Call Number (LC) Title Results
TK5105.59 Securing the future : introduction to zero trust in cybersecurity /
The zero trust framework and privileged access management (PAM) /
Use Terraform to install and configure Vault /
Use Vault as an OIDC identity provider /
Implement secret caching using Vault Agent /
Zero Trust Sicherheit : ein Leitfaden für Unternehmen /
CISSP cert guide /
WEB SECURITY : a whitehat perspective.
Set up an internal CA using PKI secrets engine in Vault /
Cybersecurity essentials : practical tools for today's digital defenders /
Making Sense of Cybersecurity /
O'Reilly Security Conference 2017, New York, NY.
Secrets management with Terraform /
Learn ethical hacking from scratch /
AWS Cloud Practitioner exam prep course 2021.
CCIE security v4.0 : (video training) /
Security for software defined networks : networking talks /
Designing a Machine Learning Intrusion Detection System : Defend Your Network from Cybersecurity Threats /
Single sign-on and passwordless authentication : an overview.
Preparing and exploring security data for machine learning.
Certified information security manager (CISM).
Palo Alto Networks cybersecurity fundamentals (PCCSA).
Intro to IoT pentesting.
Exam MS-100 Microsoft 365 identity and services.
IMPLEMENTING PALO ALTO PRISMA ACCESS learn real world network protection with Prima Access /
The ultimate Kali Linux book : harness Nmap, Metaspolit, Aircrack-ng, and Empire for cutting-edge pentesting /
DATA GOVERNANCE HANDBOOK a practical approach to building trust in data /
Advances in cyber security and intelligent analytics
Run HashiCorp Vault in a Docker container /
Cryptography and network security /
Use HashiCorp Vault UI for a seamless and intuitive experience /
Implement RBAC in Vault /
Use KV secrets engine for secrets versioning /
The zero trust framework.
CompTIA security+ SY0-701.
Use certificates for authenticating to HashiCorp Vault /
Cryptography and network security : principles and practice /
Run Vault in HA mode for enhanced performance /
Enterprise level security 1 & 2 /
RESTful Java Web Services Security /
Cyber arms : security in cyberspace /
Cross-site scripting attacks : classification, attack, and countermeasures /
Security Log Management : Identifying Patterns in the Chaos.
DEFENSE AGAINST THE BLACK ARTS : how hackers do what they do and how to protect against it.
Microsoft forefront identity manager 2010 R2 handbook : a complete handbook on FIM 2010 R2 covering both identity and certificate management /
ZERO-TRUST - AN INTRODUCTION
(ISC)² SSCP Systems Security Certified Practitioner : official practice tests /
PfSense 2.x cookbook : manage and maintain your network using pfSense /
CCSP Self-Study : Securing Cisco IOS Networks (SECUR).
Cisco ISE for BYOD and secure unified access /
Network and data security for non-engineers /
Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurity /
The pentester blueprint : starting a career as an ethical hacker /
Cryptography for security and privacy in cloud computing /
Beautiful security /
Security and privacy in cyber-physical systems : foundations, principles, and applications /
Security intelligence : a practitioner's guide to solving enterprise security challenges /
What every engineer should know about cyber security and digital forensics /
The second economy : the race for trust, treasure and time in the cybersecurity war /
Penetration testing : a complete pentesting guide facilitating smooth backtracking for working hackers : a course in three modules.
Building virtual pentesting labs for advanced penetration testing : learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it /
Manage machine access to secrets with AppRole in HashiCorp Vault /
Grokking web application security.
Applied network security : master the art of detecting and averting advanced network security attacks and techniques /
Human-computer interaction and cybersecurity handbook /
Windows Forensics and Incident Recovery.
Network and system security /
Web application security : exploitation and countermeasures for modern web applications /
Cyberpatterns : unifying design patterns with security and attack patterns /
Cybersecurity in digital transformation : scope and applications /
Advanced ASP.NET Core 3 Security : understanding hacks, attacks, and vulnerabilities to secure your website /
Network Security Strategies Protect Your Network and Enterprise Against Advanced Cybersecurity Attacks and Threats.
Decision and game theory for security first international conference, GameSec 2010, Berlin, Germany, November 22-23, 2010 : proceedings /
802.1X port-based authentication
Implementing DirectAccess with Windows Server 2016 /
How to define and build an effective cyber threat intelligence capability /
The Best Damn Firewall Book Period.
Guide to computer network security /
Hacker culture A to Z : a fun guide to the people, ideas, and gadgets that made the tech world /
Network hardening : an automated approach to improving network security /
Network security, firewalls, and VPNs /
Einstieg in ethical hacking : penetration testing und hacking-tools für die IT-security /
Hacking : der umfassende Praxis-Guide : inkl. Prüfungsvorbereitung zum CEHv12 /
Risks and security of internet and systems : 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised selected papers /
Introduction to the cyber ranges /
Cyber security. Simply. Make it happen. : leveraging digitization through IT security /
Einstieg in Kali Linux : penetration testing und ethical hacking mit Linux /
Applied cryptography and network security workshops : ACNS 2023 satellite workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, proceedings /
Machine learning for computer and cyber security : principles, algorithms, and practices /
Information security technologies in the decentralized distributed networks /
Network and system security : 8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014, Proceedings /
Automated firewall analytics : design, configuration and optimization /
Lean Six Sigma : green belt.
Managing Trust in Cyberspace.
LLM security workshop : tackling OWASP's top 10 risks head-on.
Safe performance in a world of global networks : case studies, collaborative practices and governance principles /
Foundations of security analysis and design VIII : FOSAD 2014/2015/2016 tutorial lectures /
Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies /
Information systems security and privacy : second International Conference, ICISSP 2016, Rome, Italy, February 19-21, 2016, Revised selected papers /
Hardware IP security and trust /
Learning path : Networking for sysadmins.
Introduction to machine learning with applications in information security /
Safety of web applications : risks, encryption and handling vulnerabilities with PHP /
Understand, manage, and measure cyber risk : practical solutions for creating a sustainable cyber program /
The O'Reilly Security Conference, New York, NY, 2016.
O'Reilly Security Conference 2016, Amsterdam, Netherlands.
Digital forensics for pentesters : hands-on learning.
Cyber secure coder (CSC-110).
Open source intelligence (OSINT) for beginners : a methodological approach for social engineering and beyond.
CISA : Certified Information Systems Auditor /
Systems Security Certified Practitioner.
Cybersecurity career guide /
CCNP and CCIE Security Core SCOR 350-701 : (Exam blueprint 1.1) /
Thread modeling fundamentals : debug your security design through whiteboard hacking.
pfSense 2.4.4 : open source firewall.
Grokking web application security /
CompTIA Security+ practice tests : exam SY0-701 /
Use AWS KMS to auto-unseal Vault /
The OSINT Handbook A Practical Guide to Gathering and Analyzing Online Information /
Run HashiCorp Vault with Helm /
Use HashiCorp Vault to manage access to your secrets /
End user security awareness.
Linux security techniques.
CIBERSEGURIDAD PARA DIRECTIVOS riesgos, control y eficiencia de las tecnologías de la informacion /
Reverse engineering and exploit development : application penetration testing for security professionals /
Network performance and security : testing and analyzing using open source and low-cost tools /
Cybersecurity essentials /
CISA - Certified Information Systems Auditor Study Guide : Aligned with the CISA Review Manual 2019 to help you audit monitor, and assess information systems.
The Modern Security Operations Center /
Beyond Spectre : confronting new technical and policy challenges ; proceedings of a workshop /
Implementing Cisco network security,
Cybersecurity for executives : a practical guide /
Zero Trust security : an enterprise guide /
Web ying yong cheng xu an quan = Web application security /
Dream! Hack! Build! unleash citizen-driven innovation with the power of hackathons /
Hands-On Ethical Hacking Tactics Strategies, Tools, and Techniques for Effective Cyber Defense /
Adversary emulation with MITRE ATT&CK : bridging the gap between the red and blue teams /
Cyber smart : five habits to protect your family, money, and identity from cyber criminals /
Understanding microservice security.
Zero trust architecture /
ASP.NET Core Security /
Zero trust networks : building secure systems in untrusted networks /
Introduction to network security : theory and practice /
Sécurité informatique : principes et méthodes /
The defender's dilemma : charting a course toward cybersecurity /
Building a pentesting lab for wireless networks : build your own secure enterprise or home penetration testing lab to dig into the various hacking techniques /
Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually /
ASP.NET Core security.
Network Security JumpStart : Computer and Network Security Basics.
Cyber security and resiliency policy framework /
How to hack like a ghost /
Web application firewalls : securing modern web applications /
Network security through data analysis : from data to action /
Linux® hardening in hostile networks : server security from TLS to TOR /
What is design thinking? /
Mastering pfSense : manage, secure, and monitor your on-premise and cloud network with pfSense 2.4 /
CCNA cybersecurity operations companion guide /
The little book of website quality control /
Data breaches : crisis and opportunity /
Protecting your web applications : solutions and strategies to combat cybersecurity threats /
Cybersecurity of industrial systems /
SSCP (Systems Security Certified Practitioner) /
The current security threat landscape.
Docker security : using containers safely in production /
Proactive early threat detection and securing Oracle Database with IBM QRadar, IBM Security Guardium Database Protection, and IBM Copy Services Manager by using IBM FlashSystem Safeguarded Copy /
Exam Ref SC-300 Microsoft Identity and Access Administrator /
Zero trust networks : building secure systems in untrusted network /
CCNP and CCIE Security Core SCOR 350-701 exam cram /
Cybersecurity lexicon /
Targeted cyber attacks : multi-staged attacks driven by exploits and malware /
Digital resilience : is your company ready for the next cyber threat? /
Schneier on Security /
CCNP Security Cisco Firepower SNCF 300-710 /
Advanced monitoring in P2P botnets a dual perspective /
Security and the networked society
Web security for developers real threats, practical defense /
SDN and NFV security : security analysis of software-defined networking and network function virtualization /
Bug bounty hunting for web security : find and exploit vulnerabilities in web sites and applications /
All-in-one CASP+ CompTIA advanced security practitioner certification exam guide : (exam CAS-003) /
CompTIA PenTest+ certification practice exams (exam PT0-001) /
Quick start guide to penetration testing : with NMAP, OpenVAS and Metasploit /
CompTIA PenTest+ certification all-in-one exam guide (exam PT0-001) /
Cyber guerilla /
Eleventh Hour CISSP®
Practical deployment of Cisco Identity Services Engine (ISE) : real-world examples of AAA deployments /
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory /
Anomaly detection principles and algorithms /
Network security metrics /
Socio-technical aspects in security and trust : 9th International Workshop, STAST 2019, Luxembourg City, Luxembourg, September 26, 2019, Revised selected papers /
Dynamic games for network security /
CompTIA advanced security practitioner : (CASP+) CAS-004 cert guide /
Data protection officer /
Big data technologies for monitoring of computer security a case study of the Russian Federation /
Proceedings of International Conference on Network Security and Blockchain Technology ICNSBT 2021 /
Decision and game theory for security : 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings /
Cloud Security and Governance : Who's on your cloud?.
Hacking exposed 7 : network security secrets & solutions /
Information systems security and privacy : third International Conference, ICISSP 2017, Porto, Portugal, February 19-21, 2017, Revised selected papers /
OPNsense Beginner to Professional : Protect Networks and Build Next-Generation Firewalls Easily with OPNsense /
Guide to vulnerability analysis for computer networks and systems : an artificial intelligence approach /
Security management of next generation telecommunications networks and services /
Securing microservices with Istio Service Mesh /
Microsoft identity and access administrator exam guide : implement IAM solutions with Azure AD, build an identity governance strategy, and pass the SC-300 exam /
Hacking exposed : mobile security secrets & solutions /
Early threat detection and safeguarding data with IBM QRadar and IBM Copy Services Manager on IBM DS8000 /
The Foundations of Threat Hunting : Organize and Design Effective Cyber Threat Hunts to Meet Business Needs.
CRISC CERTIFIED IN RISK AND INFORMATION SYSTEMS CONTROL ALL-IN-ONE EXAM GUIDE
How to Start Your Own Cybersecurity Consulting Business First-Hand Lessons from a Burned-Out Ex-CISO.
Distributed denial of service attack and defense /
Cybersecurity : geopolitics, law, and policy /
Why don't we defend better? : data breaches, risk management, and public policy /
Five technological forces disrupting security : how cloud, social, mobile, big data and IoT are transforming physical security in the digital age /
Cybersecurity fundamentals : a real-world perspective /
Resilience and risk : methods and application in environment, cyber and social domains /
The ultimate Kali Linux book : perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire /
CompTIA Security+ study guide : exam SY0-701 /
Emerging secure networks, blockchains and smart contract technologies /
Testing and securing web applications /
Security+® practice tests : prepare for, practice, and pass the CompTIA Security+ exam /
Cisco firewall : video mentor /
SSCP video course /
SSCP video course.
What is a zero trust network? /
What are the common challenges to adopting a zero trust network model? /
Design, culture, and transformation : design thinking at IBM /
Cisco Firepower Threat Defense (FTD) : configuration and troubleshooting best practices for the Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Advanced Malware Protection (AMP) /
Security from first principles : a practical guide to the information security practice principles /
Web security : common vulnerabilities and their mitigation /
Learn pfSense 2.4 : get up and running with pfSense and all the core concepts to build firewall and routing solutions /
Learn ethical hacking from scratch : your stepping stone to penetration testing /
Network vulnerability assessment : identify security loopholes in your network's infrastructure /
IBM QRadar Version 7.3 : planning and installation guide /
The art of hacking : self paced traning kit for cyber security professionals /
CCSP official (ISC)2 practice tests /
Learn website hacking : penetration testing from scratch /
Practical network scanning : capture network vulnerabilities using standard tools such as Nmap and Nessus /
WiFi hacking : wireless penetration testing for beginners /
Learning network penetration testing with Kali Linux /
Web application security is a stack : how to CYA (cover your apps) completely /
Preparing for a network incident /
Mastering Kali Linux wireless pentesting : test your wireless network's security and master advanced wireless penetration techniques using Kali Linux /
Learning network forensics : identify and safeguard your network against both internal and external threats, hackers, and malware attacks /
SolarWinds server & application monitor : deployment and administration : an intuitive guide to implementing and calibrating SolarWinds Server & Application Monitor with minimum hassle /
How to defeat advanced malware : new tools for protection and forensics /
Cisco ASA 5500-X series next-generation firewalls : LiveLessons /
Python passive network mapping : P2NMAP /
What should go on the internet : privacy, freedom, and security online /
CCNA security live lessons : a hands-on guide to implementing security on Cisco routers and switches.
CompTIA security+ (SYO-401) : complete video course /
IoT penetration testing cookbook : identify vulnerabilities and secure your smart devices /
Cisco Intelligent WAN (IWAN) /
Bio-inspiring cyber security and cloud services : trends and innovations /
Pentesting fundamentals for beginners.
Node web applications and how to use NPM.
Network security : private communications in a public world /
How to hack like a legend : breaking windows /
Intelligent, secure, and dependable systems in distributed and cloud environments : second International Conference, ISDDC 2018, Vancouver, BC, Canada, November 28-30, 2018, Proceedings /
Recent trends in computer networks and distributed systems security : second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014, Proceedings /
(SSCP) Systems Security Certified Practitioner.
Risks and security of internet and systems : 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised selected papers /
Unsupervised machine learning in security applications.
Supervised machine learning in security applications.
Governing operational decisions in an enterprise scalable way /
Penetration testing bootcamp : quickly get up and running with pentesting techniques /
Network forensics /
Foundations of security analysis and design VII : FOSAD 2012/2013 tutorial lectures /
Practical intranet security : overview of the state of the art and available technologies /
Learning digital identity : design, deploy, and manage identity architectures /
CISM Certified Information Security Manager practice exams /
Cyberwarfare : threats to critical infrastructure /
Making sense of cybersecurity /
Security and privacy in mobile social networks /
Cybersecurity blue team strategies : uncover the secrets of blue teams to combat cyber threats in your organization /
Exploring the security landscape : non-traditional security challenges /
A study of black hole attack solutions : on AODV routing protocol in MANET /
Thinking security : stopping next year's hackers /
Cisco FirePOWER and Advanced Malware Protection : LiveLessons /
Microsoft Identity Manager 2016 handbook : a complete handbook on Microsoft Identity Manager 2016--from design considerations to operational best practices /
DevOpsSec : securing software through continuous delivery /
Zabbix network monitoring : gather detailed statistics and data while monitoring the performance and availability of network devices and applications using the all-new Zabbix 3.0 /
Understanding the Cisco ASA firewall : learning to install, configure, and manage Cisco firewalls and advanced VPN solutions /
International Joint Conference : 12th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2019) and 10th International Conference on EUropean Transnational Education (ICEUTE 2019) : Seville, Spain, May 13th-15th, 2019 : proceedings /
Introduction to US cybersecurity careers /
Security for cloud storage systems
MICROSOFT DEFENDER FOR ENDPOINT IN-DEPTH take any organization's endpoint security to the next level /
Research in attacks, intrusions and defenses : 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings /
Security and privacy in cyberspace /
Offensive hacking unfolded.
Check Point firewall administration R81. 10+ : a practical guide to Check Point Firewall deployment and administration /
Security, privacy and reliability in computer communications and networks /
Linux security and hardening : the practical security guide /
Optical Networks : Architecture and Survivability /
CRISC certified in risk and information systems control all-in-one exam guide /
SSCP systems security certified practitioner : all-in-one exam guide /
Intentional risk management through complex networks analysis /
Information systems security and privacy : first International Conference, ICISSP 2015, Angers, France, February 9-11, 2015, revised selected papers /
Disseminating Security Updates at Internet Scale
Risks and security of internet and systems : 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised selected papers /
Security technology convergence insights /
How to define and build an effective cyber threat intelligence capability
Intrusion detection a data mining approach /
Secure Networking CQRE [Secure] 99 : International Exhibition and Congress D sseldorf, Germany, November 30 December 2, 1999 Proceedings /
Open problems in network security : IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised selected papers /
Security in network coding /
Simplify management of security and compliance with IBM PowerSC in cloud and virtualized environments /
SSCP systems security certified practitioner practice exams /
Operationalizing the data lake : building and extracting value from data lakes with a cloud-native data platform /
Network and system security
Introduction to US cybersecurity careers
Sicherheit in Kommunikationsnetzen.
Automated security management /
Socio-technical aspects in security 11th international workshop, STAST 2021, virtual event, Ocotber 8, 2021, revised selected papers /
CCNP and CCIE security core SCOR 350-701 official cert guide /
Building a career in cybersecurity : the strategy and skills you need to succeed /
AI, machine learning and deep learning : a security perspective /
ISSE 2013 securing electronic business processes : highlights of the Information Security Solutions Europe 2013 Conference /
Counterintelligence in a Cyber World
Identification of pathogenic social media accounts from data to intelligence to prediction /
Eleventh hour CISSP® study guide /
Encrypted network traffic analysis /
The cyber security network guide /
Output regulation and cybersecurity of networked switched systems /
Privacy preservation in distributed systems : algorithms and applications /
Cryptology and network security with machine learning : proceedings of ICCNSML 2022 /
Detection of intrusions and malware, and vulnerability assessment : 20th International Conference, DIMVA 2023, Hamburg, Germany, July 12-14, 2023, proceedings /
Security and privacy in communication networks : 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings /
The hack is back : techniques to beat hackers at their own games /
Container security : fundamental technology concepts that protect containerized applications /
Information fusion for cyber-security analytics /
Recent advances in systems safety and security /
Cybersecurity for executives a practical guide /
Network security empowered by artificial intelligence /
Building a practical information security program
Proceedings of International Conference on Network Security and Blockchain Technology : ICNSBT 2023 /
Guide to computer network security
Certified incident handler (ECIH) v2.
Understanding cybersecurity technologies : a guide to selecting the right cybersecurity tools /
Cisco cyberops associate CBROPS 200-201 official cert guide /
Enterprise software security : a confluence of disciplines /
Cisco next-generation security solutions : all-in-one Cisco ASA FirePOWER services, NGIPS, and AMP /
Network security with NetFlow and IPFIX : big data analytics for information security /
Trustworthy cyber-physical systems engineering /
Theory and models for cyber situation awareness /
CISO compass : navigating cybersecurity leadership challenges with insights from pioneers /
What every engineer should know about cyber security and digital forensics
Cisco security professional's guide to secure intrusion detection systems /
13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020)
Understanding network hacks : attack and defense with Python 3 /
CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide /
CompTIA Security+ (SY0-501) : complete video course /
Teaching cybersecurity : a handbook for teaching the cybersecurity body of knowledge in a conventional classroom /
Assessing information security : strategies, tactics, logic and framework /
Security and frontend performance : breaking the conundrum /
Network traffic anomaly detection and prevention : concepts, techniques, and tools /
CISSP exam cram /
Implementing identity management on AWS : a real-world guide to solving customer and workforce IAM challenges in your AWS cloud environments /
Zabbix 4 network monitoring : monitor the performance of your network devices and applications using the all-new Zabbix 4.0 /
Securing network infrastructure : discover practical network security with Nmap and Nessus 7 /
In zero trust we trust : a practical guide to adopting zero trust architectures /
IBM z/OS V1R12 Communications Server TCP/IP implementation.
Network protocols for security professionals : probe and identify network-based vulnerabilities and safeguard against network protocol breaches /
Aspects of Network and Information Security.
Communication System Security /
Web Hacking : Attacks and Defense.
Intelligent, secure, and dependable systems in distributed and cloud environments : first International Conference, ISDDC 2017, Vancouver, BC, Canada, October 26-28, 2017, proceedings /
SC-300 : Microsoft Identity and Access Administrator.
Cybersecurity : a practical engineering approach /
Cyber resilient infrastructure : detect, protect, and mitigate threats against Brocade SAN FOS with IBM QRadar /
Kerberos : Single Sign-on in gemischten Linux/Windows-Umgebungen.
Google xi tong jia gou jie mi : gou jian an quan ke kao de xi tong = Building secure and reliable systems /
Cybersecurity public policy : SWOT analysis conducted on 43 countries /
Transactions on large-scale data- and knowledge-centered systems XXXVI /
Cybersecurity and human rights in the age of cyberveillance /
HIGH-TECH CRIMES REVEALED : CYBERWAR STORIES FROM THE DIGITAL FRONT /
Modernizing cybersecurity operations with machine intelligence : advanced threat detection, hunting, and analysis /
What are the advantages and disadvantages of a zero trust model? /
Privacy-enhancing aggregation techniques for smart grid communications /
Threat modeling with Owasp Threat Dragon & risk rating a vulnerability.
Learn hacking Windows 10 using Metasploit from scratch.
Cybersecurity for small business : a practical guide to securing your business.
The zero trust framework : threat hunting & quantum mechanics /
Aligning security operations with the MITRE ATT&CK framework : level up your security operations center for better security /
Cyber deception techniques, strategies, and human aspects /
CISSP Cert Guide, 3rd Edition /
Cyber Arms: Security in Cyberspace.
What every engineer should know about cyber security and digital forensics.
Data governance /
The security data lake : leveraging big data technologies to build a common data repository for security /
Threat hunting : a guide to proactive network defense /
CISSP Exam Cram, Second Edition /
CISSP Practice Questions Exam Cram, Second Edition /
CISSP Exam Cram, Third Edition /
CISSP Cert Guide /
How to study for CISSP certification : tips, materials, and approach /
CISSP crash course /
Information security : 25th International Conference, ISC 2022, Bali, Indonesia, December 18-22, 2022 : proceedings /
CISSP Domain 2 : access control : video course /
Space-air-ground integrated network security /
SSCP systems security certified practitioner : exam guide /
Ethical hacking and CompTIA PenTest+ exam prep (PT0-001) /
Hands-on pfSense 2.x for firewalls and routers /
Security in computing and communications : second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings /
Information security : 26th international conference, ISC 2023, Groningen, the Netherlands, November 15-17, 2023, proceedings /
CISA : Certified Information Systems Auditor study guide : achieve CISA certification with practical examples and over 850 exam-oriented practice questions /
Network defense and countermeasures : principles and practices /
CCNP and CCIE collaboration core CLCOR 350-801 official cert guide /
Cybersecurity threats and vulnerabilities : NICE framework work roles for K0005.
Building a career in cybersecurity.
CEH V12 CERTIFIED ETHICAL HACKER STUDY GUIDE includes interactive online learning environment and study tools : 750 practice questions, 100 electronic flashcards, searchable key term glossary /
Computer network security /
Official (ISC)2 guide to the CISSP CBK /
How I rob banks : (and other such places) /
Practical Threat Detection Engineering A Hands-On Guide to Planning, Developing, and Validating Detection Capabilities /
BUILDING NEXT-GEN SOC WITH IBM QRADAR accelerate your security operations and detect cyber threats effectively /
Sekyua de shinraisei no aru shisutemu kōchiku : Google SRE ga kangaeru anzen na shisutemu no sekkei, jissō, hoshu /
Information security handbook : enhance your proficiency in information security program development /
How I rob banks /
Configuring Sonicwall Firewalls.
HACKER CULTURE A TO Z a fun guide to the people, ideas, and gadgets that made the tech world /
Implement dynamic policies in Vault /
Seguridad de las aplicaciones web : explotación y contramedidas para aplicaciones web modernas /
Emerging trends in intelligent systems & network security /
Communications and multimedia security 11th IFIP TC 6/TC 11 international conference, CMS 2010, Linz, Austria, May 31-June 2, 2010 : proceedings /
International Joint Conference : CISIS'15 and ICEUTE'15 /
Data security blueprints : a practical guide to data security workflows and implementation /
IDS AND IPS WITH SNORT 3.0 get up and running with Snort 3.0 and discover effective solutions to your security issues /
Integrate CI/CD pipelines with Vault /
519
TK5105.59 .A23 2011 Scalability rules : 50 principles for scaling Web sites / 1
TK5105.59 A235 2020 Cyber Arms : Security in Cyberspace. 1
TK5105.59 .A243 2021 Cryptography and Network Security : An Introduction / 1
TK5105.59 .A25 2012 Advances in computing and information technology proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India. 1
TK5105.59 .A26 Proceedings - ACM SIGSAC New Security Paradigms Workshop ; Sponsored by Association for Computing Machinery Special Interest Group on Security, Audit, and Control [and others] 1
TK5105.59 .A33 2013 Modeling trust context in networks 1
TK5105.59 .A37 2016 Dynamic networks and cyber-security / 1
TK5105.59 .A38 2022 Advancing computational intelligence techniques for security systems design / 2
TK5105.59 .A38226 2023 Advances in cyber security and intelligent analytics / 2
TK5105.59 .A384 2013eb Puppet 3 cookbook : build reliable, scalable, secure, and high-performance systems to fully utilize the power of cloud computing / 1
TK5105.59 .A385 2017eb Security Automation with Ansible 2 / 1
TK5105.59 .A3863 2014 Information security and IT risk management / 1
TK5105.59 .A39 1996 Network and Internet security / 2
TK5105.59 .A393 2014 The Browser Hacker's Handbook / 3
TK5105.59 .A45 2011eb Network security : a decision and game-theoretic approach / 3
TK5105.59 .A54 2007 Security for wireless ad hoc networks / 1
TK5105.59 .A54 2007eb Security for wireless ad hoc networks 1
TK5105.59 -- A73 2005eb Nessus, Snort, & Ethereal Power Tools : Customizing Open Source Security Applications. 1
TK5105.59 .A734 2005eb Nessus, Snort, & Ethereal power tools : customizing open source security applications /
Nessus, Snort, & Ethereal power tools customizing open source security applications /
3