1071. Threat hunting with elastic stack : solve complex security challenges with integrated prevention, detection, and response /: solve complex security challenges with integrated prevention, detection, and response. (2021) Authors: Pease, Andrew Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1072. Computer security principles and practice /: principles and practice. (2015) Authors: Stallings, William; Brown, Lawrie Record Type: Book Extent: 1 online resource (840 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1073. Implementing identity management on AWS : a real-world guide to solving customer and workforce IAM challenges in your AWS cloud environments /: a real-world guide to solving customer and workforce IAM challenges in your AWS cloud environments. (2021) Authors: Lehtinen, Jon; Hutchinson, Steve Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1074. Enterprise devops for architects : leveraging AIops and devsecops for secure digital transformation /: leveraging AIops and devsecops for secure digital transformation. (2021) Authors: Mulder, Jeroen Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1075. Industrial cybersecurity : efficiently monitor the cybersecurity posture of your ICS environment /: efficiently monitor the cybersecurity posture of your ICS environment. (2021) Authors: Ackerman, Pascal Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1076. Securing social networks in cyberspace. (2021) Editors: Pathan, Al-Sakib Khan Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1077. The cybersecurity self-help guide. (2021) Authors: Soni, Arun Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1078. Designing secure systems. (2021) Authors: Melone, Michael Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1079. The security risk assessment handbook : a complete guide for performing security risk assessments /: a complete guide for performing security risk assessments. (2021) Authors: Landoll, Douglas J Record Type: Book Extent: 1 online resource, illustrations (black and white), maps (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1080. Cybersecurity issues in emerging technologies. (2021) Authors: Maglaras, Leandros; Kantzavelou, Ioanna Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗