Call Number (LC) | Title | Results |
---|---|---|
TK5105.59 |
Securing the future : introduction to zero trust in cybersecurity / The zero trust framework and privileged access management (PAM) / Use Terraform to install and configure Vault / Use Vault as an OIDC identity provider / Implement secret caching using Vault Agent / Zero Trust Sicherheit : ein Leitfaden für Unternehmen / CISSP cert guide / WEB SECURITY : a whitehat perspective. Set up an internal CA using PKI secrets engine in Vault / Cybersecurity essentials : practical tools for today's digital defenders / Making Sense of Cybersecurity / O'Reilly Security Conference 2017, New York, NY. Secrets management with Terraform / Learn ethical hacking from scratch / AWS Cloud Practitioner exam prep course 2021. CCIE security v4.0 : (video training) / Security for software defined networks : networking talks / Designing a Machine Learning Intrusion Detection System : Defend Your Network from Cybersecurity Threats / Single sign-on and passwordless authentication : an overview. Preparing and exploring security data for machine learning. Certified information security manager (CISM). Palo Alto Networks cybersecurity fundamentals (PCCSA). Intro to IoT pentesting. Exam MS-100 Microsoft 365 identity and services. IMPLEMENTING PALO ALTO PRISMA ACCESS learn real world network protection with Prima Access / The ultimate Kali Linux book : harness Nmap, Metaspolit, Aircrack-ng, and Empire for cutting-edge pentesting / DATA GOVERNANCE HANDBOOK a practical approach to building trust in data / Advances in cyber security and intelligent analytics Run HashiCorp Vault in a Docker container / Cryptography and network security / Use HashiCorp Vault UI for a seamless and intuitive experience / Implement RBAC in Vault / Use KV secrets engine for secrets versioning / The zero trust framework. CompTIA security+ SY0-701. Use certificates for authenticating to HashiCorp Vault / Cryptography and network security : principles and practice / Run Vault in HA mode for enhanced performance / Enterprise level security 1 & 2 / RESTful Java Web Services Security / Cyber arms : security in cyberspace / Cross-site scripting attacks : classification, attack, and countermeasures / Security Log Management : Identifying Patterns in the Chaos. DEFENSE AGAINST THE BLACK ARTS : how hackers do what they do and how to protect against it. Microsoft forefront identity manager 2010 R2 handbook : a complete handbook on FIM 2010 R2 covering both identity and certificate management / ZERO-TRUST - AN INTRODUCTION (ISC)² SSCP Systems Security Certified Practitioner : official practice tests / PfSense 2.x cookbook : manage and maintain your network using pfSense / CCSP Self-Study : Securing Cisco IOS Networks (SECUR). Cisco ISE for BYOD and secure unified access / Network and data security for non-engineers / Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurity / The pentester blueprint : starting a career as an ethical hacker / Cryptography for security and privacy in cloud computing / Beautiful security / Security and privacy in cyber-physical systems : foundations, principles, and applications / Security intelligence : a practitioner's guide to solving enterprise security challenges / What every engineer should know about cyber security and digital forensics / The second economy : the race for trust, treasure and time in the cybersecurity war / Penetration testing : a complete pentesting guide facilitating smooth backtracking for working hackers : a course in three modules. Building virtual pentesting labs for advanced penetration testing : learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it / Manage machine access to secrets with AppRole in HashiCorp Vault / Grokking web application security. Applied network security : master the art of detecting and averting advanced network security attacks and techniques / Human-computer interaction and cybersecurity handbook / Windows Forensics and Incident Recovery. Network and system security / Web application security : exploitation and countermeasures for modern web applications / Cyberpatterns : unifying design patterns with security and attack patterns / Cybersecurity in digital transformation : scope and applications / Advanced ASP.NET Core 3 Security : understanding hacks, attacks, and vulnerabilities to secure your website / Network Security Strategies Protect Your Network and Enterprise Against Advanced Cybersecurity Attacks and Threats. Decision and game theory for security first international conference, GameSec 2010, Berlin, Germany, November 22-23, 2010 : proceedings / 802.1X port-based authentication Implementing DirectAccess with Windows Server 2016 / How to define and build an effective cyber threat intelligence capability / The Best Damn Firewall Book Period. Guide to computer network security / Hacker culture A to Z : a fun guide to the people, ideas, and gadgets that made the tech world / Network hardening : an automated approach to improving network security / Network security, firewalls, and VPNs / Einstieg in ethical hacking : penetration testing und hacking-tools für die IT-security / Hacking : der umfassende Praxis-Guide : inkl. Prüfungsvorbereitung zum CEHv12 / Risks and security of internet and systems : 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised selected papers / Introduction to the cyber ranges / Cyber security. Simply. Make it happen. : leveraging digitization through IT security / Einstieg in Kali Linux : penetration testing und ethical hacking mit Linux / Applied cryptography and network security workshops : ACNS 2023 satellite workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, proceedings / Machine learning for computer and cyber security : principles, algorithms, and practices / Information security technologies in the decentralized distributed networks / Network and system security : 8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014, Proceedings / Automated firewall analytics : design, configuration and optimization / Lean Six Sigma : green belt. Managing Trust in Cyberspace. LLM security workshop : tackling OWASP's top 10 risks head-on. Safe performance in a world of global networks : case studies, collaborative practices and governance principles / Foundations of security analysis and design VIII : FOSAD 2014/2015/2016 tutorial lectures / Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies / Information systems security and privacy : second International Conference, ICISSP 2016, Rome, Italy, February 19-21, 2016, Revised selected papers / Hardware IP security and trust / Learning path : Networking for sysadmins. Introduction to machine learning with applications in information security / Safety of web applications : risks, encryption and handling vulnerabilities with PHP / Understand, manage, and measure cyber risk : practical solutions for creating a sustainable cyber program / The O'Reilly Security Conference, New York, NY, 2016. O'Reilly Security Conference 2016, Amsterdam, Netherlands. Digital forensics for pentesters : hands-on learning. Cyber secure coder (CSC-110). Open source intelligence (OSINT) for beginners : a methodological approach for social engineering and beyond. CISA : Certified Information Systems Auditor / Systems Security Certified Practitioner. Cybersecurity career guide / CCNP and CCIE Security Core SCOR 350-701 : (Exam blueprint 1.1) / Thread modeling fundamentals : debug your security design through whiteboard hacking. pfSense 2.4.4 : open source firewall. Grokking web application security / CompTIA Security+ practice tests : exam SY0-701 / Use AWS KMS to auto-unseal Vault / The OSINT Handbook A Practical Guide to Gathering and Analyzing Online Information / Run HashiCorp Vault with Helm / Use HashiCorp Vault to manage access to your secrets / End user security awareness. Linux security techniques. CIBERSEGURIDAD PARA DIRECTIVOS riesgos, control y eficiencia de las tecnologías de la informacion / Reverse engineering and exploit development : application penetration testing for security professionals / Network performance and security : testing and analyzing using open source and low-cost tools / Cybersecurity essentials / CISA - Certified Information Systems Auditor Study Guide : Aligned with the CISA Review Manual 2019 to help you audit monitor, and assess information systems. The Modern Security Operations Center / Beyond Spectre : confronting new technical and policy challenges ; proceedings of a workshop / Implementing Cisco network security, Cybersecurity for executives : a practical guide / Zero Trust security : an enterprise guide / Web ying yong cheng xu an quan = Web application security / Dream! Hack! Build! unleash citizen-driven innovation with the power of hackathons / Hands-On Ethical Hacking Tactics Strategies, Tools, and Techniques for Effective Cyber Defense / Adversary emulation with MITRE ATT&CK : bridging the gap between the red and blue teams / Cyber smart : five habits to protect your family, money, and identity from cyber criminals / Understanding microservice security. Zero trust architecture / ASP.NET Core Security / Zero trust networks : building secure systems in untrusted networks / Introduction to network security : theory and practice / Sécurité informatique : principes et méthodes / The defender's dilemma : charting a course toward cybersecurity / Building a pentesting lab for wireless networks : build your own secure enterprise or home penetration testing lab to dig into the various hacking techniques / Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually / ASP.NET Core security. Network Security JumpStart : Computer and Network Security Basics. Cyber security and resiliency policy framework / How to hack like a ghost / Web application firewalls : securing modern web applications / Network security through data analysis : from data to action / Linux® hardening in hostile networks : server security from TLS to TOR / What is design thinking? / Mastering pfSense : manage, secure, and monitor your on-premise and cloud network with pfSense 2.4 / CCNA cybersecurity operations companion guide / The little book of website quality control / Data breaches : crisis and opportunity / Protecting your web applications : solutions and strategies to combat cybersecurity threats / Cybersecurity of industrial systems / SSCP (Systems Security Certified Practitioner) / The current security threat landscape. Docker security : using containers safely in production / Proactive early threat detection and securing Oracle Database with IBM QRadar, IBM Security Guardium Database Protection, and IBM Copy Services Manager by using IBM FlashSystem Safeguarded Copy / Exam Ref SC-300 Microsoft Identity and Access Administrator / Zero trust networks : building secure systems in untrusted network / CCNP and CCIE Security Core SCOR 350-701 exam cram / Cybersecurity lexicon / Targeted cyber attacks : multi-staged attacks driven by exploits and malware / Digital resilience : is your company ready for the next cyber threat? / Schneier on Security / CCNP Security Cisco Firepower SNCF 300-710 / Advanced monitoring in P2P botnets a dual perspective / Security and the networked society Web security for developers real threats, practical defense / SDN and NFV security : security analysis of software-defined networking and network function virtualization / Bug bounty hunting for web security : find and exploit vulnerabilities in web sites and applications / All-in-one CASP+ CompTIA advanced security practitioner certification exam guide : (exam CAS-003) / CompTIA PenTest+ certification practice exams (exam PT0-001) / Quick start guide to penetration testing : with NMAP, OpenVAS and Metasploit / CompTIA PenTest+ certification all-in-one exam guide (exam PT0-001) / Cyber guerilla / Eleventh Hour CISSP® Practical deployment of Cisco Identity Services Engine (ISE) : real-world examples of AAA deployments / The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory / Anomaly detection principles and algorithms / Network security metrics / Socio-technical aspects in security and trust : 9th International Workshop, STAST 2019, Luxembourg City, Luxembourg, September 26, 2019, Revised selected papers / Dynamic games for network security / CompTIA advanced security practitioner : (CASP+) CAS-004 cert guide / Data protection officer / Big data technologies for monitoring of computer security a case study of the Russian Federation / Proceedings of International Conference on Network Security and Blockchain Technology ICNSBT 2021 / Decision and game theory for security : 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings / Cloud Security and Governance : Who's on your cloud?. Hacking exposed 7 : network security secrets & solutions / Information systems security and privacy : third International Conference, ICISSP 2017, Porto, Portugal, February 19-21, 2017, Revised selected papers / OPNsense Beginner to Professional : Protect Networks and Build Next-Generation Firewalls Easily with OPNsense / Guide to vulnerability analysis for computer networks and systems : an artificial intelligence approach / Security management of next generation telecommunications networks and services / Securing microservices with Istio Service Mesh / Microsoft identity and access administrator exam guide : implement IAM solutions with Azure AD, build an identity governance strategy, and pass the SC-300 exam / Hacking exposed : mobile security secrets & solutions / Early threat detection and safeguarding data with IBM QRadar and IBM Copy Services Manager on IBM DS8000 / The Foundations of Threat Hunting : Organize and Design Effective Cyber Threat Hunts to Meet Business Needs. CRISC CERTIFIED IN RISK AND INFORMATION SYSTEMS CONTROL ALL-IN-ONE EXAM GUIDE How to Start Your Own Cybersecurity Consulting Business First-Hand Lessons from a Burned-Out Ex-CISO. Distributed denial of service attack and defense / Cybersecurity : geopolitics, law, and policy / Why don't we defend better? : data breaches, risk management, and public policy / Five technological forces disrupting security : how cloud, social, mobile, big data and IoT are transforming physical security in the digital age / Cybersecurity fundamentals : a real-world perspective / Resilience and risk : methods and application in environment, cyber and social domains / The ultimate Kali Linux book : perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire / CompTIA Security+ study guide : exam SY0-701 / Emerging secure networks, blockchains and smart contract technologies / Testing and securing web applications / Security+® practice tests : prepare for, practice, and pass the CompTIA Security+ exam / Cisco firewall : video mentor / SSCP video course / SSCP video course. What is a zero trust network? / What are the common challenges to adopting a zero trust network model? / Design, culture, and transformation : design thinking at IBM / Cisco Firepower Threat Defense (FTD) : configuration and troubleshooting best practices for the Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Advanced Malware Protection (AMP) / Security from first principles : a practical guide to the information security practice principles / Web security : common vulnerabilities and their mitigation / Learn pfSense 2.4 : get up and running with pfSense and all the core concepts to build firewall and routing solutions / Learn ethical hacking from scratch : your stepping stone to penetration testing / Network vulnerability assessment : identify security loopholes in your network's infrastructure / IBM QRadar Version 7.3 : planning and installation guide / The art of hacking : self paced traning kit for cyber security professionals / CCSP official (ISC)2 practice tests / Learn website hacking : penetration testing from scratch / Practical network scanning : capture network vulnerabilities using standard tools such as Nmap and Nessus / WiFi hacking : wireless penetration testing for beginners / Learning network penetration testing with Kali Linux / Web application security is a stack : how to CYA (cover your apps) completely / Preparing for a network incident / Mastering Kali Linux wireless pentesting : test your wireless network's security and master advanced wireless penetration techniques using Kali Linux / Learning network forensics : identify and safeguard your network against both internal and external threats, hackers, and malware attacks / SolarWinds server & application monitor : deployment and administration : an intuitive guide to implementing and calibrating SolarWinds Server & Application Monitor with minimum hassle / How to defeat advanced malware : new tools for protection and forensics / Cisco ASA 5500-X series next-generation firewalls : LiveLessons / Python passive network mapping : P2NMAP / What should go on the internet : privacy, freedom, and security online / CCNA security live lessons : a hands-on guide to implementing security on Cisco routers and switches. CompTIA security+ (SYO-401) : complete video course / IoT penetration testing cookbook : identify vulnerabilities and secure your smart devices / Cisco Intelligent WAN (IWAN) / Bio-inspiring cyber security and cloud services : trends and innovations / Pentesting fundamentals for beginners. Node web applications and how to use NPM. Network security : private communications in a public world / How to hack like a legend : breaking windows / Intelligent, secure, and dependable systems in distributed and cloud environments : second International Conference, ISDDC 2018, Vancouver, BC, Canada, November 28-30, 2018, Proceedings / Recent trends in computer networks and distributed systems security : second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014, Proceedings / (SSCP) Systems Security Certified Practitioner. Risks and security of internet and systems : 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised selected papers / Unsupervised machine learning in security applications. Supervised machine learning in security applications. Governing operational decisions in an enterprise scalable way / Penetration testing bootcamp : quickly get up and running with pentesting techniques / Network forensics / Foundations of security analysis and design VII : FOSAD 2012/2013 tutorial lectures / Practical intranet security : overview of the state of the art and available technologies / Learning digital identity : design, deploy, and manage identity architectures / CISM Certified Information Security Manager practice exams / Cyberwarfare : threats to critical infrastructure / Making sense of cybersecurity / Security and privacy in mobile social networks / Cybersecurity blue team strategies : uncover the secrets of blue teams to combat cyber threats in your organization / Exploring the security landscape : non-traditional security challenges / A study of black hole attack solutions : on AODV routing protocol in MANET / Thinking security : stopping next year's hackers / Cisco FirePOWER and Advanced Malware Protection : LiveLessons / Microsoft Identity Manager 2016 handbook : a complete handbook on Microsoft Identity Manager 2016--from design considerations to operational best practices / DevOpsSec : securing software through continuous delivery / Zabbix network monitoring : gather detailed statistics and data while monitoring the performance and availability of network devices and applications using the all-new Zabbix 3.0 / Understanding the Cisco ASA firewall : learning to install, configure, and manage Cisco firewalls and advanced VPN solutions / International Joint Conference : 12th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2019) and 10th International Conference on EUropean Transnational Education (ICEUTE 2019) : Seville, Spain, May 13th-15th, 2019 : proceedings / Introduction to US cybersecurity careers / Security for cloud storage systems MICROSOFT DEFENDER FOR ENDPOINT IN-DEPTH take any organization's endpoint security to the next level / Research in attacks, intrusions and defenses : 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings / Security and privacy in cyberspace / Offensive hacking unfolded. Check Point firewall administration R81. 10+ : a practical guide to Check Point Firewall deployment and administration / Security, privacy and reliability in computer communications and networks / Linux security and hardening : the practical security guide / Optical Networks : Architecture and Survivability / CRISC certified in risk and information systems control all-in-one exam guide / SSCP systems security certified practitioner : all-in-one exam guide / Intentional risk management through complex networks analysis / Information systems security and privacy : first International Conference, ICISSP 2015, Angers, France, February 9-11, 2015, revised selected papers / Disseminating Security Updates at Internet Scale Risks and security of internet and systems : 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised selected papers / Security technology convergence insights / How to define and build an effective cyber threat intelligence capability Intrusion detection a data mining approach / Secure Networking CQRE [Secure] 99 : International Exhibition and Congress D sseldorf, Germany, November 30 December 2, 1999 Proceedings / Open problems in network security : IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised selected papers / Security in network coding / Simplify management of security and compliance with IBM PowerSC in cloud and virtualized environments / SSCP systems security certified practitioner practice exams / Operationalizing the data lake : building and extracting value from data lakes with a cloud-native data platform / Network and system security Introduction to US cybersecurity careers Sicherheit in Kommunikationsnetzen. Automated security management / Socio-technical aspects in security 11th international workshop, STAST 2021, virtual event, Ocotber 8, 2021, revised selected papers / CCNP and CCIE security core SCOR 350-701 official cert guide / Building a career in cybersecurity : the strategy and skills you need to succeed / AI, machine learning and deep learning : a security perspective / ISSE 2013 securing electronic business processes : highlights of the Information Security Solutions Europe 2013 Conference / Counterintelligence in a Cyber World Identification of pathogenic social media accounts from data to intelligence to prediction / Eleventh hour CISSP® study guide / Encrypted network traffic analysis / The cyber security network guide / Output regulation and cybersecurity of networked switched systems / Privacy preservation in distributed systems : algorithms and applications / Cryptology and network security with machine learning : proceedings of ICCNSML 2022 / Detection of intrusions and malware, and vulnerability assessment : 20th International Conference, DIMVA 2023, Hamburg, Germany, July 12-14, 2023, proceedings / Security and privacy in communication networks : 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings / The hack is back : techniques to beat hackers at their own games / Container security : fundamental technology concepts that protect containerized applications / Information fusion for cyber-security analytics / Recent advances in systems safety and security / Cybersecurity for executives a practical guide / Network security empowered by artificial intelligence / Building a practical information security program Proceedings of International Conference on Network Security and Blockchain Technology : ICNSBT 2023 / Guide to computer network security Certified incident handler (ECIH) v2. Understanding cybersecurity technologies : a guide to selecting the right cybersecurity tools / Cisco cyberops associate CBROPS 200-201 official cert guide / Enterprise software security : a confluence of disciplines / Cisco next-generation security solutions : all-in-one Cisco ASA FirePOWER services, NGIPS, and AMP / Network security with NetFlow and IPFIX : big data analytics for information security / Trustworthy cyber-physical systems engineering / Theory and models for cyber situation awareness / CISO compass : navigating cybersecurity leadership challenges with insights from pioneers / What every engineer should know about cyber security and digital forensics Cisco security professional's guide to secure intrusion detection systems / 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020) Understanding network hacks : attack and defense with Python 3 / CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide / CompTIA Security+ (SY0-501) : complete video course / Teaching cybersecurity : a handbook for teaching the cybersecurity body of knowledge in a conventional classroom / Assessing information security : strategies, tactics, logic and framework / Security and frontend performance : breaking the conundrum / Network traffic anomaly detection and prevention : concepts, techniques, and tools / CISSP exam cram / Implementing identity management on AWS : a real-world guide to solving customer and workforce IAM challenges in your AWS cloud environments / Zabbix 4 network monitoring : monitor the performance of your network devices and applications using the all-new Zabbix 4.0 / Securing network infrastructure : discover practical network security with Nmap and Nessus 7 / In zero trust we trust : a practical guide to adopting zero trust architectures / IBM z/OS V1R12 Communications Server TCP/IP implementation. Network protocols for security professionals : probe and identify network-based vulnerabilities and safeguard against network protocol breaches / Aspects of Network and Information Security. Communication System Security / Web Hacking : Attacks and Defense. Intelligent, secure, and dependable systems in distributed and cloud environments : first International Conference, ISDDC 2017, Vancouver, BC, Canada, October 26-28, 2017, proceedings / SC-300 : Microsoft Identity and Access Administrator. Cybersecurity : a practical engineering approach / Cyber resilient infrastructure : detect, protect, and mitigate threats against Brocade SAN FOS with IBM QRadar / Kerberos : Single Sign-on in gemischten Linux/Windows-Umgebungen. Google xi tong jia gou jie mi : gou jian an quan ke kao de xi tong = Building secure and reliable systems / Cybersecurity public policy : SWOT analysis conducted on 43 countries / Transactions on large-scale data- and knowledge-centered systems XXXVI / Cybersecurity and human rights in the age of cyberveillance / HIGH-TECH CRIMES REVEALED : CYBERWAR STORIES FROM THE DIGITAL FRONT / Modernizing cybersecurity operations with machine intelligence : advanced threat detection, hunting, and analysis / What are the advantages and disadvantages of a zero trust model? / Privacy-enhancing aggregation techniques for smart grid communications / Threat modeling with Owasp Threat Dragon & risk rating a vulnerability. Learn hacking Windows 10 using Metasploit from scratch. Cybersecurity for small business : a practical guide to securing your business. The zero trust framework : threat hunting & quantum mechanics / Aligning security operations with the MITRE ATT&CK framework : level up your security operations center for better security / Cyber deception techniques, strategies, and human aspects / CISSP Cert Guide, 3rd Edition / Cyber Arms: Security in Cyberspace. What every engineer should know about cyber security and digital forensics. Data governance / The security data lake : leveraging big data technologies to build a common data repository for security / Threat hunting : a guide to proactive network defense / CISSP Exam Cram, Second Edition / CISSP Practice Questions Exam Cram, Second Edition / CISSP Exam Cram, Third Edition / CISSP Cert Guide / How to study for CISSP certification : tips, materials, and approach / CISSP crash course / Information security : 25th International Conference, ISC 2022, Bali, Indonesia, December 18-22, 2022 : proceedings / CISSP Domain 2 : access control : video course / Space-air-ground integrated network security / SSCP systems security certified practitioner : exam guide / Ethical hacking and CompTIA PenTest+ exam prep (PT0-001) / Hands-on pfSense 2.x for firewalls and routers / Security in computing and communications : second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings / Information security : 26th international conference, ISC 2023, Groningen, the Netherlands, November 15-17, 2023, proceedings / CISA : Certified Information Systems Auditor study guide : achieve CISA certification with practical examples and over 850 exam-oriented practice questions / Network defense and countermeasures : principles and practices / CCNP and CCIE collaboration core CLCOR 350-801 official cert guide / Cybersecurity threats and vulnerabilities : NICE framework work roles for K0005. Building a career in cybersecurity. CEH V12 CERTIFIED ETHICAL HACKER STUDY GUIDE includes interactive online learning environment and study tools : 750 practice questions, 100 electronic flashcards, searchable key term glossary / Computer network security / Official (ISC)2 guide to the CISSP CBK / How I rob banks : (and other such places) / Practical Threat Detection Engineering A Hands-On Guide to Planning, Developing, and Validating Detection Capabilities / BUILDING NEXT-GEN SOC WITH IBM QRADAR accelerate your security operations and detect cyber threats effectively / Sekyua de shinraisei no aru shisutemu kōchiku : Google SRE ga kangaeru anzen na shisutemu no sekkei, jissō, hoshu / Information security handbook : enhance your proficiency in information security program development / How I rob banks / Configuring Sonicwall Firewalls. HACKER CULTURE A TO Z a fun guide to the people, ideas, and gadgets that made the tech world / Implement dynamic policies in Vault / Seguridad de las aplicaciones web : explotación y contramedidas para aplicaciones web modernas / Emerging trends in intelligent systems & network security / Communications and multimedia security 11th IFIP TC 6/TC 11 international conference, CMS 2010, Linz, Austria, May 31-June 2, 2010 : proceedings / International Joint Conference : CISIS'15 and ICEUTE'15 / Data security blueprints : a practical guide to data security workflows and implementation / IDS AND IPS WITH SNORT 3.0 get up and running with Snort 3.0 and discover effective solutions to your security issues / Integrate CI/CD pipelines with Vault / |
519 |
TK5105.59 .A23 2011 | Scalability rules : 50 principles for scaling Web sites / | 1 |
TK5105.59 A235 2020 | Cyber Arms : Security in Cyberspace. | 1 |
TK5105.59 .A243 2021 | Cryptography and Network Security : An Introduction / | 1 |
TK5105.59 .A25 2012 | Advances in computing and information technology proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India. | 1 |
TK5105.59 .A26 | Proceedings - ACM SIGSAC New Security Paradigms Workshop ; Sponsored by Association for Computing Machinery Special Interest Group on Security, Audit, and Control [and others] | 1 |
TK5105.59 .A33 2013 | Modeling trust context in networks | 1 |
TK5105.59 .A37 2016 | Dynamic networks and cyber-security / | 1 |
TK5105.59 .A38 2022 | Advancing computational intelligence techniques for security systems design / | 2 |
TK5105.59 .A38226 2023 | Advances in cyber security and intelligent analytics / | 2 |
TK5105.59 .A384 2013eb | Puppet 3 cookbook : build reliable, scalable, secure, and high-performance systems to fully utilize the power of cloud computing / | 1 |
TK5105.59 .A385 2017eb | Security Automation with Ansible 2 / | 1 |
TK5105.59 .A3863 2014 | Information security and IT risk management / | 1 |
TK5105.59 .A39 1996 | Network and Internet security / | 2 |
TK5105.59 .A393 2014 | The Browser Hacker's Handbook / | 3 |
TK5105.59 .A45 2011eb | Network security : a decision and game-theoretic approach / | 3 |
TK5105.59 .A54 2007 | Security for wireless ad hoc networks / | 1 |
TK5105.59 .A54 2007eb | Security for wireless ad hoc networks | 1 |
TK5105.59 -- A73 2005eb | Nessus, Snort, & Ethereal Power Tools : Customizing Open Source Security Applications. | 1 |
TK5105.59 .A734 2005eb |
Nessus, Snort, & Ethereal power tools : customizing open source security applications / Nessus, Snort, & Ethereal power tools customizing open source security applications / |
3 |