Search Results for Electronic books. - Narrowed by: Réseaux d'ordinateurs -- Sécurité -- Mesures.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dElectronic$002bbooks.$0026qf$003dSUBJECT$002509Konu$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$002509R$0025C3$0025A9seaux$002bd$002527ordinateurs$002b--$002bS$0025C3$0025A9curit$0025C3$0025A9$002b--$002bMesures.$0026te$003dILS$0026ps$003d300?
2024-09-23T23:30:21Z
Introduction to network security : theory and practice
ent://SD_ILS/0/SD_ILS:2311286
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Wang, Jie, 1961- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118939482/?ar">https://go.oreilly.com/library-access/library/view/-/9781118939482/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118939482/?ar">https://learning.oreilly.com/library/view/~/9781118939482/?ar</a><br/>Format: Elektronik Kaynak<br/>
Network and system security
ent://SD_ILS/0/SD_ILS:2301170
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Vacca, John R.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124166899/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166899/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124166899/?ar">https://learning.oreilly.com/library/view/~/9780124166899/?ar</a><br/>Format: Elektronik Kaynak<br/>
Network and data security for non-engineers
ent://SD_ILS/0/SD_ILS:2316046
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Groom, Frank M., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781315350219/?ar">https://go.oreilly.com/library-access/library/view/-/9781315350219/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781315350219/?ar">https://learning.oreilly.com/library/view/~/9781315350219/?ar</a><br/>Format: Elektronik Kaynak<br/>
The practice of network security monitoring
ent://SD_ILS/0/SD_ILS:2300232
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Bejtlich, Richard.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457185175/?ar">https://go.oreilly.com/library-access/library/view/-/9781457185175/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457185175/?ar">https://learning.oreilly.com/library/view/~/9781457185175/?ar</a><br/>Format: Elektronik Kaynak<br/>
Network security : a practical approach
ent://SD_ILS/0/SD_ILS:2296928
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Harrington, Jan L.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780123116338/?ar">https://go.oreilly.com/library-access/library/view/-/9780123116338/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780123116338/?ar">https://learning.oreilly.com/library/view/~/9780123116338/?ar</a><br/>Format: Elektronik Kaynak<br/>
Network security technologies and solutions
ent://SD_ILS/0/SD_ILS:2285404
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Bhaiji, Fahim Hussain Yusuf.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780768681963/?ar">https://go.oreilly.com/library-access/library/view/-/9780768681963/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780768681963/?ar">https://learning.oreilly.com/library/view/~/9780768681963/?ar</a><br/>Format: Elektronik Kaynak<br/>
Computer Network Security
ent://SD_ILS/0/SD_ILS:2323627
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Sadiqui, Ali, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781786305275/?ar">https://go.oreilly.com/library-access/library/view/-/9781786305275/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786305275">https://learning.oreilly.com/library/view/~/9781786305275</a>
<a href="https://learning.oreilly.com/library/view/~/9781786305275/?ar">https://learning.oreilly.com/library/view/~/9781786305275/?ar</a><br/>Format: Elektronik Kaynak<br/>
Security monitoring
ent://SD_ILS/0/SD_ILS:2286050
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Fry, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/9780596157944/?ar">https://learning.oreilly.com/library/view/~/9780596157944/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596157944">https://learning.oreilly.com/library/view/~/9780596157944</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780596157944/?ar">https://go.oreilly.com/library-access/library/view/-/9780596157944/?ar</a><br/>Format: Elektronik Kaynak<br/>
Network security assessment
ent://SD_ILS/0/SD_ILS:2283925
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by McNab, Chris (Chris R.), 1980-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780596510305/?ar">https://go.oreilly.com/library-access/library/view/-/9780596510305/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596510305/?ar">https://learning.oreilly.com/library/view/~/9780596510305/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596510305">https://learning.oreilly.com/library/view/~/9780596510305</a><br/>Format: Elektronik Kaynak<br/>
Inside network perimeter security
ent://SD_ILS/0/SD_ILS:2283365
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Northcutt, Stephen.<br/><a href="https://learning.oreilly.com/library/view/~/0672327376">https://learning.oreilly.com/library/view/~/0672327376</a>
<a href="https://learning.oreilly.com/library/view/~/0672327376/?ar">https://learning.oreilly.com/library/view/~/0672327376/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0672327376/?ar">https://go.oreilly.com/library-access/library/view/-/0672327376/?ar</a><br/>Format: Elektronik Kaynak<br/>
Practical vulnerability management : a strategic approach to managing cyber risk
ent://SD_ILS/0/SD_ILS:2325867
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Magnusson, Andrew, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098125707/?ar">https://go.oreilly.com/library-access/library/view/-/9781098125707/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098125707/?ar">https://learning.oreilly.com/library/view/~/9781098125707/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098125707">https://learning.oreilly.com/library/view/~/9781098125707</a><br/>Format: Elektronik Kaynak<br/>
The Tao of Network Security Monitoring Beyond Intrusion Detection
ent://SD_ILS/0/SD_ILS:2319768
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Bejtlich, Richard, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321246772/?ar">https://go.oreilly.com/library-access/library/view/-/0321246772/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321246772/?ar">https://learning.oreilly.com/library/view/~/0321246772/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321246772">https://learning.oreilly.com/library/view/~/0321246772</a><br/>Format: Elektronik Kaynak<br/>
End-to-end network security : defense-in-depth
ent://SD_ILS/0/SD_ILS:2284052
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Santos, Omar.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781587053320/?ar">https://go.oreilly.com/library-access/library/view/-/9781587053320/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781587053320/?ar">https://learning.oreilly.com/library/view/~/9781587053320/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781587053320">https://learning.oreilly.com/library/view/~/9781587053320</a><br/>Format: Elektronik Kaynak<br/>
Self-defending networks : the next generation of network security
ent://SD_ILS/0/SD_ILS:2282790
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by De Capite, Duane.<br/><a href="https://learning.oreilly.com/library/view/~/1587052539/?ar">https://learning.oreilly.com/library/view/~/1587052539/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1587052539/?ar">https://go.oreilly.com/library-access/library/view/-/1587052539/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587052539">https://learning.oreilly.com/library/view/~/1587052539</a><br/>Format: Elektronik Kaynak<br/>
The Practice of Network Security : Deployment Strategies for Production Environments.
ent://SD_ILS/0/SD_ILS:2317904
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Liska, Allan, author.<br/><a href="https://learning.oreilly.com/library/view/~/0130462233">https://learning.oreilly.com/library/view/~/0130462233</a>
<a href="https://learning.oreilly.com/library/view/~/0130462233/?ar">https://learning.oreilly.com/library/view/~/0130462233/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0130462233/?ar">https://go.oreilly.com/library-access/library/view/-/0130462233/?ar</a><br/>Format: Elektronik Kaynak<br/>
Docker security : using containers safely in production
ent://SD_ILS/0/SD_ILS:2316622
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Mouat, Adrian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042297/?ar">https://learning.oreilly.com/library/view/~/9781492042297/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492042297/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042297/?ar</a><br/>Format: Elektronik Kaynak<br/>
Implementing DirectAccess with Windows Server 2016
ent://SD_ILS/0/SD_ILS:2311767
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Hicks, Richard M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484220597/?ar">https://learning.oreilly.com/library/view/~/9781484220597/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484220597/?ar">https://go.oreilly.com/library-access/library/view/-/9781484220597/?ar</a><br/>Format: Elektronik Kaynak<br/>
Cisco Firepower Threat Defense (FTD) : configuration and troubleshooting best practices for the Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Advanced Malware Protection (AMP)
ent://SD_ILS/0/SD_ILS:2314393
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Rajib, Nazmul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134679471">https://learning.oreilly.com/library/view/~/9780134679471</a>
<a href="https://learning.oreilly.com/library/view/~/9780134679471/?ar">https://learning.oreilly.com/library/view/~/9780134679471/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134679471/?ar">https://go.oreilly.com/library-access/library/view/-/9780134679471/?ar</a><br/>Format: Elektronik Kaynak<br/>
Zero trust networks : building secure systems in untrusted networks
ent://SD_ILS/0/SD_ILS:2313595
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Gilman, Evan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491962183/?ar">https://learning.oreilly.com/library/view/~/9781491962183/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491962183">https://learning.oreilly.com/library/view/~/9781491962183</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491962183/?ar">https://go.oreilly.com/library-access/library/view/-/9781491962183/?ar</a><br/>Format: Elektronik Kaynak<br/>
Cisco next-generation security solutions : all-in-one Cisco ASA FirePOWER services, NGIPS, and AMP
ent://SD_ILS/0/SD_ILS:2311054
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Santos, Omar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134213071/?ar">https://go.oreilly.com/library-access/library/view/-/9780134213071/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134213071/?ar">https://learning.oreilly.com/library/view/~/9780134213071/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134213071">https://learning.oreilly.com/library/view/~/9780134213071</a><br/>Format: Elektronik Kaynak<br/>
Incident Response : a Strategic Guide to Handling System and Network Security Breaches.
ent://SD_ILS/0/SD_ILS:2290476
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Schultz, E. Eugene, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1578702569/?ar">https://go.oreilly.com/library-access/library/view/-/1578702569/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1578702569/?ar">https://learning.oreilly.com/library/view/~/1578702569/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1578702569">https://learning.oreilly.com/library/view/~/1578702569</a><br/>Format: Elektronik Kaynak<br/>
Cybersecurity essentials
ent://SD_ILS/0/SD_ILS:2322482
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Brooks, Charles J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119362395/?ar">https://learning.oreilly.com/library/view/~/9781119362395/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119362395/?ar">https://go.oreilly.com/library-access/library/view/-/9781119362395/?ar</a><br/>Format: Elektronik Kaynak<br/>
Kerberos : Single Sign-on in gemischten Linux/Windows-Umgebungen.
ent://SD_ILS/0/SD_ILS:2295135
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Pröhl, Mark.<br/><a href="https://learning.oreilly.com/library/view/~/9781457170393/?ar">https://learning.oreilly.com/library/view/~/9781457170393/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781457170393/?ar">https://go.oreilly.com/library-access/library/view/-/9781457170393/?ar</a><br/>Format: Elektronik Kaynak<br/>
Kerberos : Single Sign-on in gemischten Linux/Windows-Umgebungen.
ent://SD_ILS/0/SD_ILS:2332670
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Pröhl, Mark.<br/><a href="https://learning.oreilly.com/library/view/~/9781098141059/?ar">https://learning.oreilly.com/library/view/~/9781098141059/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098141059/?ar">https://go.oreilly.com/library-access/library/view/-/9781098141059/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098141059">https://learning.oreilly.com/library/view/~/9781098141059</a><br/>Format: Elektronik Kaynak<br/>
Maximum Security, Fourth Edition
ent://SD_ILS/0/SD_ILS:2319594
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Anonymous, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0672324598/?ar">https://go.oreilly.com/library-access/library/view/-/0672324598/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672324598">https://learning.oreilly.com/library/view/~/0672324598</a>
<a href="https://learning.oreilly.com/library/view/~/0672324598/?ar">https://learning.oreilly.com/library/view/~/0672324598/?ar</a><br/>Format: Elektronik Kaynak<br/>
SELinux System Administration : ward off traditional security permissions and effectively secure your Linuxs systems with SELinux
ent://SD_ILS/0/SD_ILS:2312410
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Vermeulen, Sven, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787126954/?ar">https://go.oreilly.com/library-access/library/view/-/9781787126954/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787126954">https://learning.oreilly.com/library/view/~/9781787126954</a>
<a href="https://learning.oreilly.com/library/view/~/9781787126954/?ar">https://learning.oreilly.com/library/view/~/9781787126954/?ar</a><br/>Format: Elektronik Kaynak<br/>
Netzwerkangriffe von innen
ent://SD_ILS/0/SD_ILS:2286474
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Ziegler, Paul Sebastian.<br/><a href="https://learning.oreilly.com/library/view/~/9783897217782">https://learning.oreilly.com/library/view/~/9783897217782</a>
<a href="https://learning.oreilly.com/library/view/~/9783897217782/?ar">https://learning.oreilly.com/library/view/~/9783897217782/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783897217782/?ar">https://go.oreilly.com/library-access/library/view/-/9783897217782/?ar</a><br/>Format: Elektronik Kaynak<br/>
Fixing an insecure software life cycle : practical techniques for building security into existing software development programs
ent://SD_ILS/0/SD_ILS:2316498
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Wright, April C., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492028222">https://learning.oreilly.com/library/view/~/9781492028222</a>
<a href="https://learning.oreilly.com/library/view/~/9781492028222/?ar">https://learning.oreilly.com/library/view/~/9781492028222/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492028222/?ar">https://go.oreilly.com/library-access/library/view/-/9781492028222/?ar</a><br/>Format: Elektronik Kaynak<br/>
Enterprise software security : a confluence of disciplines
ent://SD_ILS/0/SD_ILS:2305297
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Van Wyk, Kenneth R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780321604378/?ar">https://learning.oreilly.com/library/view/~/9780321604378/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321604378">https://learning.oreilly.com/library/view/~/9780321604378</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321604378/?ar">https://go.oreilly.com/library-access/library/view/-/9780321604378/?ar</a><br/>Format: Elektronik Kaynak<br/>
Web application security is a stack : how to CYA (cover your apps) completely
ent://SD_ILS/0/SD_ILS:2308845
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by MacVittie, Lori A., 1969- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849287050/?ar">https://learning.oreilly.com/library/view/~/9781849287050/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849287050/?ar">https://go.oreilly.com/library-access/library/view/-/9781849287050/?ar</a><br/>Format: Elektronik Kaynak<br/>
Assessing information security : strategies, tactics, logic and framework
ent://SD_ILS/0/SD_ILS:2308844
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Vladimirov, Andrew A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849286008/?ar">https://go.oreilly.com/library-access/library/view/-/9781849286008/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849286008/?ar">https://learning.oreilly.com/library/view/~/9781849286008/?ar</a><br/>Format: Elektronik Kaynak<br/>
Endpoint security
ent://SD_ILS/0/SD_ILS:2283117
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Kadrich, Mark.<br/><a href="https://learning.oreilly.com/library/view/~/9780321436955/?ar">https://learning.oreilly.com/library/view/~/9780321436955/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321436955/?ar">https://go.oreilly.com/library-access/library/view/-/9780321436955/?ar</a><br/>Format: Elektronik Kaynak<br/>
Practical deployment of Cisco Identity Services Engine (ISE) : real-world examples of AAA deployments
ent://SD_ILS/0/SD_ILS:2309216
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Richter, Andy, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128045046/?ar">https://learning.oreilly.com/library/view/~/9780128045046/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128045046/?ar">https://go.oreilly.com/library-access/library/view/-/9780128045046/?ar</a><br/>Format: Elektronik Kaynak<br/>
Network security bible
ent://SD_ILS/0/SD_ILS:2288476
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Cole, Eric.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470502495/?ar">https://go.oreilly.com/library-access/library/view/-/9780470502495/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470502495/?ar">https://learning.oreilly.com/library/view/~/9780470502495/?ar</a><br/>Format: Elektronik Kaynak<br/>
Cisco security professional's guide to secure intrusion detection systems
ent://SD_ILS/0/SD_ILS:2306221
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Burton, James D., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781932266696/?ar">https://go.oreilly.com/library-access/library/view/-/9781932266696/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781932266696/?ar">https://learning.oreilly.com/library/view/~/9781932266696/?ar</a><br/>Format: Elektronik Kaynak<br/>
Web security for developers
ent://SD_ILS/0/SD_ILS:2324422
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by McDonald, Malcolm (Computer programmer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098122683/?ar">https://go.oreilly.com/library-access/library/view/-/9781098122683/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098122683/?ar">https://learning.oreilly.com/library/view/~/9781098122683/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098122683">https://learning.oreilly.com/library/view/~/9781098122683</a><br/>Format: Elektronik Kaynak<br/>
Hands-on red team tactics : a practical guide to mastering red team operations
ent://SD_ILS/0/SD_ILS:2317792
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Sharma, Himanshu, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788995238/?ar">https://go.oreilly.com/library-access/library/view/-/9781788995238/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788995238">https://learning.oreilly.com/library/view/~/9781788995238</a>
<a href="https://learning.oreilly.com/library/view/~/9781788995238/?ar">https://learning.oreilly.com/library/view/~/9781788995238/?ar</a><br/>Format: Elektronik Kaynak<br/>
Security monitoring with Cisco security MARS
ent://SD_ILS/0/SD_ILS:2283784
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Halleen, Gary.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781587052705/?ar">https://go.oreilly.com/library-access/library/view/-/9781587052705/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781587052705/?ar">https://learning.oreilly.com/library/view/~/9781587052705/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781587052705">https://learning.oreilly.com/library/view/~/9781587052705</a><br/>Format: Elektronik Kaynak<br/>
Cisco NAC appliance : enforcing host security with clean access
ent://SD_ILS/0/SD_ILS:2283801
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Heary, Jamey.<br/><a href="https://learning.oreilly.com/library/view/~/9781587053061">https://learning.oreilly.com/library/view/~/9781587053061</a>
<a href="https://learning.oreilly.com/library/view/~/9781587053061/?ar">https://learning.oreilly.com/library/view/~/9781587053061/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781587053061/?ar">https://go.oreilly.com/library-access/library/view/-/9781587053061/?ar</a><br/>Format: Elektronik Kaynak<br/>
Cisco secure Internet security solutions
ent://SD_ILS/0/SD_ILS:2281230
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Mason, Andrew G.<br/><a href="https://learning.oreilly.com/library/view/~/1587050161">https://learning.oreilly.com/library/view/~/1587050161</a>
<a href="https://learning.oreilly.com/library/view/~/1587050161/?ar">https://learning.oreilly.com/library/view/~/1587050161/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1587050161/?ar">https://go.oreilly.com/library-access/library/view/-/1587050161/?ar</a><br/>Format: Elektronik Kaynak<br/>
Network security first-step
ent://SD_ILS/0/SD_ILS:2293683
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Thomas, Thomas M.<br/><a href="https://learning.oreilly.com/library/view/~/9781587204142/?ar">https://learning.oreilly.com/library/view/~/9781587204142/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781587204142/?ar">https://go.oreilly.com/library-access/library/view/-/9781587204142/?ar</a><br/>Format: Elektronik Kaynak<br/>
CCNP security IPS 642-627 quick reference
ent://SD_ILS/0/SD_ILS:2292178
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Halleen, Gary.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132582087/?ar">https://go.oreilly.com/library-access/library/view/-/9780132582087/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132582087/?ar">https://learning.oreilly.com/library/view/~/9780132582087/?ar</a><br/>Format: Elektronik Kaynak<br/>
Threat hunting : a guide to proactive network defense
ent://SD_ILS/0/SD_ILS:2318444
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Collins, Michael (Michael Patrick), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492028260/?ar">https://learning.oreilly.com/library/view/~/9781492028260/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492028260">https://learning.oreilly.com/library/view/~/9781492028260</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492028260/?ar">https://go.oreilly.com/library-access/library/view/-/9781492028260/?ar</a><br/>Format: Elektronik Kaynak<br/>
Cisco ASA, PIX, and FWSM firewall handbook
ent://SD_ILS/0/SD_ILS:2283808
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Hucaby, Dave.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781587054570/?ar">https://go.oreilly.com/library-access/library/view/-/9781587054570/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781587054570/?ar">https://learning.oreilly.com/library/view/~/9781587054570/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781587054570">https://learning.oreilly.com/library/view/~/9781587054570</a><br/>Format: Elektronik Kaynak<br/>
Windows 2012 server network security : securing your windows network systems and infrastructure
ent://SD_ILS/0/SD_ILS:2298494
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Rountree, Derrick.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499583/?ar">https://learning.oreilly.com/library/view/~/9781597499583/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597499583/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499583/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499583">https://learning.oreilly.com/library/view/~/9781597499583</a><br/>Format: Elektronik Kaynak<br/>
CCSP SNAF quick reference
ent://SD_ILS/0/SD_ILS:2285270
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Mason, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9781587058691/?ar">https://learning.oreilly.com/library/view/~/9781587058691/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781587058691">https://learning.oreilly.com/library/view/~/9781587058691</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781587058691/?ar">https://go.oreilly.com/library-access/library/view/-/9781587058691/?ar</a><br/>Format: Elektronik Kaynak<br/>
Information security handbook
ent://SD_ILS/0/SD_ILS:2330245
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Jhanjhi, Noor Zaman, 1972- editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781000540567">https://learning.oreilly.com/library/view/~/9781000540567</a>
<a href="https://learning.oreilly.com/library/view/~/9781000540567/?ar">https://learning.oreilly.com/library/view/~/9781000540567/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781000540567/?ar">https://go.oreilly.com/library-access/library/view/-/9781000540567/?ar</a><br/>Format: Elektronik Kaynak<br/>
Computer security : art and science
ent://SD_ILS/0/SD_ILS:2318452
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Bishop, Matt (Matthew A.), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134097145/?ar">https://go.oreilly.com/library-access/library/view/-/9780134097145/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134097145/?ar">https://learning.oreilly.com/library/view/~/9780134097145/?ar</a><br/>Format: Elektronik Kaynak<br/>
Targeted cyber attacks : multi-staged attacks driven by exploits and malware
ent://SD_ILS/0/SD_ILS:2303155
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Sood, Aditya K.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128006047/?ar">https://go.oreilly.com/library-access/library/view/-/9780128006047/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128006047/?ar">https://learning.oreilly.com/library/view/~/9780128006047/?ar</a><br/>Format: Elektronik Kaynak<br/>
Maximum Security, Third Edition
ent://SD_ILS/0/SD_ILS:2319712
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Anonymous, author.<br/><a href="https://learning.oreilly.com/library/view/~/0672318717">https://learning.oreilly.com/library/view/~/0672318717</a>
<a href="https://learning.oreilly.com/library/view/~/0672318717/?ar">https://learning.oreilly.com/library/view/~/0672318717/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0672318717/?ar">https://go.oreilly.com/library-access/library/view/-/0672318717/?ar</a><br/>Format: Elektronik Kaynak<br/>
Enterprise business portals II with IBM tivoli access manager
ent://SD_ILS/0/SD_ILS:2282650
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Bücker, Axel.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738428078/?ar">https://go.oreilly.com/library-access/library/view/-/0738428078/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738428078/?ar">https://learning.oreilly.com/library/view/~/0738428078/?ar</a><br/>Format: Elektronik Kaynak<br/>
Is it safe? : protecting your computer, your business, and yourself online
ent://SD_ILS/0/SD_ILS:2285554
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Miller, Michael, 1958-<br/><a href="https://learning.oreilly.com/library/view/~/9780768683080/?ar">https://learning.oreilly.com/library/view/~/9780768683080/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780768683080/?ar">https://go.oreilly.com/library-access/library/view/-/9780768683080/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780768683080">https://learning.oreilly.com/library/view/~/9780768683080</a><br/>Format: Elektronik Kaynak<br/>
Computer security basics
ent://SD_ILS/0/SD_ILS:2282377
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Lehtinen, Rick.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596006691/?ar">https://go.oreilly.com/library-access/library/view/-/0596006691/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596006691">https://learning.oreilly.com/library/view/~/0596006691</a>
<a href="https://learning.oreilly.com/library/view/~/0596006691/?ar">https://learning.oreilly.com/library/view/~/0596006691/?ar</a><br/>Format: Elektronik Kaynak<br/>
Inside network security assessment : guarding your IT infrastructure
ent://SD_ILS/0/SD_ILS:2282083
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Gregg, Michael (Michael C.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/0672328097/?ar">https://go.oreilly.com/library-access/library/view/-/0672328097/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672328097/?ar">https://learning.oreilly.com/library/view/~/0672328097/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672328097">https://learning.oreilly.com/library/view/~/0672328097</a><br/>Format: Elektronik Kaynak<br/>
Kerberos : the definitive guide
ent://SD_ILS/0/SD_ILS:2281264
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Garman, Jason.<br/><a href="https://learning.oreilly.com/library/view/~/0596004036/?ar">https://learning.oreilly.com/library/view/~/0596004036/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596004036/?ar">https://go.oreilly.com/library-access/library/view/-/0596004036/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596004036">https://learning.oreilly.com/library/view/~/0596004036</a><br/>Format: Elektronik Kaynak<br/>
Cyber security and network security
ent://SD_ILS/0/SD_ILS:2332538
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Pramanik, Sabyasachi, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119812494">https://learning.oreilly.com/library/view/~/9781119812494</a>
<a href="https://learning.oreilly.com/library/view/~/9781119812494/?ar">https://learning.oreilly.com/library/view/~/9781119812494/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119812494/?ar">https://go.oreilly.com/library-access/library/view/-/9781119812494/?ar</a><br/>Format: Elektronik Kaynak<br/>
Practical security : simple practices for defending your systems
ent://SD_ILS/0/SD_ILS:2319402
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Zabicki, Roman, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781680506679/?ar">https://go.oreilly.com/library-access/library/view/-/9781680506679/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781680506679">https://learning.oreilly.com/library/view/~/9781680506679</a>
<a href="https://learning.oreilly.com/library/view/~/9781680506679/?ar">https://learning.oreilly.com/library/view/~/9781680506679/?ar</a><br/>Format: Elektronik Kaynak<br/>
Exploiting online games : cheating massively distributed systems
ent://SD_ILS/0/SD_ILS:2283933
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Hoglund, Greg.<br/><a href="https://learning.oreilly.com/library/view/~/9780132271912/?ar">https://learning.oreilly.com/library/view/~/9780132271912/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780132271912/?ar">https://go.oreilly.com/library-access/library/view/-/9780132271912/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132271912">https://learning.oreilly.com/library/view/~/9780132271912</a><br/>Format: Elektronik Kaynak<br/>
Waging cyber war : technical challenges and operational constraints
ent://SD_ILS/0/SD_ILS:2321908
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Oakley, Jacob G., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484249505/?ar">https://go.oreilly.com/library-access/library/view/-/9781484249505/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484249505/?ar">https://learning.oreilly.com/library/view/~/9781484249505/?ar</a><br/>Format: Elektronik Kaynak<br/>
IBM z/OS V2R2 : security
ent://SD_ILS/0/SD_ILS:2309654
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Winnard, Keith, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738441276/?ar">https://learning.oreilly.com/library/view/~/9780738441276/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738441276">https://learning.oreilly.com/library/view/~/9780738441276</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738441276/?ar">https://go.oreilly.com/library-access/library/view/-/9780738441276/?ar</a><br/>Format: Elektronik Kaynak<br/>
IBM system z9 109 technical introduction
ent://SD_ILS/0/SD_ILS:2287791
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Ogden, Bill.<br/><a href="https://learning.oreilly.com/library/view/~/0738493813/?ar">https://learning.oreilly.com/library/view/~/0738493813/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738493813">https://learning.oreilly.com/library/view/~/0738493813</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738493813/?ar">https://go.oreilly.com/library-access/library/view/-/0738493813/?ar</a><br/>Format: Elektronik Kaynak<br/>
Mastering Kali Linux for advanced penetration testing : secure your network with Kali Linux 2019.1, the ultimate white hat hackers' toolkit
ent://SD_ILS/0/SD_ILS:2319114
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Velu, Vijay Kumar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789340563/?ar">https://learning.oreilly.com/library/view/~/9781789340563/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789340563/?ar">https://go.oreilly.com/library-access/library/view/-/9781789340563/?ar</a><br/>Format: Elektronik Kaynak<br/>
Zabbix network monitoring : gather detailed statistics and data while monitoring the performance and availability of network devices and applications using the all-new Zabbix 3.0
ent://SD_ILS/0/SD_ILS:2311316
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Olups, Rihards, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781782161288/?ar">https://learning.oreilly.com/library/view/~/9781782161288/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781782161288/?ar">https://go.oreilly.com/library-access/library/view/-/9781782161288/?ar</a><br/>Format: Elektronik Kaynak<br/>
Network security : know it all
ent://SD_ILS/0/SD_ILS:2285962
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Joshi, James B. D.<br/><a href="https://learning.oreilly.com/library/view/~/9780080560151">https://learning.oreilly.com/library/view/~/9780080560151</a>
<a href="https://learning.oreilly.com/library/view/~/9780080560151/?ar">https://learning.oreilly.com/library/view/~/9780080560151/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780080560151/?ar">https://go.oreilly.com/library-access/library/view/-/9780080560151/?ar</a><br/>Format: Elektronik Kaynak<br/>
Hacking : der umfassende Praxis-Guide: inkl. Prüfungsvorbereitung zum CEHv10
ent://SD_ILS/0/SD_ILS:2325946
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Amberg, Eric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9783958452206/?ar">https://go.oreilly.com/library-access/library/view/-/9783958452206/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958452206/?ar">https://learning.oreilly.com/library/view/~/9783958452206/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958452206">https://learning.oreilly.com/library/view/~/9783958452206</a><br/>Format: Elektronik Kaynak<br/>
Orchestrating and automating security for the Internet of Things : delivering advanced security capabilities from Edge to Cloud for IoT
ent://SD_ILS/0/SD_ILS:2316233
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Sabella, Anthony, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134756936/?ar">https://go.oreilly.com/library-access/library/view/-/9780134756936/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134756936/?ar">https://learning.oreilly.com/library/view/~/9780134756936/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134756936">https://learning.oreilly.com/library/view/~/9780134756936</a><br/>Format: Elektronik Kaynak<br/>
Netzwerkprotokolle hacken : Sicherheislücken verstehen, analysieren und schützen
ent://SD_ILS/0/SD_ILS:2317121
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Forshaw, James, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492068631/?ar">https://learning.oreilly.com/library/view/~/9781492068631/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492068631/?ar">https://go.oreilly.com/library-access/library/view/-/9781492068631/?ar</a><br/>Format: Elektronik Kaynak<br/>
Applied network security : master the art of detecting and averting advanced network security attacks and techniques
ent://SD_ILS/0/SD_ILS:2313288
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Salmon, Arthur, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781786466273/?ar">https://learning.oreilly.com/library/view/~/9781786466273/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781786466273/?ar">https://go.oreilly.com/library-access/library/view/-/9781786466273/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786466273">https://learning.oreilly.com/library/view/~/9781786466273</a><br/>Format: Elektronik Kaynak<br/>
Mastering Kali Linux for Web penetration testing : test and evaluate all aspects of the design and implementation
ent://SD_ILS/0/SD_ILS:2313741
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by McPhee, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781784395070">https://learning.oreilly.com/library/view/~/9781784395070</a>
<a href="https://learning.oreilly.com/library/view/~/9781784395070/?ar">https://learning.oreilly.com/library/view/~/9781784395070/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781784395070/?ar">https://go.oreilly.com/library-access/library/view/-/9781784395070/?ar</a><br/>Format: Elektronik Kaynak<br/>
Mastering Kali Linux for advanced penetration testing : secure your network with Kali Linux, the ultimate hackers' arsenal
ent://SD_ILS/0/SD_ILS:2313803
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Velu, Vijay Kumar, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787120235/?ar">https://learning.oreilly.com/library/view/~/9781787120235/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787120235/?ar">https://go.oreilly.com/library-access/library/view/-/9781787120235/?ar</a><br/>Format: Elektronik Kaynak<br/>
Penetration testing : a complete pentesting guide facilitating smooth backtracking for working hackers : a course in three modules.
ent://SD_ILS/0/SD_ILS:2312619
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Velu, Vijay Kumar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787287839/?ar">https://go.oreilly.com/library-access/library/view/-/9781787287839/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787287839/?ar">https://learning.oreilly.com/library/view/~/9781787287839/?ar</a><br/>Format: Elektronik Kaynak<br/>
Burp Suite cookbook : practical recipes to help you master web penetration testing with Burp Suite
ent://SD_ILS/0/SD_ILS:2317723
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Wear, Sunny, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789531732">https://learning.oreilly.com/library/view/~/9781789531732</a>
<a href="https://learning.oreilly.com/library/view/~/9781789531732/?ar">https://learning.oreilly.com/library/view/~/9781789531732/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789531732/?ar">https://go.oreilly.com/library-access/library/view/-/9781789531732/?ar</a><br/>Format: Elektronik Kaynak<br/>
Security from first principles : a practical guide to the information security practice principles
ent://SD_ILS/0/SD_ILS:2314425
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Jackson, Craig, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491996911/?ar">https://go.oreilly.com/library-access/library/view/-/9781491996911/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491996911/?ar">https://learning.oreilly.com/library/view/~/9781491996911/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491996911">https://learning.oreilly.com/library/view/~/9781491996911</a><br/>Format: Elektronik Kaynak<br/>
SolarWinds server & application monitor : deployment and administration : an intuitive guide to implementing and calibrating SolarWinds Server & Application Monitor with minimum hassle
ent://SD_ILS/0/SD_ILS:2300919
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Brant, Justin M.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781783551019/?ar">https://go.oreilly.com/library-access/library/view/-/9781783551019/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781783551019/?ar">https://learning.oreilly.com/library/view/~/9781783551019/?ar</a><br/>Format: Elektronik Kaynak<br/>
Network intrusion analysis : methodologies, tools, and techniques for incident analysis and response
ent://SD_ILS/0/SD_ILS:2296392
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Fichera, Joe, 1966-<br/><a href="https://learning.oreilly.com/library/view/~/9781597499620">https://learning.oreilly.com/library/view/~/9781597499620</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499620/?ar">https://learning.oreilly.com/library/view/~/9781597499620/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597499620/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499620/?ar</a><br/>Format: Elektronik Kaynak<br/>
Windows lockdown! : your XP and Vista guide against hacks, attacks, and other Internet mayhem
ent://SD_ILS/0/SD_ILS:2285580
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Walker, Andy (Andy G.), 1967-<br/><a href="https://learning.oreilly.com/library/view/~/9780789736727">https://learning.oreilly.com/library/view/~/9780789736727</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780789736727/?ar">https://go.oreilly.com/library-access/library/view/-/9780789736727/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780789736727/?ar">https://learning.oreilly.com/library/view/~/9780789736727/?ar</a><br/>Format: Elektronik Kaynak<br/>
Windows Server 2008 networking and network access protection (NAP)
ent://SD_ILS/0/SD_ILS:2284886
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Davies, Joseph, 1962-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780735624221/?ar">https://go.oreilly.com/library-access/library/view/-/9780735624221/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780735624221/?ar">https://learning.oreilly.com/library/view/~/9780735624221/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780735624221">https://learning.oreilly.com/library/view/~/9780735624221</a><br/>Format: Elektronik Kaynak<br/>
Practical cyber forensics : an incident-based approach to forensic investigations
ent://SD_ILS/0/SD_ILS:2321521
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Reddy, Niranjan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484244609/?ar">https://learning.oreilly.com/library/view/~/9781484244609/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484244609/?ar">https://go.oreilly.com/library-access/library/view/-/9781484244609/?ar</a><br/>Format: Elektronik Kaynak<br/>
A practical guide to computer forensics investigations
ent://SD_ILS/0/SD_ILS:2305632
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Hayes, Darren R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780132756174/?ar">https://learning.oreilly.com/library/view/~/9780132756174/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780132756174/?ar">https://go.oreilly.com/library-access/library/view/-/9780132756174/?ar</a><br/>Format: Elektronik Kaynak<br/>
Security and privacy in cyber-physical systems : foundations, principles, and applications
ent://SD_ILS/0/SD_ILS:2316152
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Song, Houbing, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781119226048/?ar">https://learning.oreilly.com/library/view/~/9781119226048/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119226048/?ar">https://go.oreilly.com/library-access/library/view/-/9781119226048/?ar</a><br/>Format: Elektronik Kaynak<br/>
Cisco secure firewall services module (FWSM)
ent://SD_ILS/0/SD_ILS:2285484
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Blair, Ray, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9781587056093">https://learning.oreilly.com/library/view/~/9781587056093</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781587056093/?ar">https://go.oreilly.com/library-access/library/view/-/9781587056093/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781587056093/?ar">https://learning.oreilly.com/library/view/~/9781587056093/?ar</a><br/>Format: Elektronik Kaynak<br/>
Security considerations in Lotus Notes and Domino 7 : making great security easier to implement
ent://SD_ILS/0/SD_ILS:2295704
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Dahm, Frederic.<br/><a href="https://learning.oreilly.com/library/view/~/0738497347/?ar">https://learning.oreilly.com/library/view/~/0738497347/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738497347/?ar">https://go.oreilly.com/library-access/library/view/-/0738497347/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738497347">https://learning.oreilly.com/library/view/~/0738497347</a><br/>Format: Elektronik Kaynak<br/>
Biometrics for Network Security
ent://SD_ILS/0/SD_ILS:2326814
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Reid, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/0131015494">https://learning.oreilly.com/library/view/~/0131015494</a>
<a href="https://learning.oreilly.com/library/view/~/0131015494/?ar">https://learning.oreilly.com/library/view/~/0131015494/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0131015494/?ar">https://go.oreilly.com/library-access/library/view/-/0131015494/?ar</a><br/>Format: Elektronik Kaynak<br/>
Designing Network Security Second Edition
ent://SD_ILS/0/SD_ILS:2319725
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Kaeo, Merike, author.<br/><a href="https://learning.oreilly.com/library/view/~/1587051176/?ar">https://learning.oreilly.com/library/view/~/1587051176/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587051176">https://learning.oreilly.com/library/view/~/1587051176</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1587051176/?ar">https://go.oreilly.com/library-access/library/view/-/1587051176/?ar</a><br/>Format: Elektronik Kaynak<br/>
Practical cloud security : a guide for secure design and deployment
ent://SD_ILS/0/SD_ILS:2319005
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Dotson, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492037507">https://learning.oreilly.com/library/view/~/9781492037507</a>
<a href="https://learning.oreilly.com/library/view/~/9781492037507/?ar">https://learning.oreilly.com/library/view/~/9781492037507/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492037507/?ar">https://go.oreilly.com/library-access/library/view/-/9781492037507/?ar</a><br/>Format: Elektronik Kaynak<br/>
Hacking : der umfassende Praxis-Guide : inkl. Prüfungsvorbereitung zum CEHv11
ent://SD_ILS/0/SD_ILS:2331683
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Amberg, Eric, author<br/><a href="https://learning.oreilly.com/library/view/~/9783747504840">https://learning.oreilly.com/library/view/~/9783747504840</a>
<a href="https://learning.oreilly.com/library/view/~/9783747504840/?ar">https://learning.oreilly.com/library/view/~/9783747504840/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783747504840/?ar">https://go.oreilly.com/library-access/library/view/-/9783747504840/?ar</a><br/>Format: Elektronik Kaynak<br/>
Cracking security misconceptions : untangling common myths about modern information security
ent://SD_ILS/0/SD_ILS:2316704
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Peterson, Andrew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042747">https://learning.oreilly.com/library/view/~/9781492042747</a>
<a href="https://learning.oreilly.com/library/view/~/9781492042747/?ar">https://learning.oreilly.com/library/view/~/9781492042747/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492042747/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042747/?ar</a><br/>Format: Elektronik Kaynak<br/>
Penetration Testing Azure for Ethical Hackers
ent://SD_ILS/0/SD_ILS:2331077
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Okeyode, David, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781839212932/?ar">https://learning.oreilly.com/library/view/~/9781839212932/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781839212932">https://learning.oreilly.com/library/view/~/9781839212932</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781839212932/?ar">https://go.oreilly.com/library-access/library/view/-/9781839212932/?ar</a><br/>Format: Elektronik Kaynak<br/>
Chained exploits : advanced hacking attacks from start to finish
ent://SD_ILS/0/SD_ILS:2286103
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Whitaker, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9780321620637">https://learning.oreilly.com/library/view/~/9780321620637</a>
<a href="https://learning.oreilly.com/library/view/~/9780321620637/?ar">https://learning.oreilly.com/library/view/~/9780321620637/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321620637/?ar">https://go.oreilly.com/library-access/library/view/-/9780321620637/?ar</a><br/>Format: Elektronik Kaynak<br/>
The art of software security assessment : identifying and preventing software vulnerabilities
ent://SD_ILS/0/SD_ILS:2282886
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Dowd, Mark.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321444426/?ar">https://go.oreilly.com/library-access/library/view/-/0321444426/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321444426/?ar">https://learning.oreilly.com/library/view/~/0321444426/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321444426">https://learning.oreilly.com/library/view/~/0321444426</a><br/>Format: Elektronik Kaynak<br/>
SELinux by example : using security enhanced Linux
ent://SD_ILS/0/SD_ILS:2283000
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Mayer, Frank, 1961-<br/><a href="https://learning.oreilly.com/library/view/~/0131963694/?ar">https://learning.oreilly.com/library/view/~/0131963694/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0131963694/?ar">https://go.oreilly.com/library-access/library/view/-/0131963694/?ar</a><br/>Format: Elektronik Kaynak<br/>
Applied security visualization
ent://SD_ILS/0/SD_ILS:2285492
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Marty, Raffael, 1976-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321585530/?ar">https://go.oreilly.com/library-access/library/view/-/9780321585530/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321585530/?ar">https://learning.oreilly.com/library/view/~/9780321585530/?ar</a><br/>Format: Elektronik Kaynak<br/>
Information assurance : dependability and security in networked systems
ent://SD_ILS/0/SD_ILS:2286245
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Qian, Yi, 1962-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780123735669/?ar">https://go.oreilly.com/library-access/library/view/-/9780123735669/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780123735669/?ar">https://learning.oreilly.com/library/view/~/9780123735669/?ar</a><br/>Format: Elektronik Kaynak<br/>
Threat intelligence in practice : a practical guide to threat intelligence from successful organizations
ent://SD_ILS/0/SD_ILS:2318435
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Liska, Allan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492049302/?ar">https://go.oreilly.com/library-access/library/view/-/9781492049302/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492049302/?ar">https://learning.oreilly.com/library/view/~/9781492049302/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492049302">https://learning.oreilly.com/library/view/~/9781492049302</a><br/>Format: Elektronik Kaynak<br/>
The Internet of risky things : trusting devices that surround us
ent://SD_ILS/0/SD_ILS:2312464
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Smith, Sean, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491963616/?ar">https://go.oreilly.com/library-access/library/view/-/9781491963616/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491963616/?ar">https://learning.oreilly.com/library/view/~/9781491963616/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491963616">https://learning.oreilly.com/library/view/~/9781491963616</a><br/>Format: Elektronik Kaynak<br/>
Cisco ISE for BYOD and secure unified access
ent://SD_ILS/0/SD_ILS:2313856
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Woland, Aaron T., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134586656/?ar">https://learning.oreilly.com/library/view/~/9780134586656/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134586656/?ar">https://go.oreilly.com/library-access/library/view/-/9780134586656/?ar</a><br/>Format: Elektronik Kaynak<br/>
Anti-hacker tool kit.
ent://SD_ILS/0/SD_ILS:2303630
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Shema, Mike, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071800143/?ar">https://go.oreilly.com/library-access/library/view/-/9780071800143/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071800143/?ar">https://learning.oreilly.com/library/view/~/9780071800143/?ar</a><br/>Format: Elektronik Kaynak<br/>
Security for service oriented architectures
ent://SD_ILS/0/SD_ILS:2303292
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Williams, Walter (Telecommunications engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466584044">https://learning.oreilly.com/library/view/~/9781466584044</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466584044/?ar">https://go.oreilly.com/library-access/library/view/-/9781466584044/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466584044/?ar">https://learning.oreilly.com/library/view/~/9781466584044/?ar</a><br/>Format: Elektronik Kaynak<br/>
125 sposobów na bezpieczeństwo sieci
ent://SD_ILS/0/SD_ILS:2299439
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Lockhart, Andrew.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457176357/?ar">https://go.oreilly.com/library-access/library/view/-/9781457176357/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457176357/?ar">https://learning.oreilly.com/library/view/~/9781457176357/?ar</a><br/>Format: Elektronik Kaynak<br/>
Cyberjutsu : cybersecurity for the modern ninja
ent://SD_ILS/0/SD_ILS:2326541
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by McCarty, Ben, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098128920">https://learning.oreilly.com/library/view/~/9781098128920</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128920/?ar">https://learning.oreilly.com/library/view/~/9781098128920/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128920/?ar</a><br/>Format: Elektronik Kaynak<br/>
Linux® hardening in hostile networks : server security from TLS to TOR
ent://SD_ILS/0/SD_ILS:2314177
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Rankin, Kyle, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134173337/?ar">https://learning.oreilly.com/library/view/~/9780134173337/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134173337/?ar">https://go.oreilly.com/library-access/library/view/-/9780134173337/?ar</a><br/>Format: Elektronik Kaynak<br/>
Post-incident reviews : learning from failure for improved incident response
ent://SD_ILS/0/SD_ILS:2318499
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Hand, Jason, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491986998/?ar">https://go.oreilly.com/library-access/library/view/-/9781491986998/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491986998">https://learning.oreilly.com/library/view/~/9781491986998</a>
<a href="https://learning.oreilly.com/library/view/~/9781491986998/?ar">https://learning.oreilly.com/library/view/~/9781491986998/?ar</a><br/>Format: Elektronik Kaynak<br/>
Learn Kali Linux 2019 : perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark
ent://SD_ILS/0/SD_ILS:2323768
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Singh, Glen D., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789611809/?ar">https://learning.oreilly.com/library/view/~/9781789611809/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789611809">https://learning.oreilly.com/library/view/~/9781789611809</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789611809/?ar">https://go.oreilly.com/library-access/library/view/-/9781789611809/?ar</a><br/>Format: Elektronik Kaynak<br/>
Building secure servers with Linux
ent://SD_ILS/0/SD_ILS:2286385
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Bauer, Michael D.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596002173/?ar">https://go.oreilly.com/library-access/library/view/-/0596002173/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596002173/?ar">https://learning.oreilly.com/library/view/~/0596002173/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596002173">https://learning.oreilly.com/library/view/~/0596002173</a><br/>Format: Elektronik Kaynak<br/>
Hands-on penetration testing with Kali NetHunter : spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go
ent://SD_ILS/0/SD_ILS:2319361
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Singh, Glen D., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788995177/?ar">https://go.oreilly.com/library-access/library/view/-/9781788995177/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788995177/?ar">https://learning.oreilly.com/library/view/~/9781788995177/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788995177">https://learning.oreilly.com/library/view/~/9781788995177</a><br/>Format: Elektronik Kaynak<br/>
z/OS PKI Services : quick set-up for multiple CAs
ent://SD_ILS/0/SD_ILS:2312432
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Winnard, Keith, author.<br/><a href="https://learning.oreilly.com/library/view/~/0738443054/?ar">https://learning.oreilly.com/library/view/~/0738443054/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738443054/?ar">https://go.oreilly.com/library-access/library/view/-/0738443054/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738443054">https://learning.oreilly.com/library/view/~/0738443054</a><br/>Format: Elektronik Kaynak<br/>
Mastering Kali Linux wireless pentesting : test your wireless network's security and master advanced wireless penetration techniques using Kali Linux
ent://SD_ILS/0/SD_ILS:2310036
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Sak, Brian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785285561">https://learning.oreilly.com/library/view/~/9781785285561</a>
<a href="https://learning.oreilly.com/library/view/~/9781785285561/?ar">https://learning.oreilly.com/library/view/~/9781785285561/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785285561/?ar">https://go.oreilly.com/library-access/library/view/-/9781785285561/?ar</a><br/>Format: Elektronik Kaynak<br/>
Cyber operations : building, defending, and attacking modern computer networks
ent://SD_ILS/0/SD_ILS:2308678
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by O'Leary, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484204573">https://learning.oreilly.com/library/view/~/9781484204573</a>
<a href="https://learning.oreilly.com/library/view/~/9781484204573/?ar">https://learning.oreilly.com/library/view/~/9781484204573/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484204573/?ar">https://go.oreilly.com/library-access/library/view/-/9781484204573/?ar</a><br/>Format: Elektronik Kaynak<br/>
Cryptography and network security
ent://SD_ILS/0/SD_ILS:2295951
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by ITL Education Solutions. Research and Development Wing.<br/><a href="https://learning.oreilly.com/library/view/~/9788131764527/?ar">https://learning.oreilly.com/library/view/~/9788131764527/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9788131764527">https://learning.oreilly.com/library/view/~/9788131764527</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9788131764527/?ar">https://go.oreilly.com/library-access/library/view/-/9788131764527/?ar</a><br/>Format: Elektronik Kaynak<br/>
Malware diffusion models for modern complex networks : theory and applications
ent://SD_ILS/0/SD_ILS:2313869
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Karyotis, Vasileios, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128027165/?ar">https://go.oreilly.com/library-access/library/view/-/9780128027165/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128027165/?ar">https://learning.oreilly.com/library/view/~/9780128027165/?ar</a><br/>Format: Elektronik Kaynak<br/>
The second economy : the race for trust, treasure and time in the cybersecurity war
ent://SD_ILS/0/SD_ILS:2312552
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Grobman, Steve, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484222294/?ar">https://learning.oreilly.com/library/view/~/9781484222294/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484222294/?ar">https://go.oreilly.com/library-access/library/view/-/9781484222294/?ar</a><br/>Format: Elektronik Kaynak<br/>
Malware : Fighting Malicious Code.
ent://SD_ILS/0/SD_ILS:2317983
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Skoudis, Ed, author.<br/><a href="https://learning.oreilly.com/library/view/~/0131014056">https://learning.oreilly.com/library/view/~/0131014056</a>
<a href="https://learning.oreilly.com/library/view/~/0131014056/?ar">https://learning.oreilly.com/library/view/~/0131014056/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0131014056/?ar">https://go.oreilly.com/library-access/library/view/-/0131014056/?ar</a><br/>Format: Elektronik Kaynak<br/>
Web application security : exploitation and countermeasures for modern web applications
ent://SD_ILS/0/SD_ILS:2323527
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Hoffman, Andrew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492053101/?ar">https://learning.oreilly.com/library/view/~/9781492053101/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492053101/?ar">https://go.oreilly.com/library-access/library/view/-/9781492053101/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492053101">https://learning.oreilly.com/library/view/~/9781492053101</a><br/>Format: Elektronik Kaynak<br/>
Building virtual pentesting labs for advanced penetration testing : learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it
ent://SD_ILS/0/SD_ILS:2311529
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Cardwell, Kevin, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785883491/?ar">https://go.oreilly.com/library-access/library/view/-/9781785883491/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785883491/?ar">https://learning.oreilly.com/library/view/~/9781785883491/?ar</a><br/>Format: Elektronik Kaynak<br/>
UTM security with Fortinet : Mastering FortiOS
ent://SD_ILS/0/SD_ILS:2296617
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Tam, Kenneth.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497473/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497473/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497473/?ar">https://learning.oreilly.com/library/view/~/9781597497473/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497473">https://learning.oreilly.com/library/view/~/9781597497473</a><br/>Format: Elektronik Kaynak<br/>
Hacking exposed 7 : network security secrets & solutions
ent://SD_ILS/0/SD_ILS:2296528
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by McClure, Stuart.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071780285/?ar">https://go.oreilly.com/library-access/library/view/-/9780071780285/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071780285/?ar">https://learning.oreilly.com/library/view/~/9780071780285/?ar</a><br/>Format: Elektronik Kaynak<br/>
Network Intrusion Detection, Third Edition
ent://SD_ILS/0/SD_ILS:2319734
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Northcutt, Stephen, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0735712654/?ar">https://go.oreilly.com/library-access/library/view/-/0735712654/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0735712654">https://learning.oreilly.com/library/view/~/0735712654</a>
<a href="https://learning.oreilly.com/library/view/~/0735712654/?ar">https://learning.oreilly.com/library/view/~/0735712654/?ar</a><br/>Format: Elektronik Kaynak<br/>
EVPN in the data center
ent://SD_ILS/0/SD_ILS:2317148
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Dutt, Dinesh G., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492029045">https://learning.oreilly.com/library/view/~/9781492029045</a>
<a href="https://learning.oreilly.com/library/view/~/9781492029045/?ar">https://learning.oreilly.com/library/view/~/9781492029045/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492029045/?ar">https://go.oreilly.com/library-access/library/view/-/9781492029045/?ar</a><br/>Format: Elektronik Kaynak<br/>
Security patterns in practice : designing secure architectures using software patterns
ent://SD_ILS/0/SD_ILS:2300767
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Fernandez, Eduardo B., 1936-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119970484/?ar">https://go.oreilly.com/library-access/library/view/-/9781119970484/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119970484/?ar">https://learning.oreilly.com/library/view/~/9781119970484/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119970484">https://learning.oreilly.com/library/view/~/9781119970484</a><br/>Format: Elektronik Kaynak<br/>
Web application security : a beginner's guide
ent://SD_ILS/0/SD_ILS:2293762
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Sullivan, Bryan, 1974-<br/><a href="https://learning.oreilly.com/library/view/~/9780071776165/?ar">https://learning.oreilly.com/library/view/~/9780071776165/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071776165/?ar">https://go.oreilly.com/library-access/library/view/-/9780071776165/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071776165">https://learning.oreilly.com/library/view/~/9780071776165</a><br/>Format: Elektronik Kaynak<br/>
Programming .NET security
ent://SD_ILS/0/SD_ILS:2281268
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Freeman, Adam.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596004427/?ar">https://go.oreilly.com/library-access/library/view/-/0596004427/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596004427/?ar">https://learning.oreilly.com/library/view/~/0596004427/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596004427">https://learning.oreilly.com/library/view/~/0596004427</a><br/>Format: Elektronik Kaynak<br/>
Cybersecurity incident response : how to contain, eradicate, and recover from incidents
ent://SD_ILS/0/SD_ILS:2317670
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Thompson, Eric C., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484238707/?ar">https://go.oreilly.com/library-access/library/view/-/9781484238707/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484238707/?ar">https://learning.oreilly.com/library/view/~/9781484238707/?ar</a><br/>Format: Elektronik Kaynak<br/>
Hands-on application penetration testing with Burp Suite : use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications
ent://SD_ILS/0/SD_ILS:2319360
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Lozano, Carlos A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788994064/?ar">https://learning.oreilly.com/library/view/~/9781788994064/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788994064/?ar">https://go.oreilly.com/library-access/library/view/-/9781788994064/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788994064">https://learning.oreilly.com/library/view/~/9781788994064</a><br/>Format: Elektronik Kaynak<br/>
Integrated security technologies and solutions. Volume I, Cisco Security Solutions for advanced threat protection with next generation firewall, intrusion prevention, AMP, and content security
ent://SD_ILS/0/SD_ILS:2316388
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Woland, Aaron T., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134807577/?ar">https://go.oreilly.com/library-access/library/view/-/9780134807577/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134807577/?ar">https://learning.oreilly.com/library/view/~/9780134807577/?ar</a><br/>Format: Elektronik Kaynak<br/>
Mastering modern web penetration testing : master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does!
ent://SD_ILS/0/SD_ILS:2311896
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Prasad, Prakhar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785284588/?ar">https://go.oreilly.com/library-access/library/view/-/9781785284588/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785284588">https://learning.oreilly.com/library/view/~/9781785284588</a>
<a href="https://learning.oreilly.com/library/view/~/9781785284588/?ar">https://learning.oreilly.com/library/view/~/9781785284588/?ar</a><br/>Format: Elektronik Kaynak<br/>
Software security engineering : a guide for project managers
ent://SD_ILS/0/SD_ILS:2284470
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Allen, Julia H.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321559685/?ar">https://go.oreilly.com/library-access/library/view/-/9780321559685/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321559685/?ar">https://learning.oreilly.com/library/view/~/9780321559685/?ar</a><br/>Format: Elektronik Kaynak<br/>
Cisco Security Agent
ent://SD_ILS/0/SD_ILS:2281812
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Sullivan, Chad.<br/><a href="https://learning.oreilly.com/library/view/~/1587052059">https://learning.oreilly.com/library/view/~/1587052059</a>
<a href="https://learning.oreilly.com/library/view/~/1587052059/?ar">https://learning.oreilly.com/library/view/~/1587052059/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1587052059/?ar">https://go.oreilly.com/library-access/library/view/-/1587052059/?ar</a><br/>Format: Elektronik Kaynak<br/>
Artificial Intelligence, Cybersecurity and Cyber Defence
ent://SD_ILS/0/SD_ILS:2328358
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Ventre, Daniel, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781786304674/?ar">https://go.oreilly.com/library-access/library/view/-/9781786304674/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786304674">https://learning.oreilly.com/library/view/~/9781786304674</a>
<a href="https://learning.oreilly.com/library/view/~/9781786304674/?ar">https://learning.oreilly.com/library/view/~/9781786304674/?ar</a><br/>Format: Elektronik Kaynak<br/>
Ethical Hack
ent://SD_ILS/0/SD_ILS:2326226
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Tiller, James S.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780203495414/?ar">https://go.oreilly.com/library-access/library/view/-/9780203495414/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780203495414/?ar">https://learning.oreilly.com/library/view/~/9780203495414/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780203495414">https://learning.oreilly.com/library/view/~/9780203495414</a><br/>Format: Elektronik Kaynak<br/>
Integrated security technologies and solutions. Volume II, Cisco Security Solutions for network access control, segmentation, context sharing, secure connectivity, and virtualization
ent://SD_ILS/0/SD_ILS:2318938
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Woland, Aaron T., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780134807614/?ar">https://learning.oreilly.com/library/view/~/9780134807614/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134807614/?ar">https://go.oreilly.com/library-access/library/view/-/9780134807614/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134807614">https://learning.oreilly.com/library/view/~/9780134807614</a><br/>Format: Elektronik Kaynak<br/>
Security and frontend performance : breaking the conundrum
ent://SD_ILS/0/SD_ILS:2314781
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Burney, Sabrina, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492030157">https://learning.oreilly.com/library/view/~/9781492030157</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492030157/?ar">https://go.oreilly.com/library-access/library/view/-/9781492030157/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492030157/?ar">https://learning.oreilly.com/library/view/~/9781492030157/?ar</a><br/>Format: Elektronik Kaynak<br/>
Essential cybersecurity science : build, test, and evaluate secure systems
ent://SD_ILS/0/SD_ILS:2309193
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Dykstra, Josiah, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491921050">https://learning.oreilly.com/library/view/~/9781491921050</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491921050/?ar">https://go.oreilly.com/library-access/library/view/-/9781491921050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491921050/?ar">https://learning.oreilly.com/library/view/~/9781491921050/?ar</a><br/>Format: Elektronik Kaynak<br/>
Network defense and countermeasures : principles and practices
ent://SD_ILS/0/SD_ILS:2301435
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Easttom, Chuck, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780133384390">https://learning.oreilly.com/library/view/~/9780133384390</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780133384390/?ar">https://go.oreilly.com/library-access/library/view/-/9780133384390/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133384390/?ar">https://learning.oreilly.com/library/view/~/9780133384390/?ar</a><br/>Format: Elektronik Kaynak<br/>
Cisco firewall technology
ent://SD_ILS/0/SD_ILS:2282843
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Mason, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9781587053290/?ar">https://learning.oreilly.com/library/view/~/9781587053290/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781587053290">https://learning.oreilly.com/library/view/~/9781587053290</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781587053290/?ar">https://go.oreilly.com/library-access/library/view/-/9781587053290/?ar</a><br/>Format: Elektronik Kaynak<br/>
Deploying zone-based firewalls
ent://SD_ILS/0/SD_ILS:2282730
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Pepelnjak, Ivan.<br/><a href="https://learning.oreilly.com/library/view/~/1587053101">https://learning.oreilly.com/library/view/~/1587053101</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1587053101/?ar">https://go.oreilly.com/library-access/library/view/-/1587053101/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587053101/?ar">https://learning.oreilly.com/library/view/~/1587053101/?ar</a><br/>Format: Elektronik Kaynak<br/>
Python for cybersecurity : using Python for cyber offense and defense
ent://SD_ILS/0/SD_ILS:2331574
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Poston, Howard E.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119850649/?ar">https://go.oreilly.com/library-access/library/view/-/9781119850649/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119850649/?ar">https://learning.oreilly.com/library/view/~/9781119850649/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119850649">https://learning.oreilly.com/library/view/~/9781119850649</a><br/>Format: Elektronik Kaynak<br/>
AWS SECURITY COOKBOOK;PRACTICAL SOLUTIONS FOR MANAGING SECURITY POLICIES, MONITORING, AUDITING, AND COMPLIANCE WITH AWS
ent://SD_ILS/0/SD_ILS:2323340
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by HEARTIN KANIKATHOTTU.<br/><a href="https://learning.oreilly.com/library/view/~/9781838826253">https://learning.oreilly.com/library/view/~/9781838826253</a>
<a href="https://learning.oreilly.com/library/view/~/9781838826253/?ar">https://learning.oreilly.com/library/view/~/9781838826253/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781838826253/?ar">https://go.oreilly.com/library-access/library/view/-/9781838826253/?ar</a><br/>Format: Elektronik Kaynak<br/>
Security with AI and machine learning : using advanced tools to improve application security at the edge
ent://SD_ILS/0/SD_ILS:2319058
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Gil, Laurent, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492043133/?ar">https://go.oreilly.com/library-access/library/view/-/9781492043133/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492043133/?ar">https://learning.oreilly.com/library/view/~/9781492043133/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492043133">https://learning.oreilly.com/library/view/~/9781492043133</a><br/>Format: Elektronik Kaynak<br/>
Cybersecurity Ops with bash : attack, defend, and analyze from the command line
ent://SD_ILS/0/SD_ILS:2319252
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Troncone, Paul, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492041306/?ar">https://go.oreilly.com/library-access/library/view/-/9781492041306/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492041306">https://learning.oreilly.com/library/view/~/9781492041306</a>
<a href="https://learning.oreilly.com/library/view/~/9781492041306/?ar">https://learning.oreilly.com/library/view/~/9781492041306/?ar</a><br/>Format: Elektronik Kaynak<br/>
Cryptography and network security
ent://SD_ILS/0/SD_ILS:2314416
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Bose, S., author.<br/><a href="https://learning.oreilly.com/library/view/~/9789332579125/?ar">https://learning.oreilly.com/library/view/~/9789332579125/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9789332579125/?ar">https://go.oreilly.com/library-access/library/view/-/9789332579125/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9789332579125">https://learning.oreilly.com/library/view/~/9789332579125</a><br/>Format: Elektronik Kaynak<br/>
Security program and policies : principles and practices
ent://SD_ILS/0/SD_ILS:2302981
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Greene, Sari Stern, 1957-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133481181/?ar">https://go.oreilly.com/library-access/library/view/-/9780133481181/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133481181/?ar">https://learning.oreilly.com/library/view/~/9780133481181/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133481181">https://learning.oreilly.com/library/view/~/9780133481181</a><br/>Format: Elektronik Kaynak<br/>
The craft of system security
ent://SD_ILS/0/SD_ILS:2284058
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Smith, Sean W., 1964-<br/><a href="https://learning.oreilly.com/library/view/~/9780321434838">https://learning.oreilly.com/library/view/~/9780321434838</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321434838/?ar">https://go.oreilly.com/library-access/library/view/-/9780321434838/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321434838/?ar">https://learning.oreilly.com/library/view/~/9780321434838/?ar</a><br/>Format: Elektronik Kaynak<br/>
Network security with NetFlow and IPFIX : big data analytics for information security
ent://SD_ILS/0/SD_ILS:2308401
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Santos, Omar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134033549/?ar">https://go.oreilly.com/library-access/library/view/-/9780134033549/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134033549/?ar">https://learning.oreilly.com/library/view/~/9780134033549/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134033549">https://learning.oreilly.com/library/view/~/9780134033549</a><br/>Format: Elektronik Kaynak<br/>
Computer-Forensik : Computerstraftaten erkennen, ermitteln, aufklären
ent://SD_ILS/0/SD_ILS:2297860
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Geschonneck, Alexander.<br/><a href="https://learning.oreilly.com/library/view/~/9781457170676/?ar">https://learning.oreilly.com/library/view/~/9781457170676/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781457170676/?ar">https://go.oreilly.com/library-access/library/view/-/9781457170676/?ar</a><br/>Format: Elektronik Kaynak<br/>
Modernizing cybersecurity operations with machine intelligence : advanced threat detection, hunting, and analysis
ent://SD_ILS/0/SD_ILS:2318456
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Guerra, Peter, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492035992/?ar">https://go.oreilly.com/library-access/library/view/-/9781492035992/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492035992/?ar">https://learning.oreilly.com/library/view/~/9781492035992/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492035992">https://learning.oreilly.com/library/view/~/9781492035992</a><br/>Format: Elektronik Kaynak<br/>
DevOpsSec : securing software through continuous delivery
ent://SD_ILS/0/SD_ILS:2311196
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Bird, Jim, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491971413/?ar">https://go.oreilly.com/library-access/library/view/-/9781491971413/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491971413/?ar">https://learning.oreilly.com/library/view/~/9781491971413/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491971413">https://learning.oreilly.com/library/view/~/9781491971413</a><br/>Format: Elektronik Kaynak<br/>
Practical monitoring : effective strategies for the real world
ent://SD_ILS/0/SD_ILS:2314748
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Julian, Mike, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491957349/?ar">https://go.oreilly.com/library-access/library/view/-/9781491957349/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491957349/?ar">https://learning.oreilly.com/library/view/~/9781491957349/?ar</a><br/>Format: Elektronik Kaynak<br/>
Windows forensics cookbook : 61 recipes to help you analyze Windows systems
ent://SD_ILS/0/SD_ILS:2313990
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Sulkin, Oleg, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784390495/?ar">https://go.oreilly.com/library-access/library/view/-/9781784390495/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781784390495/?ar">https://learning.oreilly.com/library/view/~/9781784390495/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781784390495">https://learning.oreilly.com/library/view/~/9781784390495</a><br/>Format: Elektronik Kaynak<br/>
Implementing SSL/TLS using cryptography and PKI
ent://SD_ILS/0/SD_ILS:2290966
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Davies, Joshua A. (Joshua Aaron)<br/><a href="https://learning.oreilly.com/library/view/~/9780470920411/?ar">https://learning.oreilly.com/library/view/~/9780470920411/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470920411/?ar">https://go.oreilly.com/library-access/library/view/-/9780470920411/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470920411">https://learning.oreilly.com/library/view/~/9780470920411</a><br/>Format: Elektronik Kaynak<br/>
How to cheat at securing your network
ent://SD_ILS/0/SD_ILS:2284630
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Dubrawsky, Ido.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492317/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492317/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492317/?ar">https://learning.oreilly.com/library/view/~/9781597492317/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492317">https://learning.oreilly.com/library/view/~/9781597492317</a><br/>Format: Elektronik Kaynak<br/>
Apache cookbook
ent://SD_ILS/0/SD_ILS:2284337
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Coar, Ken A. L.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596001916/?ar">https://go.oreilly.com/library-access/library/view/-/0596001916/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596001916/?ar">https://learning.oreilly.com/library/view/~/0596001916/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596001916">https://learning.oreilly.com/library/view/~/0596001916</a><br/>Format: Elektronik Kaynak<br/>
Microsoft Azure security center
ent://SD_ILS/0/SD_ILS:2322053
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Diogenes, Yuri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar">https://go.oreilly.com/library-access/library/view/-/9780135752050/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135752050/?ar">https://learning.oreilly.com/library/view/~/9780135752050/?ar</a><br/>Format: Elektronik Kaynak<br/>
Practical security automation and testing : tools and techniques for automated security scanning and testing in DevSecOps
ent://SD_ILS/0/SD_ILS:2319096
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Hsu, Tony Hsiang-Chih, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789802023/?ar">https://learning.oreilly.com/library/view/~/9781789802023/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789802023/?ar">https://go.oreilly.com/library-access/library/view/-/9781789802023/?ar</a><br/>Format: Elektronik Kaynak<br/>
Ethical hacking and penetration testing guide
ent://SD_ILS/0/SD_ILS:2314673
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Baloch, Rafay, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781351381345/?ar">https://learning.oreilly.com/library/view/~/9781351381345/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781351381345/?ar">https://go.oreilly.com/library-access/library/view/-/9781351381345/?ar</a><br/>Format: Elektronik Kaynak<br/>
PKI uncovered
ent://SD_ILS/0/SD_ILS:2291795
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Karamanian, Andre.<br/><a href="https://learning.oreilly.com/library/view/~/9781587059339/?ar">https://learning.oreilly.com/library/view/~/9781587059339/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781587059339/?ar">https://go.oreilly.com/library-access/library/view/-/9781587059339/?ar</a><br/>Format: Elektronik Kaynak<br/>
Container security : fundamental technology concepts that protect containerized applications
ent://SD_ILS/0/SD_ILS:2323879
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Rice, Liz, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492056690/?ar">https://learning.oreilly.com/library/view/~/9781492056690/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492056690/?ar">https://go.oreilly.com/library-access/library/view/-/9781492056690/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492056690">https://learning.oreilly.com/library/view/~/9781492056690</a><br/>Format: Elektronik Kaynak<br/>
Computer security fundamentals
ent://SD_ILS/0/SD_ILS:2310991
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Easttom, Chuck, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134470627/?ar">https://go.oreilly.com/library-access/library/view/-/9780134470627/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134470627/?ar">https://learning.oreilly.com/library/view/~/9780134470627/?ar</a><br/>Format: Elektronik Kaynak<br/>
Monitoring anti-patterns
ent://SD_ILS/0/SD_ILS:2315680
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Julian, Mike, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492036791/?ar">https://go.oreilly.com/library-access/library/view/-/9781492036791/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492036791/?ar">https://learning.oreilly.com/library/view/~/9781492036791/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492036791">https://learning.oreilly.com/library/view/~/9781492036791</a><br/>Format: Elektronik Kaynak<br/>
Building a modern security program : adapting security for DevOps and cloud
ent://SD_ILS/0/SD_ILS:2317166
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Lackey, Zane, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492044680/?ar">https://learning.oreilly.com/library/view/~/9781492044680/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492044680">https://learning.oreilly.com/library/view/~/9781492044680</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492044680/?ar">https://go.oreilly.com/library-access/library/view/-/9781492044680/?ar</a><br/>Format: Elektronik Kaynak<br/>
Anomaly detection for monitoring : a statistical approach to time series anomaly detection
ent://SD_ILS/0/SD_ILS:2316907
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Jinka, Preetam, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492042341/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042341/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492042341">https://learning.oreilly.com/library/view/~/9781492042341</a>
<a href="https://learning.oreilly.com/library/view/~/9781492042341/?ar">https://learning.oreilly.com/library/view/~/9781492042341/?ar</a><br/>Format: Elektronik Kaynak<br/>
Conducting network penetration and espionage in a global environment
ent://SD_ILS/0/SD_ILS:2303092
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Middleton, Bruce, 1953- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482206470">https://learning.oreilly.com/library/view/~/9781482206470</a>
<a href="https://learning.oreilly.com/library/view/~/9781482206470/?ar">https://learning.oreilly.com/library/view/~/9781482206470/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781482206470/?ar">https://go.oreilly.com/library-access/library/view/-/9781482206470/?ar</a><br/>Format: Elektronik Kaynak<br/>
CCNP Security Firewall 642-617 quick reference
ent://SD_ILS/0/SD_ILS:2291201
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Mason, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9780132567145/?ar">https://learning.oreilly.com/library/view/~/9780132567145/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780132567145/?ar">https://go.oreilly.com/library-access/library/view/-/9780132567145/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132567145">https://learning.oreilly.com/library/view/~/9780132567145</a><br/>Format: Elektronik Kaynak<br/>
Handbook of information security . Volume 1, Key concepts, infrastructure, standards, and protocols
ent://SD_ILS/0/SD_ILS:2289169
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Bidgoli, Hossein.<br/><a href="https://learning.oreilly.com/library/view/~/9780471648307">https://learning.oreilly.com/library/view/~/9780471648307</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780471648307/?ar">https://go.oreilly.com/library-access/library/view/-/9780471648307/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780471648307/?ar">https://learning.oreilly.com/library/view/~/9780471648307/?ar</a><br/>Format: Elektronik Kaynak<br/>
Microsoft windows security resource kit
ent://SD_ILS/0/SD_ILS:2282820
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Smith, Ben, 1975-<br/><a href="https://learning.oreilly.com/library/view/~/9780735621749">https://learning.oreilly.com/library/view/~/9780735621749</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780735621749/?ar">https://go.oreilly.com/library-access/library/view/-/9780735621749/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780735621749/?ar">https://learning.oreilly.com/library/view/~/9780735621749/?ar</a><br/>Format: Elektronik Kaynak<br/>
Googling security : how much does Google know about you?
ent://SD_ILS/0/SD_ILS:2285350
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Conti, Greg.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321591265/?ar">https://go.oreilly.com/library-access/library/view/-/9780321591265/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321591265/?ar">https://learning.oreilly.com/library/view/~/9780321591265/?ar</a><br/>Format: Elektronik Kaynak<br/>
Hands-on AWS penetration testing with Kali Linux : set up a virtual lab and pentest major AWS services, including EC2, S3, Lambda, and CloudFormation
ent://SD_ILS/0/SD_ILS:2321409
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Gilbert, Karl, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789136722">https://learning.oreilly.com/library/view/~/9781789136722</a>
<a href="https://learning.oreilly.com/library/view/~/9781789136722/?ar">https://learning.oreilly.com/library/view/~/9781789136722/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789136722/?ar">https://go.oreilly.com/library-access/library/view/-/9781789136722/?ar</a><br/>Format: Elektronik Kaynak<br/>
Web penetration testing with Kali Linux : explore the methods and tools of ethical hacking with Kali Linux
ent://SD_ILS/0/SD_ILS:2315998
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Najera-Gutierrez, Gilberto, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788623377/?ar">https://go.oreilly.com/library-access/library/view/-/9781788623377/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788623377/?ar">https://learning.oreilly.com/library/view/~/9781788623377/?ar</a><br/>Format: Elektronik Kaynak<br/>
Practical intrusion analysis : prevention and detection for the twenty-first century
ent://SD_ILS/0/SD_ILS:2286080
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Trost, Ryan.<br/><a href="https://learning.oreilly.com/library/view/~/9780321591890/?ar">https://learning.oreilly.com/library/view/~/9780321591890/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321591890/?ar">https://go.oreilly.com/library-access/library/view/-/9780321591890/?ar</a><br/>Format: Elektronik Kaynak<br/>
How to hack like a ghost
ent://SD_ILS/0/SD_ILS:2326507
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Flow, Sparc, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098128944">https://learning.oreilly.com/library/view/~/9781098128944</a>
<a href="https://learning.oreilly.com/library/view/~/9781098128944/?ar">https://learning.oreilly.com/library/view/~/9781098128944/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098128944/?ar">https://go.oreilly.com/library-access/library/view/-/9781098128944/?ar</a><br/>Format: Elektronik Kaynak<br/>
Incident response primer : how to keep from getting pwned too hard
ent://SD_ILS/0/SD_ILS:2323316
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492073659/?ar">https://learning.oreilly.com/library/view/~/9781492073659/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar">https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492073659">https://learning.oreilly.com/library/view/~/9781492073659</a><br/>Format: Elektronik Kaynak<br/>
Managing Trust in Cyberspace.
ent://SD_ILS/0/SD_ILS:2302307
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Thampi, Sabu M.<br/><a href="https://learning.oreilly.com/library/view/~/9781466568457/?ar">https://learning.oreilly.com/library/view/~/9781466568457/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466568457/?ar">https://go.oreilly.com/library-access/library/view/-/9781466568457/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466568457">https://learning.oreilly.com/library/view/~/9781466568457</a><br/>Format: Elektronik Kaynak<br/>
Network and system security
ent://SD_ILS/0/SD_ILS:2288837
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Vacca, John R.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495356">https://learning.oreilly.com/library/view/~/9781597495356</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495356/?ar">https://learning.oreilly.com/library/view/~/9781597495356/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495356/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495356/?ar</a><br/>Format: Elektronik Kaynak<br/>
Screenos cookbook
ent://SD_ILS/0/SD_ILS:2285572
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Brunner, Stefan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780596510039/?ar">https://go.oreilly.com/library-access/library/view/-/9780596510039/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596510039">https://learning.oreilly.com/library/view/~/9780596510039</a>
<a href="https://learning.oreilly.com/library/view/~/9780596510039/?ar">https://learning.oreilly.com/library/view/~/9780596510039/?ar</a><br/>Format: Elektronik Kaynak<br/>
Hardening Cisco routers
ent://SD_ILS/0/SD_ILS:2293283
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Akin, Thomas.<br/><a href="https://learning.oreilly.com/library/view/~/0596001665/?ar">https://learning.oreilly.com/library/view/~/0596001665/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596001665">https://learning.oreilly.com/library/view/~/0596001665</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596001665/?ar">https://go.oreilly.com/library-access/library/view/-/0596001665/?ar</a><br/>Format: Elektronik Kaynak<br/>
Jissen bash ni yoru saibā sekyuriti taisaku : sekyuriti gijutsusha no tame no sheru sukuriputo katsuyōjutsu
ent://SD_ILS/0/SD_ILS:2332657
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Troncone, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9784873119052/?ar">https://learning.oreilly.com/library/view/~/9784873119052/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9784873119052/?ar">https://go.oreilly.com/library-access/library/view/-/9784873119052/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9784873119052">https://learning.oreilly.com/library/view/~/9784873119052</a><br/>Format: Elektronik Kaynak<br/>
Check Point VPN-1/FireWall-1 on AIX : a cookbook for stand-alone and high availability solutions
ent://SD_ILS/0/SD_ILS:2302489
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Bücker, Axel.<br/><a href="https://learning.oreilly.com/library/view/~/0738421014">https://learning.oreilly.com/library/view/~/0738421014</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738421014/?ar">https://go.oreilly.com/library-access/library/view/-/0738421014/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738421014/?ar">https://learning.oreilly.com/library/view/~/0738421014/?ar</a><br/>Format: Elektronik Kaynak<br/>
Identity and access management : business performance through connected intelligence
ent://SD_ILS/0/SD_ILS:2301931
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Osmanoglu, T. Ertem.<br/><a href="https://learning.oreilly.com/library/view/~/9780124081406/?ar">https://learning.oreilly.com/library/view/~/9780124081406/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124081406">https://learning.oreilly.com/library/view/~/9780124081406</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124081406/?ar">https://go.oreilly.com/library-access/library/view/-/9780124081406/?ar</a><br/>Format: Elektronik Kaynak<br/>
Ajax security
ent://SD_ILS/0/SD_ILS:2284335
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Hoffman, Billy, 1980-<br/><a href="https://learning.oreilly.com/library/view/~/9780321491930">https://learning.oreilly.com/library/view/~/9780321491930</a>
<a href="https://learning.oreilly.com/library/view/~/9780321491930/?ar">https://learning.oreilly.com/library/view/~/9780321491930/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321491930/?ar">https://go.oreilly.com/library-access/library/view/-/9780321491930/?ar</a><br/>Format: Elektronik Kaynak<br/>
How to break Web software : functional and security testing of Web applications and Web services
ent://SD_ILS/0/SD_ILS:2286432
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Andrews, Mike.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321657497/?ar">https://go.oreilly.com/library-access/library/view/-/9780321657497/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321657497/?ar">https://learning.oreilly.com/library/view/~/9780321657497/?ar</a><br/>Format: Elektronik Kaynak<br/>
Understanding Public-Key Infrastructure : Concepts, Standards, and Deployment Considerations
ent://SD_ILS/0/SD_ILS:2319804
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Adams, Carlisle, author.<br/><a href="https://learning.oreilly.com/library/view/~/157870166X">https://learning.oreilly.com/library/view/~/157870166X</a>
<a href="https://learning.oreilly.com/library/view/~/157870166X/?ar">https://learning.oreilly.com/library/view/~/157870166X/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/157870166X/?ar">https://go.oreilly.com/library-access/library/view/-/157870166X/?ar</a><br/>Format: Elektronik Kaynak<br/>
Microsoft Azure security center
ent://SD_ILS/0/SD_ILS:2316778
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781509307081/?ar">https://learning.oreilly.com/library/view/~/9781509307081/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781509307081/?ar">https://go.oreilly.com/library-access/library/view/-/9781509307081/?ar</a><br/>Format: Elektronik Kaynak<br/>
Integrated Security Systems Design : Concepts, Specifications, and Implementation.
ent://SD_ILS/0/SD_ILS:2286958
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Norman, Thomas L.<br/><a href="https://learning.oreilly.com/library/view/~/9780750679091/?ar">https://learning.oreilly.com/library/view/~/9780750679091/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780750679091/?ar">https://go.oreilly.com/library-access/library/view/-/9780750679091/?ar</a><br/>Format: Elektronik Kaynak<br/>
Cyber resiliency solution for IBM Spectrum Scale
ent://SD_ILS/0/SD_ILS:2322145
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by IBM Storage Team, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738457963/?ar">https://learning.oreilly.com/library/view/~/9780738457963/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738457963/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457963/?ar</a><br/>Format: Elektronik Kaynak<br/>
Mastering identity and access management with Microsoft Azure : start empowering users and protecting corporate data, while managing identities and access with Microsoft Azure in different environments
ent://SD_ILS/0/SD_ILS:2311745
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Nickel, Jochen, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785889448/?ar">https://go.oreilly.com/library-access/library/view/-/9781785889448/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785889448/?ar">https://learning.oreilly.com/library/view/~/9781785889448/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785889448">https://learning.oreilly.com/library/view/~/9781785889448</a><br/>Format: Elektronik Kaynak<br/>
802.11 Security
ent://SD_ILS/0/SD_ILS:2319695
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Fleck, Bob, author.<br/><a href="https://learning.oreilly.com/library/view/~/0596002904">https://learning.oreilly.com/library/view/~/0596002904</a>
<a href="https://learning.oreilly.com/library/view/~/0596002904/?ar">https://learning.oreilly.com/library/view/~/0596002904/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596002904/?ar">https://go.oreilly.com/library-access/library/view/-/0596002904/?ar</a><br/>Format: Elektronik Kaynak<br/>
Cyber resilient infrastructure : detect, protect, and mitigate threats against Brocade SAN FOS with IBM QRadar
ent://SD_ILS/0/SD_ILS:2332057
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by IBM Storage Team, issuing body.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460260/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460260/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460260/?ar">https://learning.oreilly.com/library/view/~/9780738460260/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460260">https://learning.oreilly.com/library/view/~/9780738460260</a><br/>Format: Elektronik Kaynak<br/>
Kubernetes security : operating Kubernetes clusters and applications safely
ent://SD_ILS/0/SD_ILS:2318519
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Rice, Liz, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492039075">https://learning.oreilly.com/library/view/~/9781492039075</a>
<a href="https://learning.oreilly.com/library/view/~/9781492039075/?ar">https://learning.oreilly.com/library/view/~/9781492039075/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492039075/?ar">https://go.oreilly.com/library-access/library/view/-/9781492039075/?ar</a><br/>Format: Elektronik Kaynak<br/>
The state of the art in intrusion prevention and detection
ent://SD_ILS/0/SD_ILS:2302234
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Pathan, Al-Sakib Khan, editor, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781482203523">https://learning.oreilly.com/library/view/~/9781482203523</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781482203523/?ar">https://go.oreilly.com/library-access/library/view/-/9781482203523/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781482203523/?ar">https://learning.oreilly.com/library/view/~/9781482203523/?ar</a><br/>Format: Elektronik Kaynak<br/>
SOA security
ent://SD_ILS/0/SD_ILS:2284936
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Kanneganti, Ramarao.<br/><a href="https://learning.oreilly.com/library/view/~/9781932394689">https://learning.oreilly.com/library/view/~/9781932394689</a>
<a href="https://learning.oreilly.com/library/view/~/9781932394689/?ar">https://learning.oreilly.com/library/view/~/9781932394689/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781932394689/?ar">https://go.oreilly.com/library-access/library/view/-/9781932394689/?ar</a><br/>Format: Elektronik Kaynak<br/>
OSSEC host-based intrusion detection guide
ent://SD_ILS/0/SD_ILS:2285140
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Hay, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492409">https://learning.oreilly.com/library/view/~/9781597492409</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492409/?ar">https://learning.oreilly.com/library/view/~/9781597492409/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492409/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492409/?ar</a><br/>Format: Elektronik Kaynak<br/>
Network scanning cookbook : practical network security using Nmap and Nessus 7
ent://SD_ILS/0/SD_ILS:2317776
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Sairam, Jetty, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar">https://go.oreilly.com/library-access/library/view/-/9781789346480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789346480/?ar">https://learning.oreilly.com/library/view/~/9781789346480/?ar</a><br/>Format: Elektronik Kaynak<br/>
Cybersecurity for dummies
ent://SD_ILS/0/SD_ILS:2322747
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Steinberg, Joseph (Cybersecurity expert), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781494542450">https://learning.oreilly.com/library/view/~/9781494542450</a>
<a href="https://learning.oreilly.com/library/view/~/9781494542450/?ar">https://learning.oreilly.com/library/view/~/9781494542450/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781494542450/?ar">https://go.oreilly.com/library-access/library/view/-/9781494542450/?ar</a><br/>Format: Elektronik Kaynak<br/>
Effective Python penetration testing : pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools
ent://SD_ILS/0/SD_ILS:2311022
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Rehim, Rejah, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781785280696/?ar">https://go.oreilly.com/library-access/library/view/-/9781785280696/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785280696/?ar">https://learning.oreilly.com/library/view/~/9781785280696/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785280696">https://learning.oreilly.com/library/view/~/9781785280696</a><br/>Format: Elektronik Kaynak<br/>
Digital resilience : is your company ready for the next cyber threat?
ent://SD_ILS/0/SD_ILS:2314734
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Rothrock, Ray A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780814439258">https://learning.oreilly.com/library/view/~/9780814439258</a>
<a href="https://learning.oreilly.com/library/view/~/9780814439258/?ar">https://learning.oreilly.com/library/view/~/9780814439258/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780814439258/?ar">https://go.oreilly.com/library-access/library/view/-/9780814439258/?ar</a><br/>Format: Elektronik Kaynak<br/>
Hands-on bug hunting for penetration testers : a practical guide to help ethical hackers discover web application security flaws
ent://SD_ILS/0/SD_ILS:2317823
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Marshall, Joseph, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789344202">https://learning.oreilly.com/library/view/~/9781789344202</a>
<a href="https://learning.oreilly.com/library/view/~/9781789344202/?ar">https://learning.oreilly.com/library/view/~/9781789344202/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789344202/?ar">https://go.oreilly.com/library-access/library/view/-/9781789344202/?ar</a><br/>Format: Elektronik Kaynak<br/>
Digital forensics and incident response : an intelligent way to respond to attacks
ent://SD_ILS/0/SD_ILS:2313915
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Johansen, Gerard, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787288683">https://learning.oreilly.com/library/view/~/9781787288683</a>
<a href="https://learning.oreilly.com/library/view/~/9781787288683/?ar">https://learning.oreilly.com/library/view/~/9781787288683/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787288683/?ar">https://go.oreilly.com/library-access/library/view/-/9781787288683/?ar</a><br/>Format: Elektronik Kaynak<br/>
Opportunities and challenges in the IoT : a conversation with Tim O'Reilly and Cory Doctorow
ent://SD_ILS/0/SD_ILS:2318384
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by O'Reilly, Tim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492048220/?ar">https://learning.oreilly.com/library/view/~/9781492048220/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492048220">https://learning.oreilly.com/library/view/~/9781492048220</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492048220/?ar">https://go.oreilly.com/library-access/library/view/-/9781492048220/?ar</a><br/>Format: Elektronik Kaynak<br/>
Reverse Deception Organized Cyber Threat Counter-Exploitation.
ent://SD_ILS/0/SD_ILS:2295096
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Kilger, Dr Max.<br/><a href="https://learning.oreilly.com/library/view/~/9780071772495">https://learning.oreilly.com/library/view/~/9780071772495</a>
<a href="https://learning.oreilly.com/library/view/~/9780071772495/?ar">https://learning.oreilly.com/library/view/~/9780071772495/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071772495/?ar">https://go.oreilly.com/library-access/library/view/-/9780071772495/?ar</a><br/>Format: Elektronik Kaynak<br/>
Microsoft forefront security administration guide
ent://SD_ILS/0/SD_ILS:2284517
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Varsalone, Jesse.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492447">https://learning.oreilly.com/library/view/~/9781597492447</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492447/?ar">https://learning.oreilly.com/library/view/~/9781597492447/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492447/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492447/?ar</a><br/>Format: Elektronik Kaynak<br/>
Digital identity
ent://SD_ILS/0/SD_ILS:2293288
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Windley, Phillip J., 1958-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596008783/?ar">https://go.oreilly.com/library-access/library/view/-/0596008783/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008783/?ar">https://learning.oreilly.com/library/view/~/0596008783/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008783">https://learning.oreilly.com/library/view/~/0596008783</a><br/>Format: Elektronik Kaynak<br/>
Computer forensics : incident response essentials
ent://SD_ILS/0/SD_ILS:2288447
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Kruse, Warren G.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780672333989/?ar">https://go.oreilly.com/library-access/library/view/-/9780672333989/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780672333989/?ar">https://learning.oreilly.com/library/view/~/9780672333989/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780672333989">https://learning.oreilly.com/library/view/~/9780672333989</a><br/>Format: Elektronik Kaynak<br/>
Pentesting Industrial Control Systems : an Ethical Hacker's Guide to Analyzing, Compromising, Mitigating, and Securing Industrial Processes.
ent://SD_ILS/0/SD_ILS:2330864
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Smith, Paul.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781800202382/?ar">https://go.oreilly.com/library-access/library/view/-/9781800202382/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800202382/?ar">https://learning.oreilly.com/library/view/~/9781800202382/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800202382">https://learning.oreilly.com/library/view/~/9781800202382</a><br/>Format: Elektronik Kaynak<br/>
AVIEN malware defense guide for the Enterprise
ent://SD_ILS/0/SD_ILS:2284510
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Harley, David.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491648">https://learning.oreilly.com/library/view/~/9781597491648</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491648/?ar">https://learning.oreilly.com/library/view/~/9781597491648/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491648/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491648/?ar</a><br/>Format: Elektronik Kaynak<br/>
Are your bits flipped? : overcoming tech misconceptions
ent://SD_ILS/0/SD_ILS:2310599
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Kissell, Joe, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492017172/?ar">https://go.oreilly.com/library-access/library/view/-/9781492017172/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492017172/?ar">https://learning.oreilly.com/library/view/~/9781492017172/?ar</a><br/>Format: Elektronik Kaynak<br/>
Dissecting the hack : the V3rb0ten network
ent://SD_ILS/0/SD_ILS:2309296
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Street, Jayson E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128042823/?ar">https://learning.oreilly.com/library/view/~/9780128042823/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar">https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar</a><br/>Format: Elektronik Kaynak<br/>
The security data lake : leveraging big data technologies to build a common data repository for security
ent://SD_ILS/0/SD_ILS:2318350
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Marty, Raffael, 1976- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491927748/?ar">https://learning.oreilly.com/library/view/~/9781491927748/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491927748/?ar">https://go.oreilly.com/library-access/library/view/-/9781491927748/?ar</a><br/>Format: Elektronik Kaynak<br/>
Cloud Computing Security, 2nd Edition
ent://SD_ILS/0/SD_ILS:2331101
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Vacca, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780429619649">https://learning.oreilly.com/library/view/~/9780429619649</a>
<a href="https://learning.oreilly.com/library/view/~/9780429619649/?ar">https://learning.oreilly.com/library/view/~/9780429619649/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar">https://go.oreilly.com/library-access/library/view/-/9780429619649/?ar</a><br/>Format: Elektronik Kaynak<br/>
Binary analysis cookbook : actionable recipes for disassembling and analyzing binaries for security risks
ent://SD_ILS/0/SD_ILS:2321954
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Born, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789807608/?ar">https://learning.oreilly.com/library/view/~/9781789807608/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789807608/?ar">https://go.oreilly.com/library-access/library/view/-/9781789807608/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789807608">https://learning.oreilly.com/library/view/~/9781789807608</a><br/>Format: Elektronik Kaynak<br/>
The Complete Guide to Cybersecurity Risks and Controls
ent://SD_ILS/0/SD_ILS:2324524
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Kohnke, Anne, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781498740579/?ar">https://go.oreilly.com/library-access/library/view/-/9781498740579/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781498740579/?ar">https://learning.oreilly.com/library/view/~/9781498740579/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781498740579">https://learning.oreilly.com/library/view/~/9781498740579</a><br/>Format: Elektronik Kaynak<br/>
Kismet hacking
ent://SD_ILS/0/SD_ILS:2285148
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Haines, Brad.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491174">https://learning.oreilly.com/library/view/~/9781597491174</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491174/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491174/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491174/?ar">https://learning.oreilly.com/library/view/~/9781597491174/?ar</a><br/>Format: Elektronik Kaynak<br/>
Secure XML : the New Syntax for Signatures and Encryption.
ent://SD_ILS/0/SD_ILS:2290491
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Niles, Kitty, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0201756056/?ar">https://go.oreilly.com/library-access/library/view/-/0201756056/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0201756056">https://learning.oreilly.com/library/view/~/0201756056</a>
<a href="https://learning.oreilly.com/library/view/~/0201756056/?ar">https://learning.oreilly.com/library/view/~/0201756056/?ar</a><br/>Format: Elektronik Kaynak<br/>
WebSphere Application Server for z/OS V5 and J2EE 1.3 security handbook
ent://SD_ILS/0/SD_ILS:2296187
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Allison, Steve.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738490679/?ar">https://go.oreilly.com/library-access/library/view/-/0738490679/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738490679/?ar">https://learning.oreilly.com/library/view/~/0738490679/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738490679">https://learning.oreilly.com/library/view/~/0738490679</a><br/>Format: Elektronik Kaynak<br/>
Data analytics for IT networks : developing innovative use cases
ent://SD_ILS/0/SD_ILS:2317559
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Garrett, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135183496/?ar">https://learning.oreilly.com/library/view/~/9780135183496/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar">https://go.oreilly.com/library-access/library/view/-/9780135183496/?ar</a><br/>Format: Elektronik Kaynak<br/>
Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors
ent://SD_ILS/0/SD_ILS:2319534
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Carpenter, Perry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119566342">https://learning.oreilly.com/library/view/~/9781119566342</a>
<a href="https://learning.oreilly.com/library/view/~/9781119566342/?ar">https://learning.oreilly.com/library/view/~/9781119566342/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119566342/?ar">https://go.oreilly.com/library-access/library/view/-/9781119566342/?ar</a><br/>Format: Elektronik Kaynak<br/>
Practical Windows forensics : leverage the power of digital forensics for Windows systems
ent://SD_ILS/0/SD_ILS:2311021
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Shaaban, Ayman, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781783554096">https://learning.oreilly.com/library/view/~/9781783554096</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781783554096/?ar">https://go.oreilly.com/library-access/library/view/-/9781783554096/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781783554096/?ar">https://learning.oreilly.com/library/view/~/9781783554096/?ar</a><br/>Format: Elektronik Kaynak<br/>
Web application firewalls : securing modern web applications
ent://SD_ILS/0/SD_ILS:2318497
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Russell, Chad, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492032311">https://learning.oreilly.com/library/view/~/9781492032311</a>
<a href="https://learning.oreilly.com/library/view/~/9781492032311/?ar">https://learning.oreilly.com/library/view/~/9781492032311/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492032311/?ar">https://go.oreilly.com/library-access/library/view/-/9781492032311/?ar</a><br/>Format: Elektronik Kaynak<br/>
Cisco Intelligent WAN (IWAN)
ent://SD_ILS/0/SD_ILS:2311998
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Edgeworth, Brad, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134423760/?ar">https://go.oreilly.com/library-access/library/view/-/9780134423760/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134423760/?ar">https://learning.oreilly.com/library/view/~/9780134423760/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134423760">https://learning.oreilly.com/library/view/~/9780134423760</a><br/>Format: Elektronik Kaynak<br/>
Cloud security automation : get to grips with automating your cloud security on AWS and OpenStack
ent://SD_ILS/0/SD_ILS:2316344
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Priyam, Prashant, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788627863/?ar">https://learning.oreilly.com/library/view/~/9781788627863/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788627863/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627863/?ar</a><br/>Format: Elektronik Kaynak<br/>
Enterprise cloud security and governance : efficiently set data protection and privacy principles
ent://SD_ILS/0/SD_ILS:2315410
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Vora, Zeal, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788299558/?ar">https://learning.oreilly.com/library/view/~/9781788299558/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788299558/?ar">https://go.oreilly.com/library-access/library/view/-/9781788299558/?ar</a><br/>Format: Elektronik Kaynak<br/>
Hacking web performance : moving beyond the basics of web performance optimization
ent://SD_ILS/0/SD_ILS:2316902
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Firtman, Maximiliano R., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492039426/?ar">https://go.oreilly.com/library-access/library/view/-/9781492039426/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492039426/?ar">https://learning.oreilly.com/library/view/~/9781492039426/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492039426">https://learning.oreilly.com/library/view/~/9781492039426</a><br/>Format: Elektronik Kaynak<br/>
Penetration testing bootcamp : quickly get up and running with pentesting techniques
ent://SD_ILS/0/SD_ILS:2313746
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Beltrame, Jason, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787288744/?ar">https://go.oreilly.com/library-access/library/view/-/9781787288744/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787288744/?ar">https://learning.oreilly.com/library/view/~/9781787288744/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787288744">https://learning.oreilly.com/library/view/~/9781787288744</a><br/>Format: Elektronik Kaynak<br/>
Adaptive Security Management Architecture
ent://SD_ILS/0/SD_ILS:2326064
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Tiller, James S.<br/><a href="https://learning.oreilly.com/library/view/~/9781420013375">https://learning.oreilly.com/library/view/~/9781420013375</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781420013375/?ar">https://go.oreilly.com/library-access/library/view/-/9781420013375/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420013375/?ar">https://learning.oreilly.com/library/view/~/9781420013375/?ar</a><br/>Format: Elektronik Kaynak<br/>
Data networks : routing, security, and performance optimization
ent://SD_ILS/0/SD_ILS:2280937
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Kenyon, Tony, 1960-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781555582715/?ar">https://go.oreilly.com/library-access/library/view/-/9781555582715/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781555582715/?ar">https://learning.oreilly.com/library/view/~/9781555582715/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781555582715">https://learning.oreilly.com/library/view/~/9781555582715</a><br/>Format: Elektronik Kaynak<br/>
People-centric security : transforming your enterprise security culture
ent://SD_ILS/0/SD_ILS:2309517
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Hayden, Lance, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071846790/?ar">https://learning.oreilly.com/library/view/~/9780071846790/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071846790/?ar">https://go.oreilly.com/library-access/library/view/-/9780071846790/?ar</a><br/>Format: Elektronik Kaynak<br/>
Windows Server 2008 Active Directory domain services.
ent://SD_ILS/0/SD_ILS:2285826
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Microsoft Corporation.<br/><a href="https://go.oreilly.com/library-access/library/view/-/30000LTI00073/?ar">https://go.oreilly.com/library-access/library/view/-/30000LTI00073/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/30000LTI00073/?ar">https://learning.oreilly.com/library/view/~/30000LTI00073/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/30000LTI00073">https://learning.oreilly.com/library/view/~/30000LTI00073</a><br/>Format: Elektronik Kaynak<br/>
Apache : receptury
ent://SD_ILS/0/SD_ILS:2296868
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Bowen, Richard Cooper, 1971-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457176425/?ar">https://go.oreilly.com/library-access/library/view/-/9781457176425/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457176425/?ar">https://learning.oreilly.com/library/view/~/9781457176425/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457176425">https://learning.oreilly.com/library/view/~/9781457176425</a><br/>Format: Elektronik Kaynak<br/>
Implementing NAP and NAC security technologies : the complete guide to network access control
ent://SD_ILS/0/SD_ILS:2284693
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Hoffman, Daniel (Daniel V.), 1972-<br/><a href="https://learning.oreilly.com/library/view/~/9780470238387/?ar">https://learning.oreilly.com/library/view/~/9780470238387/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470238387/?ar">https://go.oreilly.com/library-access/library/view/-/9780470238387/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470238387">https://learning.oreilly.com/library/view/~/9780470238387</a><br/>Format: Elektronik Kaynak<br/>
Windows forensic analysis toolkit : advanced analysis techniques for Windows 8
ent://SD_ILS/0/SD_ILS:2302592
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Carvey, Harlan A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780124171572/?ar">https://learning.oreilly.com/library/view/~/9780124171572/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124171572/?ar">https://go.oreilly.com/library-access/library/view/-/9780124171572/?ar</a><br/>Format: Elektronik Kaynak<br/>
Business continuity and disaster recovery for infosec managers
ent://SD_ILS/0/SD_ILS:2297051
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Rittinghouse, John W.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781555583392/?ar">https://go.oreilly.com/library-access/library/view/-/9781555583392/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781555583392/?ar">https://learning.oreilly.com/library/view/~/9781555583392/?ar</a><br/>Format: Elektronik Kaynak<br/>
Managing information security breaches : studies from real life
ent://SD_ILS/0/SD_ILS:2308836
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Krausz, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849285964/?ar">https://learning.oreilly.com/library/view/~/9781849285964/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849285964/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285964/?ar</a><br/>Format: Elektronik Kaynak<br/>
SQL injection attacks and defense
ent://SD_ILS/0/SD_ILS:2295369
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Clarke, Justin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499637/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499637/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499637/?ar">https://learning.oreilly.com/library/view/~/9781597499637/?ar</a><br/>Format: Elektronik Kaynak<br/>
Ansible quick start guide : Control and monitor infrastructures of any size, physical or virtual
ent://SD_ILS/0/SD_ILS:2317798
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Alibi, Mohamed, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789532937">https://learning.oreilly.com/library/view/~/9781789532937</a>
<a href="https://learning.oreilly.com/library/view/~/9781789532937/?ar">https://learning.oreilly.com/library/view/~/9781789532937/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789532937/?ar">https://go.oreilly.com/library-access/library/view/-/9781789532937/?ar</a><br/>Format: Elektronik Kaynak<br/>
The platform transformation : how IoT will change IT, and when
ent://SD_ILS/0/SD_ILS:2316661
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Perry, Matthew J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042792/?ar">https://learning.oreilly.com/library/view/~/9781492042792/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492042792">https://learning.oreilly.com/library/view/~/9781492042792</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492042792/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042792/?ar</a><br/>Format: Elektronik Kaynak<br/>
Windows Server 2008 PKI and certificate security
ent://SD_ILS/0/SD_ILS:2284892
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Komar, Brian.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780735625167/?ar">https://go.oreilly.com/library-access/library/view/-/9780735625167/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780735625167">https://learning.oreilly.com/library/view/~/9780735625167</a>
<a href="https://learning.oreilly.com/library/view/~/9780735625167/?ar">https://learning.oreilly.com/library/view/~/9780735625167/?ar</a><br/>Format: Elektronik Kaynak<br/>
Practical embedded security : building secure resource-constrained systems
ent://SD_ILS/0/SD_ILS:2284523
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Stapko, Timothy John.<br/><a href="https://learning.oreilly.com/library/view/~/9780750682152/?ar">https://learning.oreilly.com/library/view/~/9780750682152/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780750682152/?ar">https://go.oreilly.com/library-access/library/view/-/9780750682152/?ar</a><br/>Format: Elektronik Kaynak<br/>
Investigating the Cyber Breach : the digital forensics guide for the network engineer
ent://SD_ILS/0/SD_ILS:2315345
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Muniz, Joseph, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134755885/?ar">https://go.oreilly.com/library-access/library/view/-/9780134755885/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134755885/?ar">https://learning.oreilly.com/library/view/~/9780134755885/?ar</a><br/>Format: Elektronik Kaynak<br/>
IBM QRadar Version 7.3 : planning and installation guide
ent://SD_ILS/0/SD_ILS:2315474
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Carabaguiaz, Elias, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738442877/?ar">https://learning.oreilly.com/library/view/~/9780738442877/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738442877/?ar">https://go.oreilly.com/library-access/library/view/-/9780738442877/?ar</a><br/>Format: Elektronik Kaynak<br/>
Data breaches : crisis and opportunity
ent://SD_ILS/0/SD_ILS:2322222
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Davidoff, Sherri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135964255/?ar">https://go.oreilly.com/library-access/library/view/-/9780135964255/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135964255/?ar">https://learning.oreilly.com/library/view/~/9780135964255/?ar</a><br/>Format: Elektronik Kaynak<br/>
Hacking the code : ASP.NET web application security
ent://SD_ILS/0/SD_ILS:2281371
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Burnett, Mark (Mark M.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781932266658/?ar">https://go.oreilly.com/library-access/library/view/-/9781932266658/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781932266658">https://learning.oreilly.com/library/view/~/9781932266658</a>
<a href="https://learning.oreilly.com/library/view/~/9781932266658/?ar">https://learning.oreilly.com/library/view/~/9781932266658/?ar</a>
<a href="https://www.sciencedirect.com/science/book/9781932266658">https://www.sciencedirect.com/science/book/9781932266658</a><br/>Format: Elektronik Kaynak<br/>
Becoming the hacker : the playbook for getting inside the mind of an attacker
ent://SD_ILS/0/SD_ILS:2319129
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Pruteanu, Adrian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788627962/?ar">https://learning.oreilly.com/library/view/~/9781788627962/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627962/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788627962">https://learning.oreilly.com/library/view/~/9781788627962</a><br/>Format: Elektronik Kaynak<br/>
Kali Linux network scanning cookbook : take your penetration-testing skills to the next level
ent://SD_ILS/0/SD_ILS:2313499
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Hixon, Michael, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar">https://go.oreilly.com/library-access/library/view/-/9781787287907/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787287907/?ar">https://learning.oreilly.com/library/view/~/9781787287907/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787287907">https://learning.oreilly.com/library/view/~/9781787287907</a><br/>Format: Elektronik Kaynak<br/>
The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practice
ent://SD_ILS/0/SD_ILS:2296625
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Winterfeld, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9780124047372/?ar">https://learning.oreilly.com/library/view/~/9780124047372/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124047372/?ar">https://go.oreilly.com/library-access/library/view/-/9780124047372/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124047372">https://learning.oreilly.com/library/view/~/9780124047372</a><br/>Format: Elektronik Kaynak<br/>
Distributed Networks
ent://SD_ILS/0/SD_ILS:2319907
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Memon, Qurban, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466559585">https://learning.oreilly.com/library/view/~/9781466559585</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466559585/?ar">https://go.oreilly.com/library-access/library/view/-/9781466559585/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466559585/?ar">https://learning.oreilly.com/library/view/~/9781466559585/?ar</a><br/>Format: Elektronik Kaynak<br/>
Advances in Network Management
ent://SD_ILS/0/SD_ILS:2313639
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Ding, Jianguo, author<br/><a href="https://learning.oreilly.com/library/view/~/9781420064551">https://learning.oreilly.com/library/view/~/9781420064551</a>
<a href="https://learning.oreilly.com/library/view/~/9781420064551/?ar">https://learning.oreilly.com/library/view/~/9781420064551/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781420064551/?ar">https://go.oreilly.com/library-access/library/view/-/9781420064551/?ar</a><br/>Format: Elektronik Kaynak<br/>
Microsoft
ent://SD_ILS/0/SD_ILS:2321069
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Miller, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780768695311">https://learning.oreilly.com/library/view/~/9780768695311</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780768695311/?ar">https://go.oreilly.com/library-access/library/view/-/9780768695311/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780768695311/?ar">https://learning.oreilly.com/library/view/~/9780768695311/?ar</a><br/>Format: Elektronik Kaynak<br/>
Next generation SSH2 implementation : securing data in motion
ent://SD_ILS/0/SD_ILS:2285986
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Liu, Dale.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492836/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492836/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492836/?ar">https://learning.oreilly.com/library/view/~/9781597492836/?ar</a><br/>Format: Elektronik Kaynak<br/>
Early threat detection and safeguarding data with IBM QRadar and IBM Copy Services Manager on IBM DS8000
ent://SD_ILS/0/SD_ILS:2332067
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by International Business Machines Corporation, issuing body.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738460406/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460406/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460406/?ar">https://learning.oreilly.com/library/view/~/9780738460406/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460406">https://learning.oreilly.com/library/view/~/9780738460406</a><br/>Format: Elektronik Kaynak<br/>
Take Control of 1Password, 4th Edition
ent://SD_ILS/0/SD_ILS:2319474
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Kissell, Joe, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781990783180/?ar">https://learning.oreilly.com/library/view/~/9781990783180/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781990783180/?ar">https://go.oreilly.com/library-access/library/view/-/9781990783180/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781990783180">https://learning.oreilly.com/library/view/~/9781990783180</a><br/>Format: Elektronik Kaynak<br/>
IT-Sicherheitsmanagement - Praxiswissen für IT Security Manager, 2. Auflage
ent://SD_ILS/0/SD_ILS:2320105
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Harich, Thomas W.<br/><a href="https://learning.oreilly.com/library/view/~/9783958452756/?ar">https://learning.oreilly.com/library/view/~/9783958452756/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783958452756">https://learning.oreilly.com/library/view/~/9783958452756</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783958452756/?ar">https://go.oreilly.com/library-access/library/view/-/9783958452756/?ar</a><br/>Format: Elektronik Kaynak<br/>
Integrated Security Systems Design, 2nd Edition
ent://SD_ILS/0/SD_ILS:2320974
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Norman, Thomas, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128000229/?ar">https://learning.oreilly.com/library/view/~/9780128000229/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128000229/?ar">https://go.oreilly.com/library-access/library/view/-/9780128000229/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128000229">https://learning.oreilly.com/library/view/~/9780128000229</a><br/>Format: Elektronik Kaynak<br/>
The Science and Technology of Counterterrorism
ent://SD_ILS/0/SD_ILS:2319961
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Young, Carl, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124200562/?ar">https://go.oreilly.com/library-access/library/view/-/9780124200562/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124200562">https://learning.oreilly.com/library/view/~/9780124200562</a>
<a href="https://learning.oreilly.com/library/view/~/9780124200562/?ar">https://learning.oreilly.com/library/view/~/9780124200562/?ar</a><br/>Format: Elektronik Kaynak<br/>
Strategic Information Management, 3rd Edition
ent://SD_ILS/0/SD_ILS:2319914
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Galliers, Robert, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780750656191/?ar">https://learning.oreilly.com/library/view/~/9780750656191/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780750656191/?ar">https://go.oreilly.com/library-access/library/view/-/9780750656191/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780750656191">https://learning.oreilly.com/library/view/~/9780750656191</a><br/>Format: Elektronik Kaynak<br/>
Preventing good people from doing bad things : implementing least privilege
ent://SD_ILS/0/SD_ILS:2293278
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Mutch, John.<br/><a href="https://learning.oreilly.com/library/view/~/9781430239215/?ar">https://learning.oreilly.com/library/view/~/9781430239215/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430239215/?ar">https://go.oreilly.com/library-access/library/view/-/9781430239215/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430239215">https://learning.oreilly.com/library/view/~/9781430239215</a><br/>Format: Elektronik Kaynak<br/>
Solving the Enigma : History of Cryptanalytic Bombe
ent://SD_ILS/0/SD_ILS:2310798
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Wilcox, Jennifer.<br/><a href="https://go.oreilly.com/library-access/library/view/-/01120100015SI/?ar">https://go.oreilly.com/library-access/library/view/-/01120100015SI/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/01120100015SI">https://learning.oreilly.com/library/view/~/01120100015SI</a>
<a href="https://learning.oreilly.com/library/view/~/01120100015SI/?ar">https://learning.oreilly.com/library/view/~/01120100015SI/?ar</a><br/>Format: Elektronik Kaynak<br/>
Mapping security : the corporate security sourcebook for today's global economy
ent://SD_ILS/0/SD_ILS:2315191
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Patterson, Tom.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321304527/?ar">https://go.oreilly.com/library-access/library/view/-/0321304527/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321304527/?ar">https://learning.oreilly.com/library/view/~/0321304527/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321304527">https://learning.oreilly.com/library/view/~/0321304527</a><br/>Format: Elektronik Kaynak<br/>
Security + Study Guide and DVD Training System
ent://SD_ILS/0/SD_ILS:2320599
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Syngress, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781931836722">https://learning.oreilly.com/library/view/~/9781931836722</a>
<a href="https://learning.oreilly.com/library/view/~/9781931836722/?ar">https://learning.oreilly.com/library/view/~/9781931836722/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781931836722/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836722/?ar</a><br/>Format: Elektronik Kaynak<br/>
Managing Information Security Risks : the OCTAVESM Approach
ent://SD_ILS/0/SD_ILS:2321582
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Alberts, Christopher, author.<br/><a href="https://learning.oreilly.com/library/view/~/0321118863/?ar">https://learning.oreilly.com/library/view/~/0321118863/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0321118863/?ar">https://go.oreilly.com/library-access/library/view/-/0321118863/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321118863">https://learning.oreilly.com/library/view/~/0321118863</a><br/>Format: Elektronik Kaynak<br/>
Learning penetration testing with Python : utilize Python scripting to execute effective and efficient penetration tests
ent://SD_ILS/0/SD_ILS:2308640
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Duffy, Christopher, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785282324/?ar">https://learning.oreilly.com/library/view/~/9781785282324/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785282324">https://learning.oreilly.com/library/view/~/9781785282324</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785282324/?ar">https://go.oreilly.com/library-access/library/view/-/9781785282324/?ar</a><br/>Format: Elektronik Kaynak<br/>
Cisco router firewall security
ent://SD_ILS/0/SD_ILS:2281579
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Deal, Richard A.<br/><a href="https://learning.oreilly.com/library/view/~/1587051753">https://learning.oreilly.com/library/view/~/1587051753</a>
<a href="https://learning.oreilly.com/library/view/~/1587051753/?ar">https://learning.oreilly.com/library/view/~/1587051753/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1587051753/?ar">https://go.oreilly.com/library-access/library/view/-/1587051753/?ar</a><br/>Format: Elektronik Kaynak<br/>
Hands-on network forensics : investigate network attacks and find evidence using common network forensic tools
ent://SD_ILS/0/SD_ILS:2319836
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Jaswal, Nipun, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789344523/?ar">https://go.oreilly.com/library-access/library/view/-/9781789344523/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789344523/?ar">https://learning.oreilly.com/library/view/~/9781789344523/?ar</a><br/>Format: Elektronik Kaynak<br/>
Google hacking for penetration testers
ent://SD_ILS/0/SD_ILS:2309293
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Long, Johnny, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128029824/?ar">https://learning.oreilly.com/library/view/~/9780128029824/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128029824/?ar">https://go.oreilly.com/library-access/library/view/-/9780128029824/?ar</a><br/>Format: Elektronik Kaynak<br/>
Wireless communications security : solutions for the internet of things
ent://SD_ILS/0/SD_ILS:2311624
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Penttinen, Jyrki T. J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119084396/?ar">https://learning.oreilly.com/library/view/~/9781119084396/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119084396/?ar">https://go.oreilly.com/library-access/library/view/-/9781119084396/?ar</a><br/>Format: Elektronik Kaynak<br/>
Cloud security for dummies
ent://SD_ILS/0/SD_ILS:2332497
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Coombs, Ted, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119790464">https://learning.oreilly.com/library/view/~/9781119790464</a>
<a href="https://learning.oreilly.com/library/view/~/9781119790464/?ar">https://learning.oreilly.com/library/view/~/9781119790464/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119790464/?ar">https://go.oreilly.com/library-access/library/view/-/9781119790464/?ar</a><br/>Format: Elektronik Kaynak<br/>
Linux essentials for cybersecurity lab manual
ent://SD_ILS/0/SD_ILS:2317558
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Rothwell, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780135305232">https://learning.oreilly.com/library/view/~/9780135305232</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780135305232/?ar">https://go.oreilly.com/library-access/library/view/-/9780135305232/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135305232/?ar">https://learning.oreilly.com/library/view/~/9780135305232/?ar</a><br/>Format: Elektronik Kaynak<br/>
Microsoft Windows server 2008 security resource kit
ent://SD_ILS/0/SD_ILS:2284887
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Johansson, Jesper M.<br/><a href="https://learning.oreilly.com/library/view/~/9780735625044/?ar">https://learning.oreilly.com/library/view/~/9780735625044/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780735625044">https://learning.oreilly.com/library/view/~/9780735625044</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780735625044/?ar">https://go.oreilly.com/library-access/library/view/-/9780735625044/?ar</a><br/>Format: Elektronik Kaynak<br/>
Firewalls and Internet Security : Repelling the Wily Hacker, Second Edition
ent://SD_ILS/0/SD_ILS:2324785
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Cheswick, William, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/020163466X/?ar">https://go.oreilly.com/library-access/library/view/-/020163466X/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/020163466X/?ar">https://learning.oreilly.com/library/view/~/020163466X/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/020163466X">https://learning.oreilly.com/library/view/~/020163466X</a><br/>Format: Elektronik Kaynak<br/>
Understanding PKI : Concepts, Standards, and Deployment Considerations, Second Edition
ent://SD_ILS/0/SD_ILS:2321625
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Adams, Carlisle, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0672323915/?ar">https://go.oreilly.com/library-access/library/view/-/0672323915/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672323915/?ar">https://learning.oreilly.com/library/view/~/0672323915/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672323915">https://learning.oreilly.com/library/view/~/0672323915</a><br/>Format: Elektronik Kaynak<br/>
Protecting your web applications : solutions and strategies to combat cybersecurity threats
ent://SD_ILS/0/SD_ILS:2321166
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Sloper, Gary, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492052791">https://learning.oreilly.com/library/view/~/9781492052791</a>
<a href="https://learning.oreilly.com/library/view/~/9781492052791/?ar">https://learning.oreilly.com/library/view/~/9781492052791/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492052791/?ar">https://go.oreilly.com/library-access/library/view/-/9781492052791/?ar</a><br/>Format: Elektronik Kaynak<br/>
Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutions
ent://SD_ILS/0/SD_ILS:2314683
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Sharma, Himanshu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787121829">https://learning.oreilly.com/library/view/~/9781787121829</a>
<a href="https://learning.oreilly.com/library/view/~/9781787121829/?ar">https://learning.oreilly.com/library/view/~/9781787121829/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar">https://go.oreilly.com/library-access/library/view/-/9781787121829/?ar</a><br/>Format: Elektronik Kaynak<br/>
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory
ent://SD_ILS/0/SD_ILS:2306747
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Ligh, Michael Hale.<br/><a href="https://learning.oreilly.com/library/view/~/9781118824993/?ar">https://learning.oreilly.com/library/view/~/9781118824993/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118824993/?ar">https://go.oreilly.com/library-access/library/view/-/9781118824993/?ar</a><br/>Format: Elektronik Kaynak<br/>
Computer incident response and product security
ent://SD_ILS/0/SD_ILS:2291715
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Rajnovic, Damir, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9780132491518">https://learning.oreilly.com/library/view/~/9780132491518</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780132491518/?ar">https://go.oreilly.com/library-access/library/view/-/9780132491518/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132491518/?ar">https://learning.oreilly.com/library/view/~/9780132491518/?ar</a><br/>Format: Elektronik Kaynak<br/>
The Board's Role in Managing Cybersecurity Risks
ent://SD_ILS/0/SD_ILS:2320749
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Rothrock, Ray, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/53863MIT59221/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT59221/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT59221/?ar">https://learning.oreilly.com/library/view/~/53863MIT59221/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT59221">https://learning.oreilly.com/library/view/~/53863MIT59221</a><br/>Format: Elektronik Kaynak<br/>
Insider threat : protecting the enterprise from sabotage, spying, and theft
ent://SD_ILS/0/SD_ILS:2281991
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Cole, Eric.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490481">https://learning.oreilly.com/library/view/~/9781597490481</a>
<a href="https://www.sciencedirect.com/science/book/9781597490481">https://www.sciencedirect.com/science/book/9781597490481</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490481/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490481/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490481/?ar">https://learning.oreilly.com/library/view/~/9781597490481/?ar</a><br/>Format: Elektronik Kaynak<br/>
Hacking for dummies
ent://SD_ILS/0/SD_ILS:2282490
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Beaver, Kevin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470052358/?ar">https://go.oreilly.com/library-access/library/view/-/9780470052358/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470052358/?ar">https://learning.oreilly.com/library/view/~/9780470052358/?ar</a><br/>Format: Elektronik Kaynak<br/>
Advanced infrastructure penetration testing : defend your systems from methodized and proficient attackers
ent://SD_ILS/0/SD_ILS:2316089
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Chebbi, Chiheb, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788624480/?ar">https://go.oreilly.com/library-access/library/view/-/9781788624480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788624480/?ar">https://learning.oreilly.com/library/view/~/9781788624480/?ar</a><br/>Format: Elektronik Kaynak<br/>
CCNP Security Firewall 642-617 official cert guide
ent://SD_ILS/0/SD_ILS:2291846
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Hucaby, David.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132378635/?ar">https://go.oreilly.com/library-access/library/view/-/9780132378635/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132378635">https://learning.oreilly.com/library/view/~/9780132378635</a>
<a href="https://learning.oreilly.com/library/view/~/9780132378635/?ar">https://learning.oreilly.com/library/view/~/9780132378635/?ar</a><br/>Format: Elektronik Kaynak<br/>
The security culture playbook : an executive guide to reducing risk and developing your human defense layer
ent://SD_ILS/0/SD_ILS:2332410
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Carpenter, Perry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119875239/?ar">https://learning.oreilly.com/library/view/~/9781119875239/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119875239">https://learning.oreilly.com/library/view/~/9781119875239</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119875239/?ar">https://go.oreilly.com/library-access/library/view/-/9781119875239/?ar</a><br/>Format: Elektronik Kaynak<br/>
ISO27001 / ISO27002 : a pocket guide / Alan Calder.
ent://SD_ILS/0/SD_ILS:2299817
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Calder, Alan, 1957-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281669/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281669/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849285230/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285230/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281669/?ar">https://learning.oreilly.com/library/view/~/9781849281669/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849285230/?ar">https://learning.oreilly.com/library/view/~/9781849285230/?ar</a><br/>Format: Elektronik Kaynak<br/>
IoT penetration testing cookbook : identify vulnerabilities and secure your smart devices
ent://SD_ILS/0/SD_ILS:2315099
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Guzman, Aaron, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787280571/?ar">https://learning.oreilly.com/library/view/~/9781787280571/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781787280571">https://learning.oreilly.com/library/view/~/9781787280571</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787280571/?ar">https://go.oreilly.com/library-access/library/view/-/9781787280571/?ar</a><br/>Format: Elektronik Kaynak<br/>
Iris biometric model for secured network access
ent://SD_ILS/0/SD_ILS:2298466
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by El Khoury, Franjieh.<br/><a href="https://learning.oreilly.com/library/view/~/9781466502147/?ar">https://learning.oreilly.com/library/view/~/9781466502147/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466502147/?ar">https://go.oreilly.com/library-access/library/view/-/9781466502147/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466502147">https://learning.oreilly.com/library/view/~/9781466502147</a><br/>Format: Elektronik Kaynak<br/>
Botnets the killer web app
ent://SD_ILS/0/SD_ILS:340160
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Schiller, Craig A.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=184406">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=184406</a><br/>Format: Elektronik Kaynak<br/>
A study of black hole attack solutions : on AODV routing protocol in MANET
ent://SD_ILS/0/SD_ILS:2309038
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Fazeldehkordi, Elahe, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128053799/?ar">https://go.oreilly.com/library-access/library/view/-/9780128053799/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128053799/?ar">https://learning.oreilly.com/library/view/~/9780128053799/?ar</a><br/>Format: Elektronik Kaynak<br/>
Cybersecurity : managing systems, conducting testing, and investigating intrusions
ent://SD_ILS/0/SD_ILS:2301524
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Mowbray, Thomas J.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118697115/?ar">https://go.oreilly.com/library-access/library/view/-/9781118697115/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118697115/?ar">https://learning.oreilly.com/library/view/~/9781118697115/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118697115">https://learning.oreilly.com/library/view/~/9781118697115</a><br/>Format: Elektronik Kaynak<br/>
Router security strategies : securing IP network traffic planes
ent://SD_ILS/0/SD_ILS:2285614
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Schudel, Gregg.<br/><a href="https://learning.oreilly.com/library/view/~/9781587053368">https://learning.oreilly.com/library/view/~/9781587053368</a>
<a href="https://learning.oreilly.com/library/view/~/9781587053368/?ar">https://learning.oreilly.com/library/view/~/9781587053368/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781587053368/?ar">https://go.oreilly.com/library-access/library/view/-/9781587053368/?ar</a><br/>Format: Elektronik Kaynak<br/>
Best Practices for the Formal Software Testing Process : a Menu of Testing Tasks
ent://SD_ILS/0/SD_ILS:2320691
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Drabick, Rodger, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780133489309/?ar">https://go.oreilly.com/library-access/library/view/-/9780133489309/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133489309/?ar">https://learning.oreilly.com/library/view/~/9780133489309/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133489309">https://learning.oreilly.com/library/view/~/9780133489309</a><br/>Format: Elektronik Kaynak<br/>
The Prompt Payment Act Answer Book
ent://SD_ILS/0/SD_ILS:2315263
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Arnold, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781567263336">https://learning.oreilly.com/library/view/~/9781567263336</a>
<a href="https://learning.oreilly.com/library/view/~/9781567263336/?ar">https://learning.oreilly.com/library/view/~/9781567263336/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781567263336/?ar">https://go.oreilly.com/library-access/library/view/-/9781567263336/?ar</a><br/>Format: Elektronik Kaynak<br/>
The Antideficiency Act Answer Book
ent://SD_ILS/0/SD_ILS:2315273
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Arnold, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781567263343/?ar">https://learning.oreilly.com/library/view/~/9781567263343/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781567263343">https://learning.oreilly.com/library/view/~/9781567263343</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781567263343/?ar">https://go.oreilly.com/library-access/library/view/-/9781567263343/?ar</a><br/>Format: Elektronik Kaynak<br/>
Information theft prevention : theory and practice
ent://SD_ILS/0/SD_ILS:2315550
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Okeke, Romanus Izuchukwu, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781317553700/?ar">https://learning.oreilly.com/library/view/~/9781317553700/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781317553700/?ar">https://go.oreilly.com/library-access/library/view/-/9781317553700/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781317553700">https://learning.oreilly.com/library/view/~/9781317553700</a><br/>Format: Elektronik Kaynak<br/>
Hacking point of sale : payment application secrets, threats, and solutions
ent://SD_ILS/0/SD_ILS:2302623
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Gomzin, Slava, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118810071/?ar">https://learning.oreilly.com/library/view/~/9781118810071/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118810071/?ar">https://go.oreilly.com/library-access/library/view/-/9781118810071/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118810071">https://learning.oreilly.com/library/view/~/9781118810071</a><br/>Format: Elektronik Kaynak<br/>
Web commerce security : design and development
ent://SD_ILS/0/SD_ILS:2292686
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Nahari, Hadi.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470624463/?ar">https://go.oreilly.com/library-access/library/view/-/9780470624463/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470624463/?ar">https://learning.oreilly.com/library/view/~/9780470624463/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470624463">https://learning.oreilly.com/library/view/~/9780470624463</a><br/>Format: Elektronik Kaynak<br/>
Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership
ent://SD_ILS/0/SD_ILS:2323589
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643777/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643777/?ar">https://learning.oreilly.com/library/view/~/9781119643777/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643777">https://learning.oreilly.com/library/view/~/9781119643777</a><br/>Format: Elektronik Kaynak<br/>
Building a pentesting lab for wireless networks : build your own secure enterprise or home penetration testing lab to dig into the various hacking techniques
ent://SD_ILS/0/SD_ILS:2310274
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Fadyushin, Vyacheslav, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785283154">https://learning.oreilly.com/library/view/~/9781785283154</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785283154/?ar">https://go.oreilly.com/library-access/library/view/-/9781785283154/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785283154/?ar">https://learning.oreilly.com/library/view/~/9781785283154/?ar</a><br/>Format: Elektronik Kaynak<br/>
Learning network forensics : identify and safeguard your network against both internal and external threats, hackers, and malware attacks
ent://SD_ILS/0/SD_ILS:2310121
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Datt, Samir, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781782174905/?ar">https://go.oreilly.com/library-access/library/view/-/9781782174905/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781782174905/?ar">https://learning.oreilly.com/library/view/~/9781782174905/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781782174905">https://learning.oreilly.com/library/view/~/9781782174905</a><br/>Format: Elektronik Kaynak<br/>
Network security tools
ent://SD_ILS/0/SD_ILS:2282158
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Clarke, Justin.<br/><a href="https://learning.oreilly.com/library/view/~/0596007949">https://learning.oreilly.com/library/view/~/0596007949</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596007949/?ar">https://go.oreilly.com/library-access/library/view/-/0596007949/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596007949/?ar">https://learning.oreilly.com/library/view/~/0596007949/?ar</a><br/>Format: Elektronik Kaynak<br/>
Security threat mitigation and response : understanding Cisco security MARS
ent://SD_ILS/0/SD_ILS:2282999
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Tesch, Dale.<br/><a href="https://learning.oreilly.com/library/view/~/1587052601">https://learning.oreilly.com/library/view/~/1587052601</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1587052601/?ar">https://go.oreilly.com/library-access/library/view/-/1587052601/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587052601/?ar">https://learning.oreilly.com/library/view/~/1587052601/?ar</a><br/>Format: Elektronik Kaynak<br/>
The basics of web hacking : tools and techniques to attack the web
ent://SD_ILS/0/SD_ILS:2300058
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Pauli, Joshua J.<br/><a href="https://learning.oreilly.com/library/view/~/9780124166004/?ar">https://learning.oreilly.com/library/view/~/9780124166004/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124166004/?ar">https://go.oreilly.com/library-access/library/view/-/9780124166004/?ar</a><br/>Format: Elektronik Kaynak<br/>
Dissecting the hack : the f0rb1dd3n network
ent://SD_ILS/0/SD_ILS:2290700
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Street, Jayson E.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495684/?ar">https://learning.oreilly.com/library/view/~/9781597495684/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495684/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495684/?ar</a><br/>Format: Elektronik Kaynak<br/>
Python : penetration testing for developers : unleash the power of Python scripting to execute effective and efficient penetration tests : a course in three modules
ent://SD_ILS/0/SD_ILS:2311849
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Duffy, Christopher, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787128187">https://learning.oreilly.com/library/view/~/9781787128187</a>
<a href="https://learning.oreilly.com/library/view/~/9781787128187/?ar">https://learning.oreilly.com/library/view/~/9781787128187/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787128187/?ar">https://go.oreilly.com/library-access/library/view/-/9781787128187/?ar</a><br/>Format: Elektronik Kaynak<br/>
Practical internet of things security : a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world
ent://SD_ILS/0/SD_ILS:2311027
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Russell, Brian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785889639">https://learning.oreilly.com/library/view/~/9781785889639</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785889639/?ar">https://go.oreilly.com/library-access/library/view/-/9781785889639/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785889639/?ar">https://learning.oreilly.com/library/view/~/9781785889639/?ar</a><br/>Format: Elektronik Kaynak<br/>
Thinking security : stopping next year's hackers
ent://SD_ILS/0/SD_ILS:2308932
2024-09-23T23:30:21Z
2024-09-23T23:30:21Z
by Bellovin, Steven M., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134278223/?ar">https://go.oreilly.com/library-access/library/view/-/9780134278223/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134278223">https://learning.oreilly.com/library/view/~/9780134278223</a>
<a href="https://learning.oreilly.com/library/view/~/9780134278223/?ar">https://learning.oreilly.com/library/view/~/9780134278223/?ar</a><br/>Format: Elektronik Kaynak<br/>