library/view/-/9780128113844/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128113844">https://learning.oreilly.com/library/view/~/9780128113844</a><br/>Format:&#160;Electronic Resources<br/> A study of black hole attack solutions : on AODV routing protocol in MANET ent://SD_ILS/0/SD_ILS:2309038 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Fazeldehkordi, Elahe, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128053799/?ar">https://go.oreilly.com/library-access/library/view/-/9780128053799/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128053799/?ar">https://learning.oreilly.com/library/view/~/9780128053799/?ar</a><br/>Format:&#160;Electronic Resources<br/> Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems ent://SD_ILS/0/SD_ILS:2311609 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Griffor, Edward R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128038383/?ar">https://learning.oreilly.com/library/view/~/9780128038383/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128038383/?ar">https://go.oreilly.com/library-access/library/view/-/9780128038383/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128038383">https://learning.oreilly.com/library/view/~/9780128038383</a><br/>Format:&#160;Electronic Resources<br/> 11th hour Linux+ study guide : exam XK0-003 study guide ent://SD_ILS/0/SD_ILS:2296899 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Speake, Graham.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494977/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494977/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597494977/?ar">https://learning.oreilly.com/library/view/~/9781597494977/?ar</a><br/>Format:&#160;Electronic Resources<br/> Eleventh hour security+ : exam SYO-201 study guide ent://SD_ILS/0/SD_ILS:2294477 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Dubrawsky, Ido.<br/><a href="https://learning.oreilly.com/library/view/~/9781597494274/?ar">https://learning.oreilly.com/library/view/~/9781597494274/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597494274/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494274/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hardware hacking : have fun while voiding your warranty ent://SD_ILS/0/SD_ILS:2283399 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Grand, Joe.<br/><a href="https://learning.oreilly.com/library/view/~/9781932266832/?ar">https://learning.oreilly.com/library/view/~/9781932266832/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781932266832/?ar">https://go.oreilly.com/library-access/library/view/-/9781932266832/?ar</a> <a href="https://www.sciencedirect.com/science/book/9781932266832">https://www.sciencedirect.com/science/book/9781932266832</a> <a href="https://learning.oreilly.com/library/view/~/9781932266832">https://learning.oreilly.com/library/view/~/9781932266832</a><br/>Format:&#160;Electronic Resources<br/> DBA's guide to databases on Linux ent://SD_ILS/0/SD_ILS:65767 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Rogers, Chris.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994046">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Nessus network auditing ent://SD_ILS/0/SD_ILS:65985 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Deraison, Renaud.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836081">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing your e-commerce site the only way to stop a hacker is to think like one ent://SD_ILS/0/SD_ILS:65733 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Russell, Ryan.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994275">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Designing a wireless network ent://SD_ILS/0/SD_ILS:65664 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Wheat, Jeffery A.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994459">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> IP addressing and subnetting, including IPv6 ent://SD_ILS/0/SD_ILS:65683 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Blanchet, Marc, 1964-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994015">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Nessus, Snort, &amp; Ethereal power tools : customizing open source security applications ent://SD_ILS/0/SD_ILS:2281994 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Archibald, Neil.<br/><a href="https://www.sciencedirect.com/science/book/9781597490207">https://www.sciencedirect.com/science/book/9781597490207</a> <a href="https://learning.oreilly.com/library/view/~/9781597490207">https://learning.oreilly.com/library/view/~/9781597490207</a> <a href="https://learning.oreilly.com/library/view/~/9781597490207/?ar">https://learning.oreilly.com/library/view/~/9781597490207/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597490207/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490207/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ethereal : packet sniffing ent://SD_ILS/0/SD_ILS:2281331 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Orebaugh, Angela.<br/><a href="https://learning.oreilly.com/library/view/~/9781932266825">https://learning.oreilly.com/library/view/~/9781932266825</a> <a href="https://www.sciencedirect.com/science/book/9781932266825">https://www.sciencedirect.com/science/book/9781932266825</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781932266825/?ar">https://go.oreilly.com/library-access/library/view/-/9781932266825/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781932266825/?ar">https://learning.oreilly.com/library/view/~/9781932266825/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hardware hacking have fun while voiding your warranty ent://SD_ILS/0/SD_ILS:65742 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Grand, Joe.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266832">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Nessus, Snort, &amp; Ethereal power tools customizing open source security applications ent://SD_ILS/0/SD_ILS:65787 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Archibald, Neil.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490207">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Ethereal packet sniffing ent://SD_ILS/0/SD_ILS:65645 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Orebaugh, Angela.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266825">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Snort 2.0 intrusion detection. ent://SD_ILS/0/SD_ILS:14618 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Beale, Jay.<br/>Format:&#160;Books<br/> Hack proofing your wireless network ent://SD_ILS/0/SD_ILS:12321 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Barnes, Christian.<br/>Format:&#160;Books<br/> Federated identity primer ent://SD_ILS/0/SD_ILS:2206071 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Rountree, Derrick.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1081145">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Practical anonymity hiding in plain sight online ent://SD_ILS/0/SD_ILS:2206165 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Loshin, Peter.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115167">Click to View</a><br/>Format:&#160;Electronic Resources<br/> UTM security with Fortinet Mastering FortiOS ent://SD_ILS/0/SD_ILS:2206032 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Tam, Kenneth.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1068442">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Practical lock picking a physical penetration tester's training guide ent://SD_ILS/0/SD_ILS:2205852 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Ollam, Deviant.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=982556">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Simple steps to data encryption a practical guide to secure computing ent://SD_ILS/0/SD_ILS:2206169 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Loshin, Pete.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115182">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The Wireshark field guide analyzing and troubleshooting network traffic ent://SD_ILS/0/SD_ILS:2206170 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Shimonski, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115183">Click to View</a><br/>Format:&#160;Electronic Resources<br/> CISSP study guide ent://SD_ILS/0/SD_ILS:2205893 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Conrad, Eric.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1014262">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineers ent://SD_ILS/0/SD_ILS:2051712 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;O'Connor, T. J.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1073021">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Advanced persistent threat understanding the danger and how to protect your organization ent://SD_ILS/0/SD_ILS:2206046 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Cole, Eric.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1073020">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Wireless reconnaissance in penetration testing ent://SD_ILS/0/SD_ILS:2206027 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Neely, Matthew.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1059696">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data hiding exposing concealed data in multimedia, operating systems, mobile devices, and network protocols ent://SD_ILS/0/SD_ILS:2206043 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Raggo, Michael T.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1073014">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing SQL servers protecting your database from attackers ent://SD_ILS/0/SD_ILS:2205846 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=980013">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Keys to the kingdom impressioning, privilege escalation, bumping, and other key-based attacks against physical locks ent://SD_ILS/0/SD_ILS:2205870 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Ollam, Deviant.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=998614">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Migrating to the cloud Oracle client/server modernization ent://SD_ILS/0/SD_ILS:2205476 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Laszewski, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=776183">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Windows 2012 server network security securing your windows network systems and infrastructure ent://SD_ILS/0/SD_ILS:2206163 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Rountree, Derrick.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115160">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The hacker's guide to OS X exploiting OS X from the root up ent://SD_ILS/0/SD_ILS:2206056 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Bathurst, Rob.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1074430">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Logging and log management the authoritative guide to understanding the concepts surrounding logging and log management ent://SD_ILS/0/SD_ILS:2206060 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Chuvakin, Anton A.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1077419">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Placing the suspect behind the keyboard using digital forensics and investigative techniques to identify cybercrime suspects ent://SD_ILS/0/SD_ILS:2206172 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Shavers, Brett.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115188">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network and system security ent://SD_ILS/0/SD_ILS:2301170 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Vacca, John R.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124166899/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166899/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124166899/?ar">https://learning.oreilly.com/library/view/~/9780124166899/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber security and IT infrastructure protection ent://SD_ILS/0/SD_ILS:2299801 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Vacca, John R.<br/><a href="https://learning.oreilly.com/library/view/~/9780124166813/?ar">https://learning.oreilly.com/library/view/~/9780124166813/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124166813/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166813/?ar</a><br/>Format:&#160;Electronic Resources<br/> Malware forensics field guide for Windows systems digital forensics field guides ent://SD_ILS/0/SD_ILS:2205738 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Malin, Cameron H.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=921016">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Windows forensic analysis toolkit advanced analysis techniques for Windows 7 ent://SD_ILS/0/SD_ILS:2205581 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Carvey, Harlan A.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=850700">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Best damn firewall book period ent://SD_ILS/0/SD_ILS:2284515 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Behrens, Thorsten.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492188/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492188/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492188/?ar">https://learning.oreilly.com/library/view/~/9781597492188/?ar</a><br/>Format:&#160;Electronic Resources<br/> Configuring Citrix MetaFrame for Windows 2000 terminal services ent://SD_ILS/0/SD_ILS:65695 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;ScienceDirect (Online service)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994183">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> The basics of cloud computing : understanding the fundamentals of cloud computing in theory and practice ent://SD_ILS/0/SD_ILS:2301229 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Rountree, Derrick.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124059320/?ar">https://go.oreilly.com/library-access/library/view/-/9780124059320/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124059320/?ar">https://learning.oreilly.com/library/view/~/9780124059320/?ar</a><br/>Format:&#160;Electronic Resources<br/> Risk management framework a lab-based approach to securing information systems ent://SD_ILS/0/SD_ILS:2206168 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Broad, James.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115181">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Blackhatonomics : an inside look at the economics of cybercrime ent://SD_ILS/0/SD_ILS:2298530 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Gragido, Will.<br/><a href="https://learning.oreilly.com/library/view/~/9781597497404/?ar">https://learning.oreilly.com/library/view/~/9781597497404/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597497404/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497404/?ar</a><br/>Format:&#160;Electronic Resources<br/> Client-side attacks and defense ent://SD_ILS/0/SD_ILS:2298518 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Shimonski, Robert.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495905/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495905/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495905/?ar">https://learning.oreilly.com/library/view/~/9781597495905/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing the smart grid : next generation power grid security ent://SD_ILS/0/SD_ILS:2291027 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Flick, Tony.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495707/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495707/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495707/?ar">https://learning.oreilly.com/library/view/~/9781597495707/?ar</a><br/>Format:&#160;Electronic Resources<br/> Techno security's guide to e-discovery and digital forensics ent://SD_ILS/0/SD_ILS:343201 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Wiles, Jack.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=239209">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=239209</a><br/>Format:&#160;Electronic Resources<br/> Building robots with Lego Mindstorms NXT ent://SD_ILS/0/SD_ILS:2286866 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Astolfo, David.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597491525/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491525/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597491525/?ar">https://learning.oreilly.com/library/view/~/9781597491525/?ar</a><br/>Format:&#160;Electronic Resources<br/> Firewall policies and VPN configurations ent://SD_ILS/0/SD_ILS:339979 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Henmi, Anne.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=170636">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=170636</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at managing Windows Server update services ent://SD_ILS/0/SD_ILS:339583 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Barber, Brian.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=149587">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=149587</a><br/>Format:&#160;Electronic Resources<br/> Unified communications forensics : anatomy of common UC attacks ent://SD_ILS/0/SD_ILS:2301418 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Grant, Nicholas, 1978-<br/><a href="https://learning.oreilly.com/library/view/~/9781597499927/?ar">https://learning.oreilly.com/library/view/~/9781597499927/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597499927/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499927/?ar</a><br/>Format:&#160;Electronic Resources<br/> Blackhatonomics an inside look at the economics of cybercrime ent://SD_ILS/0/SD_ILS:2206064 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Gragido, Will.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1079784">Click to View</a><br/>Format:&#160;Electronic Resources<br/> FISMA compliance handbook ent://SD_ILS/0/SD_ILS:2206162 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Taylor, Laura P.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115157">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Assessing vendors : a hands-on guide to assessing Infosec and IT vendors ent://SD_ILS/0/SD_ILS:2298959 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;More, Josh.<br/><a href="https://learning.oreilly.com/library/view/~/9780124096073/?ar">https://learning.oreilly.com/library/view/~/9780124096073/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124096073/?ar">https://go.oreilly.com/library-access/library/view/-/9780124096073/?ar</a><br/>Format:&#160;Electronic Resources<br/> Wireless reconnaissance in penetration testing ent://SD_ILS/0/SD_ILS:2298529 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Neely, Matthew.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497312/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497312/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597497312/?ar">https://learning.oreilly.com/library/view/~/9781597497312/?ar</a><br/>Format:&#160;Electronic Resources<br/> Keys to the kingdom : impressioning, privilege escalation, bumping, and other key-based attacks against physical locks ent://SD_ILS/0/SD_ILS:2298532 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Ollam, Deviant.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499835/?ar">https://learning.oreilly.com/library/view/~/9781597499835/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597499835/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499835/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital triage forensics : processing the digital crime scene ent://SD_ILS/0/SD_ILS:2290652 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Pearson, Stephen, 1963-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495967/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495967/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495967/?ar">https://learning.oreilly.com/library/view/~/9781597495967/?ar</a><br/>Format:&#160;Electronic Resources<br/> Building a digital forensic laboratory : establishing and managing a successful facility ent://SD_ILS/0/SD_ILS:2286815 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Jones, Andy, 1952-<br/><a href="https://learning.oreilly.com/library/view/~/9780080949536/?ar">https://learning.oreilly.com/library/view/~/9780080949536/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780080949536/?ar">https://go.oreilly.com/library-access/library/view/-/9780080949536/?ar</a><br/>Format:&#160;Electronic Resources<br/> The IT/digital legal companion a comprehensive business guide to software, Internet, and IP law : includes contracts and web forms ent://SD_ILS/0/SD_ILS:2123892 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Landy, Gene K.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=405534">Click to View</a><br/>Format:&#160;Electronic Resources<br/> OS X exploits and defense ent://SD_ILS/0/SD_ILS:2285157 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Baccas, Paul.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492546/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492546/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492546/?ar">https://learning.oreilly.com/library/view/~/9781597492546/?ar</a><br/>Format:&#160;Electronic Resources<br/> Nessus network auditing ent://SD_ILS/0/SD_ILS:2284689 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Rogers, Russ.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492089/?ar">https://learning.oreilly.com/library/view/~/9781597492089/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492089/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492089/?ar</a><br/>Format:&#160;Electronic Resources<br/> The best damn server virtualization book period ent://SD_ILS/0/SD_ILS:2284513 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Buytaert, Kris.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492171/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492171/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492171/?ar">https://learning.oreilly.com/library/view/~/9781597492171/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network security assessment : from vulnerability to patch ent://SD_ILS/0/SD_ILS:2286242 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Manzuik, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491013/?ar">https://learning.oreilly.com/library/view/~/9781597491013/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491013/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491013/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:2287682 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Bayles, Aaron W.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492133/?ar">https://learning.oreilly.com/library/view/~/9781597492133/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492133/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492133/?ar</a><br/>Format:&#160;Electronic Resources<br/> Juniper(r) Networks secure access SSL VPN configuration guide ent://SD_ILS/0/SD_ILS:2286444 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Wyler, Neil R.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492003/?ar">https://learning.oreilly.com/library/view/~/9781597492003/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492003/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492003/?ar</a><br/>Format:&#160;Electronic Resources<br/> Configuring Juniper Networks NetScreen &amp; SSG firewalls ent://SD_ILS/0/SD_ILS:2286184 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Cameron, Rob.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597491181/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491181/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597491181/?ar">https://learning.oreilly.com/library/view/~/9781597491181/?ar</a><br/>Format:&#160;Electronic Resources<br/> The best damn IT security management book period ent://SD_ILS/0/SD_ILS:2284698 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Susan Snedaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492270/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492270/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492270/?ar">https://learning.oreilly.com/library/view/~/9781597492270/?ar</a><br/>Format:&#160;Electronic Resources<br/> Open source fuzzing tools ent://SD_ILS/0/SD_ILS:2285085 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Evron, Gadi.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491952/?ar">https://learning.oreilly.com/library/view/~/9781597491952/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491952/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491952/?ar</a><br/>Format:&#160;Electronic Resources<br/> Combating spyware in the enterprise ent://SD_ILS/0/SD_ILS:339975 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Baskin, Brian.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=173423">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=173423</a><br/>Format:&#160;Electronic Resources<br/> Hack the stack using snort and ethereal to master the 8 layers of an insecure network ent://SD_ILS/0/SD_ILS:339985 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Gregg, Michael (Michael C.)<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174832">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174832</a><br/>Format:&#160;Electronic Resources<br/> Scripting VMware power tools for automating virtual infrastructure administration ent://SD_ILS/0/SD_ILS:340055 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Muller, Al.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=176006">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=176006</a><br/>Format:&#160;Electronic Resources<br/> Secure your network for free : using Nmap, Wireshark, Snort, Nessus, and MRGT ent://SD_ILS/0/SD_ILS:2286477 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Seagren, Eric.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597491235/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491235/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597491235/?ar">https://learning.oreilly.com/library/view/~/9781597491235/?ar</a><br/>Format:&#160;Electronic Resources<br/> Introduction to social media investigation : a hands-on approach ent://SD_ILS/0/SD_ILS:2306641 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Golbeck, Jennifer.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128016565/?ar">https://go.oreilly.com/library-access/library/view/-/9780128016565/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128016565/?ar">https://learning.oreilly.com/library/view/~/9780128016565/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128016565">https://learning.oreilly.com/library/view/~/9780128016565</a><br/>Format:&#160;Electronic Resources<br/> The cloud security ecosystem : technical, legal, business and management issues ent://SD_ILS/0/SD_ILS:2307649 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Ko, Ryan, editor.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128017807/?ar">https://go.oreilly.com/library-access/library/view/-/9780128017807/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128017807/?ar">https://learning.oreilly.com/library/view/~/9780128017807/?ar</a><br/>Format:&#160;Electronic Resources<br/> Targeted cyber attacks : multi-staged attacks driven by exploits and malware ent://SD_ILS/0/SD_ILS:2303155 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Sood, Aditya K.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128006047/?ar">https://go.oreilly.com/library-access/library/view/-/9780128006047/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128006047/?ar">https://learning.oreilly.com/library/view/~/9780128006047/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Wireshark field guide : analyzing and troubleshooting network traffic ent://SD_ILS/0/SD_ILS:2298868 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Shimonski, Robert.<br/><a href="https://learning.oreilly.com/library/view/~/9780124104136/?ar">https://learning.oreilly.com/library/view/~/9780124104136/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124104136/?ar">https://go.oreilly.com/library-access/library/view/-/9780124104136/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Basics of Hacking and Penetration Testing : Ethical Hacking and Penetration Testing Made Easy ent://SD_ILS/0/SD_ILS:2299520 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Engebretson, Patrick.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124116443/?ar">https://go.oreilly.com/library-access/library/view/-/9780124116443/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124116443/?ar">https://learning.oreilly.com/library/view/~/9780124116443/?ar</a><br/>Format:&#160;Electronic Resources<br/> Professional penetration testing : creating and learning in a hacking lab ent://SD_ILS/0/SD_ILS:2299483 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Wilhelm, Thomas.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499934/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499934/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597499934/?ar">https://learning.oreilly.com/library/view/~/9781597499934/?ar</a><br/>Format:&#160;Electronic Resources<br/> Coding for penetration testers : building better tools ent://SD_ILS/0/SD_ILS:2295451 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Andress, Jason.<br/><a href="https://learning.oreilly.com/library/view/~/9781597497305/?ar">https://learning.oreilly.com/library/view/~/9781597497305/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597497305/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497305/?ar</a><br/>Format:&#160;Electronic Resources<br/> SQL injection attacks and defense ent://SD_ILS/0/SD_ILS:2295369 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Clarke, Justin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499637/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499637/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597499637/?ar">https://learning.oreilly.com/library/view/~/9781597499637/?ar</a><br/>Format:&#160;Electronic Resources<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:2292368 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Faircloth, Jeremy.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496278/?ar">https://learning.oreilly.com/library/view/~/9781597496278/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597496278/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496278/?ar</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at VoIP security ent://SD_ILS/0/SD_ILS:2304097 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Porter, Thomas.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491693/?ar">https://learning.oreilly.com/library/view/~/9781597491693/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491693/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491693/?ar</a><br/>Format:&#160;Electronic Resources<br/> Professional penetration testing : creating and operating a formal hacking lab ent://SD_ILS/0/SD_ILS:2287538 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Wilhelm, Thomas.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494250/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494250/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597494250/?ar">https://learning.oreilly.com/library/view/~/9781597494250/?ar</a><br/>Format:&#160;Electronic Resources<br/> Virtualization and forensics : a digital forensic investigator's guide to virtual environments ent://SD_ILS/0/SD_ILS:2290041 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Barrett, Diane.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495578/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495578/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495578/?ar">https://learning.oreilly.com/library/view/~/9781597495578/?ar</a><br/>Format:&#160;Electronic Resources<br/> Managing catastrophic loss of sensitive data ent://SD_ILS/0/SD_ILS:2284690 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Photopoulos, Constantine.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492393/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492393/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492393/?ar">https://learning.oreilly.com/library/view/~/9781597492393/?ar</a><br/>Format:&#160;Electronic Resources<br/> The IT regulatory and standards compliance handbook ent://SD_ILS/0/SD_ILS:2285146 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Wright, Craig.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492669/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492669/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492669/?ar">https://learning.oreilly.com/library/view/~/9781597492669/?ar</a><br/>Format:&#160;Electronic Resources<br/> Best damn Exchange, SQL and IIS book period ent://SD_ILS/0/SD_ILS:2285659 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Agramont, Conrad H., Jr.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492195/?ar">https://learning.oreilly.com/library/view/~/9781597492195/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492195/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492195/?ar</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at administering Office communications server 2007 ent://SD_ILS/0/SD_ILS:2284512 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Piltzecker, Tony, 1975-<br/><a href="https://learning.oreilly.com/library/view/~/9781597492126/?ar">https://learning.oreilly.com/library/view/~/9781597492126/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492126/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492126/?ar</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at configuring VmWare ESX server ent://SD_ILS/0/SD_ILS:2284697 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Rule, David.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491945/?ar">https://learning.oreilly.com/library/view/~/9781597491945/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491945/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491945/?ar</a><br/>Format:&#160;Electronic Resources<br/> Web application vulnerabilities : detect, exploit, prevent ent://SD_ILS/0/SD_ILS:2285642 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Cross, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9781597492096/?ar">https://learning.oreilly.com/library/view/~/9781597492096/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492096/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492096/?ar</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at deploying and securing RFID ent://SD_ILS/0/SD_ILS:2285656 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Sanghera, Paul.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492300/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492300/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492300/?ar">https://learning.oreilly.com/library/view/~/9781597492300/?ar</a><br/>Format:&#160;Electronic Resources<br/> Video conferencing over IP configure, secure, and troubleshoot ent://SD_ILS/0/SD_ILS:65827 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Gough, Michael.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490634">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Implementing digital forensic readiness : from reactive to proactive process ent://SD_ILS/0/SD_ILS:2309988 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Sachowski, Jason, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128045015/?ar">https://go.oreilly.com/library-access/library/view/-/9780128045015/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128045015/?ar">https://learning.oreilly.com/library/view/~/9780128045015/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128045015">https://learning.oreilly.com/library/view/~/9780128045015</a><br/>Format:&#160;Electronic Resources<br/> How to define and build an effective cyber threat intelligence capability ent://SD_ILS/0/SD_ILS:2305447 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Dalziel, Henry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128027301/?ar">https://learning.oreilly.com/library/view/~/9780128027301/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128027301">https://learning.oreilly.com/library/view/~/9780128027301</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128027301/?ar">https://go.oreilly.com/library-access/library/view/-/9780128027301/?ar</a><br/>Format:&#160;Electronic Resources<br/> Collaboration with cloud computing : security, social media, and unified communications ent://SD_ILS/0/SD_ILS:2303105 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Messier, Ric.<br/><a href="https://learning.oreilly.com/library/view/~/9780124170407/?ar">https://learning.oreilly.com/library/view/~/9780124170407/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124170407/?ar">https://go.oreilly.com/library-access/library/view/-/9780124170407/?ar</a><br/>Format:&#160;Electronic Resources<br/> Federated identity primer ent://SD_ILS/0/SD_ILS:2296698 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Rountree, Derrick.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124071896/?ar">https://go.oreilly.com/library-access/library/view/-/9780124071896/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124071896/?ar">https://learning.oreilly.com/library/view/~/9780124071896/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124071896">https://learning.oreilly.com/library/view/~/9780124071896</a><br/>Format:&#160;Electronic Resources<br/> Digital forensics processing and procedures : meeting the requirements of ISO 17020, ISO 17025, ISO 27001 and best practice requirements ent://SD_ILS/0/SD_ILS:2301160 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Watson, David (David Lilburn)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497428/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497428/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597497428/?ar">https://learning.oreilly.com/library/view/~/9781597497428/?ar</a><br/>Format:&#160;Electronic Resources<br/> Augmented reality : an emerging technologies guide to AR ent://SD_ILS/0/SD_ILS:2298060 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Kipper, Gregory.<br/><a href="https://learning.oreilly.com/library/view/~/9781597497336/?ar">https://learning.oreilly.com/library/view/~/9781597497336/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597497336/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497336/?ar</a><br/>Format:&#160;Electronic Resources<br/> Simple steps to data encryption : a practical guide to secure computing ent://SD_ILS/0/SD_ILS:2300410 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Loshin, Peter.<br/><a href="https://learning.oreilly.com/library/view/~/9780124114838">https://learning.oreilly.com/library/view/~/9780124114838</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124114838/?ar">https://go.oreilly.com/library-access/library/view/-/9780124114838/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124114838/?ar">https://learning.oreilly.com/library/view/~/9780124114838/?ar</a><br/>Format:&#160;Electronic Resources<br/> Web application obfuscation : '-/WAFs.evasion.filters//alert (/obfuscation/)-' ent://SD_ILS/0/SD_ILS:2290508 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Heiderich, Mario.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496049/?ar">https://learning.oreilly.com/library/view/~/9781597496049/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597496049/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496049/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical lock picking : a physical penetration tester's training guide ent://SD_ILS/0/SD_ILS:2290004 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Ollam, Deviant.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496124">https://learning.oreilly.com/library/view/~/9781597496124</a> <a href="https://learning.oreilly.com/library/view/~/9781597496124/?ar">https://learning.oreilly.com/library/view/~/9781597496124/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597496124/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496124/?ar</a><br/>Format:&#160;Electronic Resources<br/> SQL injection attacks and defense ent://SD_ILS/0/SD_ILS:2287188 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Clarke, Justin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780080958576/?ar">https://go.oreilly.com/library-access/library/view/-/9780080958576/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780080958576/?ar">https://learning.oreilly.com/library/view/~/9780080958576/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780080958576">https://learning.oreilly.com/library/view/~/9780080958576</a><br/>Format:&#160;Electronic Resources<br/> Nmap in the enterprise : your guide to network scanning ent://SD_ILS/0/SD_ILS:2284518 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Orebaugh, Angela.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492416/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492416/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492416/?ar">https://learning.oreilly.com/library/view/~/9781597492416/?ar</a><br/>Format:&#160;Electronic Resources<br/> The best damn Windows Server 2008 book period ent://SD_ILS/0/SD_ILS:2286508 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Piltzecker, Tony, 1975-<br/><a href="https://learning.oreilly.com/library/view/~/9781597492737/?ar">https://learning.oreilly.com/library/view/~/9781597492737/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492737/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492737/?ar</a><br/>Format:&#160;Electronic Resources<br/> No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfing ent://SD_ILS/0/SD_ILS:2285143 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Long, Johnny.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492157/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492157/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492157/?ar">https://learning.oreilly.com/library/view/~/9781597492157/?ar</a><br/>Format:&#160;Electronic Resources<br/> The art of war for security managers : 10 steps to enhancing organizational effectiveness ent://SD_ILS/0/SD_ILS:2283746 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Watson, Scott A.<br/><a href="https://learning.oreilly.com/library/view/~/9780750679855/?ar">https://learning.oreilly.com/library/view/~/9780750679855/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780750679855/?ar">https://go.oreilly.com/library-access/library/view/-/9780750679855/?ar</a><br/>Format:&#160;Electronic Resources<br/> ASP.NET web developer's guide ent://SD_ILS/0/SD_ILS:2287785 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Āhamada, Mesabāha.<br/><a href="https://learning.oreilly.com/library/view/~/9781928994510">https://learning.oreilly.com/library/view/~/9781928994510</a> <a href="https://learning.oreilly.com/library/view/~/9781928994510/?ar">https://learning.oreilly.com/library/view/~/9781928994510/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781928994510/?ar">https://go.oreilly.com/library-access/library/view/-/9781928994510/?ar</a><br/>Format:&#160;Electronic Resources<br/> Integrating Python with Leading Computer Forensics Platforms. ent://SD_ILS/0/SD_ILS:2311613 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Hosmer, Chet.<br/><a href="https://learning.oreilly.com/library/view/~/9780128099506">https://learning.oreilly.com/library/view/~/9780128099506</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128099506/?ar">https://go.oreilly.com/library-access/library/view/-/9780128099506/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128099506/?ar">https://learning.oreilly.com/library/view/~/9780128099506/?ar</a><br/>Format:&#160;Electronic Resources<br/> The cloud security ecosystem : technical, legal, business and management issues ent://SD_ILS/0/SD_ILS:2208726 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Ko, Ryan, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2060804">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information hiding in speech signals for secure communication ent://SD_ILS/0/SD_ILS:2304565 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Wu, Zhijun, 1965 May-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128013281/?ar">https://go.oreilly.com/library-access/library/view/-/9780128013281/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128013281/?ar">https://learning.oreilly.com/library/view/~/9780128013281/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128013281">https://learning.oreilly.com/library/view/~/9780128013281</a><br/>Format:&#160;Electronic Resources<br/> Social engineering penetration testing : executing social engineering pen tests, assessments and defense ent://SD_ILS/0/SD_ILS:2303272 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Watson, Gavin, 1982- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780124201248">https://learning.oreilly.com/library/view/~/9780124201248</a> <a href="https://learning.oreilly.com/library/view/~/9780124201248/?ar">https://learning.oreilly.com/library/view/~/9780124201248/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124201248/?ar">https://go.oreilly.com/library-access/library/view/-/9780124201248/?ar</a><br/>Format:&#160;Electronic Resources<br/> Investigating internet crimes : an introduction to solving crimes in cyberspace ent://SD_ILS/0/SD_ILS:2300918 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Shipley, Todd G.<br/><a href="https://learning.oreilly.com/library/view/~/9780124078178">https://learning.oreilly.com/library/view/~/9780124078178</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124078178/?ar">https://go.oreilly.com/library-access/library/view/-/9780124078178/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124078178/?ar">https://learning.oreilly.com/library/view/~/9780124078178/?ar</a><br/>Format:&#160;Electronic Resources<br/> FISMA and the risk management framework the new practice of federal cyber security ent://SD_ILS/0/SD_ILS:2206053 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Gantz, Stephen D.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1074427">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Advanced persistent threat : understanding the danger and how to protect your organization ent://SD_ILS/0/SD_ILS:2296845 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Cole, Eric.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499491">https://learning.oreilly.com/library/view/~/9781597499491</a> <a href="https://learning.oreilly.com/library/view/~/9781597499491/?ar">https://learning.oreilly.com/library/view/~/9781597499491/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597499491/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499491/?ar</a><br/>Format:&#160;Electronic Resources<br/> UTM security with Fortinet : Mastering FortiOS ent://SD_ILS/0/SD_ILS:2296617 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Tam, Kenneth.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497473/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497473/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597497473/?ar">https://learning.oreilly.com/library/view/~/9781597497473/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597497473">https://learning.oreilly.com/library/view/~/9781597497473</a><br/>Format:&#160;Electronic Resources<br/> Applied network security monitoring : collection, detection, and analysis ent://SD_ILS/0/SD_ILS:2301151 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Sanders, Chris.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124172081/?ar">https://go.oreilly.com/library-access/library/view/-/9780124172081/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124172081/?ar">https://learning.oreilly.com/library/view/~/9780124172081/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124172081">https://learning.oreilly.com/library/view/~/9780124172081</a><br/>Format:&#160;Electronic Resources<br/> Moving to the cloud developing apps in the new world of cloud computing ent://SD_ILS/0/SD_ILS:2205573 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Sitaram, Dinkar.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=847478">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing SQL server : protecting your database from attackers ent://SD_ILS/0/SD_ILS:2295353 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Cherry, Denny.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499477/?ar">https://learning.oreilly.com/library/view/~/9781597499477/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597499477/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499477/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597499477">https://learning.oreilly.com/library/view/~/9781597499477</a><br/>Format:&#160;Electronic Resources<br/> Migrating to the cloud : Oracle client/server modernization ent://SD_ILS/0/SD_ILS:2292649 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Laszewski, Tom.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496476/?ar">https://learning.oreilly.com/library/view/~/9781597496476/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597496476/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496476/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597496476">https://learning.oreilly.com/library/view/~/9781597496476</a><br/>Format:&#160;Electronic Resources<br/> Low tech hacking : street smarts for security professionals ent://SD_ILS/0/SD_ILS:2293229 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Wiles, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496650">https://learning.oreilly.com/library/view/~/9781597496650</a> <a href="https://learning.oreilly.com/library/view/~/9781597496650/?ar">https://learning.oreilly.com/library/view/~/9781597496650/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597496650/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496650/?ar</a><br/>Format:&#160;Electronic Resources<br/> The basics of digital forensics : the primer for getting started in digital forensics ent://SD_ILS/0/SD_ILS:2293807 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Sammons, John.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496612">https://learning.oreilly.com/library/view/~/9781597496612</a> <a href="https://learning.oreilly.com/library/view/~/9781597496612/?ar">https://learning.oreilly.com/library/view/~/9781597496612/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597496612/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496612/?ar</a><br/>Format:&#160;Electronic Resources<br/> Metrics and methods for security risk management ent://SD_ILS/0/SD_ILS:2289369 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Young, Carl S.<br/><a href="https://learning.oreilly.com/library/view/~/9781856179782">https://learning.oreilly.com/library/view/~/9781856179782</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781856179782/?ar">https://go.oreilly.com/library-access/library/view/-/9781856179782/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781856179782/?ar">https://learning.oreilly.com/library/view/~/9781856179782/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network and system security ent://SD_ILS/0/SD_ILS:2288837 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Vacca, John R.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495356">https://learning.oreilly.com/library/view/~/9781597495356</a> <a href="https://learning.oreilly.com/library/view/~/9781597495356/?ar">https://learning.oreilly.com/library/view/~/9781597495356/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597495356/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495356/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft virtualization : master Microsoft Server, dektop, application, and presentation virtualization ent://SD_ILS/0/SD_ILS:2289710 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Olzak, Thomas.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494311/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494311/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597494311/?ar">https://learning.oreilly.com/library/view/~/9781597494311/?ar</a><br/>Format:&#160;Electronic Resources<br/> Next generation SSH2 implementation : securing data in motion ent://SD_ILS/0/SD_ILS:2285986 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Liu, Dale.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492836/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492836/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492836/?ar">https://learning.oreilly.com/library/view/~/9781597492836/?ar</a><br/>Format:&#160;Electronic Resources<br/> Google hacking for penetration testers. Volume 2 ent://SD_ILS/0/SD_ILS:2284509 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Long, Johnny.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491761/?ar">https://learning.oreilly.com/library/view/~/9781597491761/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491761/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491761/?ar</a><br/>Format:&#160;Electronic Resources<br/> Secrets stolen, fortunes lost : preventing intellectual property theft and economic espionage in the 21st century ent://SD_ILS/0/SD_ILS:2284520 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Burgess, Christopher.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492553/?ar">https://learning.oreilly.com/library/view/~/9781597492553/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492553/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492553/?ar</a><br/>Format:&#160;Electronic Resources<br/> The official CHFI study guide (Exam 312-49) : for computer hacking forensic investigator. ent://SD_ILS/0/SD_ILS:2283709 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Kleiman, Dave.<br/><a href="https://www.sciencedirect.com/science/book/9781597491976">https://www.sciencedirect.com/science/book/9781597491976</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491976/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491976/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597491976/?ar">https://learning.oreilly.com/library/view/~/9781597491976/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber crime investigations : bridging the gaps between security professionals, law enforcement, and prosecutors ent://SD_ILS/0/SD_ILS:2283566 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Reyes, Anthony.<br/><a href="https://www.sciencedirect.com/science/book/9781597491334">https://www.sciencedirect.com/science/book/9781597491334</a> <a href="https://learning.oreilly.com/library/view/~/9781597491334/?ar">https://learning.oreilly.com/library/view/~/9781597491334/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491334/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491334/?ar</a><br/>Format:&#160;Electronic Resources<br/> FISMA certification &amp; accreditation handbook ent://SD_ILS/0/SD_ILS:2283639 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Taylor, Laura.<br/><a href="https://www.sciencedirect.com/science/book/9781597491167">https://www.sciencedirect.com/science/book/9781597491167</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491167/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491167/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597491167/?ar">https://learning.oreilly.com/library/view/~/9781597491167/?ar</a><br/>Format:&#160;Electronic Resources<br/> Techno security's guide to securing SCADA ent://SD_ILS/0/SD_ILS:2285145 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Wiles, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492829/?ar">https://learning.oreilly.com/library/view/~/9781597492829/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492829/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492829/?ar</a><br/>Format:&#160;Electronic Resources<br/> How to own a shadow : the chase for Knuth ent://SD_ILS/0/SD_ILS:2302939 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Long, Johnny.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490818/?ar">https://learning.oreilly.com/library/view/~/9781597490818/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597490818/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490818/?ar</a><br/>Format:&#160;Electronic Resources<br/> Configuring SonicWALL firewalls ent://SD_ILS/0/SD_ILS:2282162 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Lathem, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/1597492507">https://learning.oreilly.com/library/view/~/1597492507</a> <a href="https://go.oreilly.com/library-access/library/view/-/1597492507/?ar">https://go.oreilly.com/library-access/library/view/-/1597492507/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1597492507/?ar">https://learning.oreilly.com/library/view/~/1597492507/?ar</a><br/>Format:&#160;Electronic Resources<br/> Building a VoIP network with Nortel's multimedia communication server 5100 ent://SD_ILS/0/SD_ILS:2283379 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Chafflin, Larry.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490788">https://learning.oreilly.com/library/view/~/9781597490788</a> <a href="https://learning.oreilly.com/library/view/~/9781597490788/?ar">https://learning.oreilly.com/library/view/~/9781597490788/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597490788/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490788/?ar</a><br/>Format:&#160;Electronic Resources<br/> Snort Intrusion Detection 2.0. ent://SD_ILS/0/SD_ILS:2286960 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Russell, Ryan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780080481005/?ar">https://go.oreilly.com/library-access/library/view/-/9780080481005/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780080481005/?ar">https://learning.oreilly.com/library/view/~/9780080481005/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780080481005">https://learning.oreilly.com/library/view/~/9780080481005</a><br/>Format:&#160;Electronic Resources<br/> VB.Net Web Developer's Guide. ent://SD_ILS/0/SD_ILS:2286961 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Wakefield, Cameron.<br/><a href="https://learning.oreilly.com/library/view/~/9781928994480/?ar">https://learning.oreilly.com/library/view/~/9781928994480/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781928994480/?ar">https://go.oreilly.com/library-access/library/view/-/9781928994480/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781928994480">https://learning.oreilly.com/library/view/~/9781928994480</a><br/>Format:&#160;Electronic Resources<br/> Executing Windows command line investigations : while ensuring evidentiary integrity ent://SD_ILS/0/SD_ILS:2310806 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Hosmer, Chet.<br/><a href="https://learning.oreilly.com/library/view/~/9780128092712">https://learning.oreilly.com/library/view/~/9780128092712</a> <a href="https://learning.oreilly.com/library/view/~/9780128092712/?ar">https://learning.oreilly.com/library/view/~/9780128092712/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128092712/?ar">https://go.oreilly.com/library-access/library/view/-/9780128092712/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows performance analysis field guide ent://SD_ILS/0/SD_ILS:2304335 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Huffman, Clint.<br/><a href="https://learning.oreilly.com/library/view/~/9780124167018">https://learning.oreilly.com/library/view/~/9780124167018</a> <a href="https://learning.oreilly.com/library/view/~/9780124167018/?ar">https://learning.oreilly.com/library/view/~/9780124167018/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124167018/?ar">https://go.oreilly.com/library-access/library/view/-/9780124167018/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber reconnaissance surveillance and defense ent://SD_ILS/0/SD_ILS:2304979 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Shimonski, Robert, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128013083">https://learning.oreilly.com/library/view/~/9780128013083</a> <a href="https://learning.oreilly.com/library/view/~/9780128013083/?ar">https://learning.oreilly.com/library/view/~/9780128013083/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128013083/?ar">https://go.oreilly.com/library-access/library/view/-/9780128013083/?ar</a><br/>Format:&#160;Electronic Resources<br/> Job reconnaissance : using hacking skills to win the job hunt game ent://SD_ILS/0/SD_ILS:2301169 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;More, Josh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780124166011">https://learning.oreilly.com/library/view/~/9780124166011</a> <a href="https://learning.oreilly.com/library/view/~/9780124166011/?ar">https://learning.oreilly.com/library/view/~/9780124166011/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124166011/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166011/?ar</a><br/>Format:&#160;Electronic Resources<br/> Optimizing IEEE 802.11i resource and security essentials : for mobile and stationary devices ent://SD_ILS/0/SD_ILS:2305446 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Naraei, Parisa, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128022221/?ar">https://go.oreilly.com/library-access/library/view/-/9780128022221/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128022221">https://learning.oreilly.com/library/view/~/9780128022221</a> <a href="https://learning.oreilly.com/library/view/~/9780128022221/?ar">https://learning.oreilly.com/library/view/~/9780128022221/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking with Kali : practical penetration testing techniques ent://SD_ILS/0/SD_ILS:2301946 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Broad, James.<br/><a href="https://learning.oreilly.com/library/view/~/9780124077492">https://learning.oreilly.com/library/view/~/9780124077492</a> <a href="https://learning.oreilly.com/library/view/~/9780124077492/?ar">https://learning.oreilly.com/library/view/~/9780124077492/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124077492/?ar">https://go.oreilly.com/library-access/library/view/-/9780124077492/?ar</a><br/>Format:&#160;Electronic Resources<br/> Identity and access management : business performance through connected intelligence ent://SD_ILS/0/SD_ILS:2301931 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Osmanoglu, T. Ertem.<br/><a href="https://learning.oreilly.com/library/view/~/9780124081406/?ar">https://learning.oreilly.com/library/view/~/9780124081406/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124081406">https://learning.oreilly.com/library/view/~/9780124081406</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124081406/?ar">https://go.oreilly.com/library-access/library/view/-/9780124081406/?ar</a><br/>Format:&#160;Electronic Resources<br/> The basics of IT audit : Purposes, processes, and practical information. ent://SD_ILS/0/SD_ILS:2301501 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Gantz, Stephen D.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124171596/?ar">https://go.oreilly.com/library-access/library/view/-/9780124171596/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124171596/?ar">https://learning.oreilly.com/library/view/~/9780124171596/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124171596">https://learning.oreilly.com/library/view/~/9780124171596</a><br/>Format:&#160;Electronic Resources<br/> Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocols ent://SD_ILS/0/SD_ILS:2296616 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Raggo, Michael T.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497435/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497435/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597497435/?ar">https://learning.oreilly.com/library/view/~/9781597497435/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597497435">https://learning.oreilly.com/library/view/~/9781597497435</a><br/>Format:&#160;Electronic Resources<br/> Windows 2012 server network security : securing your windows network systems and infrastructure ent://SD_ILS/0/SD_ILS:2298494 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Rountree, Derrick.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499583/?ar">https://learning.oreilly.com/library/view/~/9781597499583/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597499583/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499583/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597499583">https://learning.oreilly.com/library/view/~/9781597499583</a><br/>Format:&#160;Electronic Resources<br/> Cybercrime investigative case management : using digital forensics and investigative techniques to identify cybercrime suspects ent://SD_ILS/0/SD_ILS:2298526 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Shavers, Brett.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124095069/?ar">https://go.oreilly.com/library-access/library/view/-/9780124095069/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124095069">https://learning.oreilly.com/library/view/~/9780124095069</a> <a href="https://learning.oreilly.com/library/view/~/9780124095069/?ar">https://learning.oreilly.com/library/view/~/9780124095069/?ar</a><br/>Format:&#160;Electronic Resources<br/> The hacker's guide to OS X : exploiting OS X from the root-up ent://SD_ILS/0/SD_ILS:2298531 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Bathurst, Robert.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499507">https://learning.oreilly.com/library/view/~/9781597499507</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597499507/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499507/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597499507/?ar">https://learning.oreilly.com/library/view/~/9781597499507/?ar</a><br/>Format:&#160;Electronic Resources<br/> Logging and log management : the authoritative guide to understanding the concepts surrounding logging and log management ent://SD_ILS/0/SD_ILS:2296851 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Chuvakin, Anton A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597496353/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496353/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597496353/?ar">https://learning.oreilly.com/library/view/~/9781597496353/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597496353">https://learning.oreilly.com/library/view/~/9781597496353</a><br/>Format:&#160;Electronic Resources<br/> Applied cyber security and the smart grid : implementing security controls into the modern power infrastructure ent://SD_ILS/0/SD_ILS:2298917 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Knapp, Eric D.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499989/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499989/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597499989/?ar">https://learning.oreilly.com/library/view/~/9781597499989/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597499989">https://learning.oreilly.com/library/view/~/9781597499989</a><br/>Format:&#160;Electronic Resources<br/> The basics of web hacking : tools and techniques to attack the web ent://SD_ILS/0/SD_ILS:2300058 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Pauli, Joshua J.<br/><a href="https://learning.oreilly.com/library/view/~/9780124166004/?ar">https://learning.oreilly.com/library/view/~/9780124166004/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124166004/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166004/?ar</a><br/>Format:&#160;Electronic Resources<br/> Introduction to cyber-warfare : a multidisciplinary approach ent://SD_ILS/0/SD_ILS:2300196 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Shakarian, Paulo.<br/><a href="https://learning.oreilly.com/library/view/~/9780124078147">https://learning.oreilly.com/library/view/~/9780124078147</a> <a href="https://learning.oreilly.com/library/view/~/9780124078147/?ar">https://learning.oreilly.com/library/view/~/9780124078147/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124078147/?ar">https://go.oreilly.com/library-access/library/view/-/9780124078147/?ar</a><br/>Format:&#160;Electronic Resources<br/> Coding for penetration testers building better tools ent://SD_ILS/0/SD_ILS:2205470 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Andress, Jason.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=773396">Click to View</a><br/>Format:&#160;Electronic Resources<br/> PCI compliance : understand and implement effective PCI data security standard compliance, third edition ent://SD_ILS/0/SD_ILS:2298067 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Williams, Branden R.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499484/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499484/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597499484/?ar">https://learning.oreilly.com/library/view/~/9781597499484/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows forensic analysis toolkit ent://SD_ILS/0/SD_ILS:2295823 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Carvey, Harlan A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597497275/?ar">https://learning.oreilly.com/library/view/~/9781597497275/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network intrusion analysis : methodologies, tools, and techniques for incident analysis and response ent://SD_ILS/0/SD_ILS:2296392 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Fichera, Joe, 1966-<br/><a href="https://learning.oreilly.com/library/view/~/9781597499620">https://learning.oreilly.com/library/view/~/9781597499620</a> <a href="https://learning.oreilly.com/library/view/~/9781597499620/?ar">https://learning.oreilly.com/library/view/~/9781597499620/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597499620/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499620/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security risk assessment toolkit : practical assessments through data collection and data analysis ent://SD_ILS/0/SD_ILS:2298519 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Talabis, Mark Ryan M.<br/><a href="https://learning.oreilly.com/library/view/~/9781597497350/?ar">https://learning.oreilly.com/library/view/~/9781597497350/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597497350/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497350/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597497350">https://learning.oreilly.com/library/view/~/9781597497350</a><br/>Format:&#160;Electronic Resources<br/> Hacking web apps : detecting and preventing web application security problems ent://SD_ILS/0/SD_ILS:2295912 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Shema, Mike.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499514/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499514/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597499514/?ar">https://learning.oreilly.com/library/view/~/9781597499514/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597499514">https://learning.oreilly.com/library/view/~/9781597499514</a><br/>Format:&#160;Electronic Resources<br/> Malware forensics field guide for Windows systems : digital forensics field guides ent://SD_ILS/0/SD_ILS:2294682 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Malin, Cameron H.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494724/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494724/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597494724/?ar">https://learning.oreilly.com/library/view/~/9781597494724/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597494724">https://learning.oreilly.com/library/view/~/9781597494724</a><br/>Format:&#160;Electronic Resources<br/> Security risk management : building an information security risk management program from the ground up ent://SD_ILS/0/SD_ILS:2291351 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Wheeler, Evan.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496155">https://learning.oreilly.com/library/view/~/9781597496155</a> <a href="https://learning.oreilly.com/library/view/~/9781597496155/?ar">https://learning.oreilly.com/library/view/~/9781597496155/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597496155/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496155/?ar</a><br/>Format:&#160;Electronic Resources<br/> Moving to the cloud : developing apps in the new world of cloud computing ent://SD_ILS/0/SD_ILS:2293141 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Sitaram, Dinkar.<br/><a href="https://learning.oreilly.com/library/view/~/9781597497251">https://learning.oreilly.com/library/view/~/9781597497251</a> <a href="https://learning.oreilly.com/library/view/~/9781597497251/?ar">https://learning.oreilly.com/library/view/~/9781597497251/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597497251/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497251/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security for Microsoft Windows system administrators : introduction to key information security concepts ent://SD_ILS/0/SD_ILS:2290287 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Rountree, Derrick.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495943/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495943/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495943/?ar">https://learning.oreilly.com/library/view/~/9781597495943/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495943">https://learning.oreilly.com/library/view/~/9781597495943</a><br/>Format:&#160;Electronic Resources<br/> Ninja hacking : unconventional penetration testing tactics and techniques ent://SD_ILS/0/SD_ILS:2290304 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Wilhelm, Thomas.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495899">https://learning.oreilly.com/library/view/~/9781597495899</a> <a href="https://learning.oreilly.com/library/view/~/9781597495899/?ar">https://learning.oreilly.com/library/view/~/9781597495899/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597495899/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495899/?ar</a><br/>Format:&#160;Electronic Resources<br/> Xbox 360 forensics : a digital forensics guide to examining artifacts ent://SD_ILS/0/SD_ILS:2290978 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Bolt, Steven.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496230">https://learning.oreilly.com/library/view/~/9781597496230</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597496230/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496230/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597496230/?ar">https://learning.oreilly.com/library/view/~/9781597496230/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber warfare : techniques, tactics and tools for security practitioners ent://SD_ILS/0/SD_ILS:2292501 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Andress, Jason.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597496377/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496377/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597496377/?ar">https://learning.oreilly.com/library/view/~/9781597496377/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybercrime and espionage : an analysis of subversive multi-vector threats ent://SD_ILS/0/SD_ILS:2290838 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Gragido, Will.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597496148/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496148/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597496148">https://learning.oreilly.com/library/view/~/9781597496148</a> <a href="https://learning.oreilly.com/library/view/~/9781597496148/?ar">https://learning.oreilly.com/library/view/~/9781597496148/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing SQL server : protecting your database from attackers ent://SD_ILS/0/SD_ILS:2290991 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Cherry, Denny.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496254">https://learning.oreilly.com/library/view/~/9781597496254</a> <a href="https://learning.oreilly.com/library/view/~/9781597496254/?ar">https://learning.oreilly.com/library/view/~/9781597496254/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597496254/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496254/?ar</a><br/>Format:&#160;Electronic Resources<br/> Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems ent://SD_ILS/0/SD_ILS:2292129 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Knapp, Eric.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597496452/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496452/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597496452/?ar">https://learning.oreilly.com/library/view/~/9781597496452/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597496452">https://learning.oreilly.com/library/view/~/9781597496452</a><br/>Format:&#160;Electronic Resources<br/> Securing the cloud : cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:2292491 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Winkler, J. R. (Joachim R.)<br/><a href="https://learning.oreilly.com/library/view/~/9781597495929">https://learning.oreilly.com/library/view/~/9781597495929</a> <a href="https://learning.oreilly.com/library/view/~/9781597495929/?ar">https://learning.oreilly.com/library/view/~/9781597495929/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597495929/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495929/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and data ent://SD_ILS/0/SD_ILS:2289149 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Lillard, Terrence.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495387/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495387/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495387/?ar">https://learning.oreilly.com/library/view/~/9781597495387/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495387">https://learning.oreilly.com/library/view/~/9781597495387</a><br/>Format:&#160;Electronic Resources<br/> PCI compliance : understand and implement effective PCI data security standard compliance. ent://SD_ILS/0/SD_ILS:2288641 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Chuvakin, Anton.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494991/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494991/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597494991/?ar">https://learning.oreilly.com/library/view/~/9781597494991/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Windows Server 2008 R2 administrator's reference : the administrator's essential guide ent://SD_ILS/0/SD_ILS:2289694 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Hannifin, Dustin.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495783">https://learning.oreilly.com/library/view/~/9781597495783</a> <a href="https://learning.oreilly.com/library/view/~/9781597495783/?ar">https://learning.oreilly.com/library/view/~/9781597495783/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597495783/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495783/?ar</a><br/>Format:&#160;Electronic Resources<br/> Citrix XenDesktop implementation : a practical guide for IT professionals ent://SD_ILS/0/SD_ILS:2289803 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;James, Gareth R.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495820">https://learning.oreilly.com/library/view/~/9781597495820</a> <a href="https://learning.oreilly.com/library/view/~/9781597495820/?ar">https://learning.oreilly.com/library/view/~/9781597495820/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597495820/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495820/?ar</a><br/>Format:&#160;Electronic Resources<br/> Dissecting the hack : the f0rb1dd3n network ent://SD_ILS/0/SD_ILS:2290700 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Street, Jayson E.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495684/?ar">https://learning.oreilly.com/library/view/~/9781597495684/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597495684/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495684/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cisco router and switch forensics : investigating and analyzing malicious network activity ent://SD_ILS/0/SD_ILS:2287180 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Liu, Dale.<br/><a href="https://learning.oreilly.com/library/view/~/9781597494182">https://learning.oreilly.com/library/view/~/9781597494182</a> <a href="https://learning.oreilly.com/library/view/~/9781597494182/?ar">https://learning.oreilly.com/library/view/~/9781597494182/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597494182/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494182/?ar</a><br/>Format:&#160;Electronic Resources<br/> E-discovery : creating and managing an enterprisewide program : a technical guide to digital investigation and litigation support ent://SD_ILS/0/SD_ILS:2286529 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Schuler, Karen.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492966/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492966/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492966/?ar">https://learning.oreilly.com/library/view/~/9781597492966/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mobile malware attacks and defense ent://SD_ILS/0/SD_ILS:2294476 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Dunham, Ken.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492980/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492980/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492980/?ar">https://learning.oreilly.com/library/view/~/9781597492980/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cisco CCNA/CCENT exam 640-802, 640-822, 640-816 preparation kit ent://SD_ILS/0/SD_ILS:2287629 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Liu, Dale.<br/><a href="https://learning.oreilly.com/library/view/~/9781597493062/?ar">https://learning.oreilly.com/library/view/~/9781597493062/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597493062/?ar">https://go.oreilly.com/library-access/library/view/-/9781597493062/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597493062">https://learning.oreilly.com/library/view/~/9781597493062</a><br/>Format:&#160;Electronic Resources<br/> OSSEC host-based intrusion detection guide ent://SD_ILS/0/SD_ILS:2285140 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Hay, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492409">https://learning.oreilly.com/library/view/~/9781597492409</a> <a href="https://learning.oreilly.com/library/view/~/9781597492409/?ar">https://learning.oreilly.com/library/view/~/9781597492409/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492409/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492409/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft forefront security administration guide ent://SD_ILS/0/SD_ILS:2284517 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Varsalone, Jesse.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492447">https://learning.oreilly.com/library/view/~/9781597492447</a> <a href="https://learning.oreilly.com/library/view/~/9781597492447/?ar">https://learning.oreilly.com/library/view/~/9781597492447/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492447/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492447/?ar</a><br/>Format:&#160;Electronic Resources<br/> Check Point NGX R65 security administration ent://SD_ILS/0/SD_ILS:2284519 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Bonnell, Ralph.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492454/?ar">https://learning.oreilly.com/library/view/~/9781597492454/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492454/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492454/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492454">https://learning.oreilly.com/library/view/~/9781597492454</a><br/>Format:&#160;Electronic Resources<br/> Malware forensics : investigating and analyzing malicious code ent://SD_ILS/0/SD_ILS:2285693 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Aquilina, James M.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492683/?ar">https://learning.oreilly.com/library/view/~/9781597492683/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492683/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492683/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492683">https://learning.oreilly.com/library/view/~/9781597492683</a><br/>Format:&#160;Electronic Resources<br/> Securing Windows server 2008 : prevent attacks from outside and inside your organization. ent://SD_ILS/0/SD_ILS:2285141 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z <a href="https://learning.oreilly.com/library/view/~/9781597492805">https://learning.oreilly.com/library/view/~/9781597492805</a> <a href="https://learning.oreilly.com/library/view/~/9781597492805/?ar">https://learning.oreilly.com/library/view/~/9781597492805/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492805/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492805/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing Citrix XenApp Server in the enterprise ent://SD_ILS/0/SD_ILS:2285144 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Bin Azad, Tariq.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492812/?ar">https://learning.oreilly.com/library/view/~/9781597492812/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492812/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492812/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492812">https://learning.oreilly.com/library/view/~/9781597492812</a><br/>Format:&#160;Electronic Resources<br/> Integrating ISA Server 2006 with Microsoft Exchange 2007 ent://SD_ILS/0/SD_ILS:2285147 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Strachan, Fergus.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492751/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492751/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492751/?ar">https://learning.oreilly.com/library/view/~/9781597492751/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kismet hacking ent://SD_ILS/0/SD_ILS:2285148 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Haines, Brad.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491174">https://learning.oreilly.com/library/view/~/9781597491174</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491174/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491174/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597491174/?ar">https://learning.oreilly.com/library/view/~/9781597491174/?ar</a><br/>Format:&#160;Electronic Resources<br/> Reverse engineering code with IDA Pro ent://SD_ILS/0/SD_ILS:2285151 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Ferguson, Justin.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492379/?ar">https://learning.oreilly.com/library/view/~/9781597492379/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492379/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492379/?ar</a><br/>Format:&#160;Electronic Resources<br/> Nagios 3 enterprise network monitoring : including plug-ins and hardware devices ent://SD_ILS/0/SD_ILS:2285153 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Schubert, Max.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492676/?ar">https://learning.oreilly.com/library/view/~/9781597492676/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492676/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492676/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492676">https://learning.oreilly.com/library/view/~/9781597492676</a><br/>Format:&#160;Electronic Resources<br/> XSS attacks : cross-site scripting exploits and defense ent://SD_ILS/0/SD_ILS:2283990 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Grossman, Jeremiah.<br/><a href="https://learning.oreilly.com/library/view/~/9780080553405/?ar">https://learning.oreilly.com/library/view/~/9780080553405/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780080553405/?ar">https://go.oreilly.com/library-access/library/view/-/9780080553405/?ar</a> <a href="https://www.sciencedirect.com/science/book/9781597491549">https://www.sciencedirect.com/science/book/9781597491549</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at securing your network ent://SD_ILS/0/SD_ILS:2284630 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Dubrawsky, Ido.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492317/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492317/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492317/?ar">https://learning.oreilly.com/library/view/~/9781597492317/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492317">https://learning.oreilly.com/library/view/~/9781597492317</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at configuring Exchange server 2007 : including Outlook web, mobile, and voice access ent://SD_ILS/0/SD_ILS:2283567 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Walther, Henrik.<br/><a href="https://www.sciencedirect.com/science/book/9781597491372">https://www.sciencedirect.com/science/book/9781597491372</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491372/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491372/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597491372/?ar">https://learning.oreilly.com/library/view/~/9781597491372/?ar</a><br/>Format:&#160;Electronic Resources<br/> Alternate data storage forensics ent://SD_ILS/0/SD_ILS:2283569 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Schroader, Amber.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780080554754/?ar">https://go.oreilly.com/library-access/library/view/-/9780080554754/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780080554754/?ar">https://learning.oreilly.com/library/view/~/9780080554754/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780080554754">https://learning.oreilly.com/library/view/~/9780080554754</a> <a href="https://www.sciencedirect.com/science/book/9781597491631">https://www.sciencedirect.com/science/book/9781597491631</a><br/>Format:&#160;Electronic Resources<br/> Techno security's guide to e-discovery and digital forensics ent://SD_ILS/0/SD_ILS:2284514 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Wiles, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492232">https://learning.oreilly.com/library/view/~/9781597492232</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492232/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492232/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492232/?ar">https://learning.oreilly.com/library/view/~/9781597492232/?ar</a><br/>Format:&#160;Electronic Resources<br/> Perl scripting for Windows security : live response, forensic analysis, and monitoring ent://SD_ILS/0/SD_ILS:2284953 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Carvey, Harlan A.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491730/?ar">https://learning.oreilly.com/library/view/~/9781597491730/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491730/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491730/?ar</a><br/>Format:&#160;Electronic Resources<br/> Metasploit toolkit for penetration testing, exploit development, and vulnerability research ent://SD_ILS/0/SD_ILS:2284167 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Maynor, David.<br/><a href="https://www.sciencedirect.com/science/book/9781597490740">https://www.sciencedirect.com/science/book/9781597490740</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597490740/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490740/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597490740/?ar">https://learning.oreilly.com/library/view/~/9781597490740/?ar</a><br/>Format:&#160;Electronic Resources<br/> BigNum math : implementing cryptographic multiple precision arithmetic ent://SD_ILS/0/SD_ILS:2282290 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;St. Denis, Tom.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597491129/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491129/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597491129/?ar">https://learning.oreilly.com/library/view/~/9781597491129/?ar</a> <a href="https://www.sciencedirect.com/science/book/9781597491129">https://www.sciencedirect.com/science/book/9781597491129</a> <a href="https://learning.oreilly.com/library/view/~/9781597491129">https://learning.oreilly.com/library/view/~/9781597491129</a><br/>Format:&#160;Electronic Resources<br/> Dictionary of information security ent://SD_ILS/0/SD_ILS:2282318 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Slade, Robert.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491150">https://learning.oreilly.com/library/view/~/9781597491150</a> <a href="https://learning.oreilly.com/library/view/~/9781597491150/?ar">https://learning.oreilly.com/library/view/~/9781597491150/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491150/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491150/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cisco security specialist's guide to PIX firewalls ent://SD_ILS/0/SD_ILS:2280786 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Osipav, Vitaly.<br/><a href="https://www.sciencedirect.com/science/book/9781931836630">https://www.sciencedirect.com/science/book/9781931836630</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781931836630/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836630/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781931836630/?ar">https://learning.oreilly.com/library/view/~/9781931836630/?ar</a><br/>Format:&#160;Electronic Resources<br/> Building robots with Lego Mindstorms : the ultimate tool for Mindstorms maniacs ent://SD_ILS/0/SD_ILS:2287784 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Ferrari, Mario.<br/><a href="https://learning.oreilly.com/library/view/~/9781928994671">https://learning.oreilly.com/library/view/~/9781928994671</a> <a href="https://learning.oreilly.com/library/view/~/9781928994671/?ar">https://learning.oreilly.com/library/view/~/9781928994671/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781928994671/?ar">https://go.oreilly.com/library-access/library/view/-/9781928994671/?ar</a><br/>Format:&#160;Electronic Resources<br/> Bluetooth application developer's guide : the short range interconnect solution ent://SD_ILS/0/SD_ILS:2291337 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Krammer, David.<br/><a href="https://learning.oreilly.com/library/view/~/9781928994428/?ar">https://learning.oreilly.com/library/view/~/9781928994428/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781928994428">https://learning.oreilly.com/library/view/~/9781928994428</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781928994428/?ar">https://go.oreilly.com/library-access/library/view/-/9781928994428/?ar</a><br/>Format:&#160;Electronic Resources<br/> Violent Python : a cookbook for hackers, forensic analysts, penetration testers and security engineers ent://SD_ILS/0/SD_ILS:2296624 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;O'Connor, T. J.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499576/?ar">https://learning.oreilly.com/library/view/~/9781597499576/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597499576/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499576/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597499576">https://learning.oreilly.com/library/view/~/9781597499576</a><br/>Format:&#160;Electronic Resources<br/> Placing the suspect behind the keyboard : using digital forensics and investigative techniques to identify cybercrime suspects ent://SD_ILS/0/SD_ILS:2298055 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Shavers, Brett.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499859/?ar">https://learning.oreilly.com/library/view/~/9781597499859/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597499859/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499859/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597499859">https://learning.oreilly.com/library/view/~/9781597499859</a><br/>Format:&#160;Electronic Resources<br/> Windows Server 2012 security from end to edge and beyond : architecting, designing, planning, and deploying Windows Server 2012 security solutions ent://SD_ILS/0/SD_ILS:2299662 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Shinder, Thomas W.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499804">https://learning.oreilly.com/library/view/~/9781597499804</a> <a href="https://learning.oreilly.com/library/view/~/9781597499804/?ar">https://learning.oreilly.com/library/view/~/9781597499804/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597499804/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499804/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybercrime case presentation : using digital forensics and investigative techniques to identify cybercrime suspects ent://SD_ILS/0/SD_ILS:2298517 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Shavers, Brett.<br/><a href="https://learning.oreilly.com/library/view/~/9780124095045/?ar">https://learning.oreilly.com/library/view/~/9780124095045/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124095045">https://learning.oreilly.com/library/view/~/9780124095045</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124095045/?ar">https://go.oreilly.com/library-access/library/view/-/9780124095045/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital forensics for legal professionals : understanding digital evidence from the warrant to the courtroom ent://SD_ILS/0/SD_ILS:2292646 2024-06-20T07:36:03Z 2024-06-20T07:36:03Z by&#160;Daniel, Larry (Larry E.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597496438/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496438/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597496438/?ar">https://learning.oreilly.com/library/view/~/9781597496438/?ar</a><br/>Format:&#160;Electronic Resources<br/>