-
1
You can stop stupid : stopping losses from accidental and malicious actions
[Rego Park, N.Y.] : Gildan Media, 2021
Unabridged.Format: Electronic AudioStreaming audio (Wentworth users only)
-
2
CISSP : training guide
Indianapolis, Ind. : London : Que ; Pearson Education, 2002Format: Electronic eBookFull text (Wentworth users only)
-
3
Learn man in the middle attacks from scratch.
[Place of publication not identified] : Packt Publishing, 2022
[First edition].Format: Electronic VideoStreaming video (Wentworth users only)
-
4
Cyber smart : five habits to protect your family, money, and identity from cyber criminals
[Rego Park (New York, N.Y.] : Gildan, 2019
Unabridged.Format: Electronic AudioStreaming audio (Wentworth users only)
-
5
Early threat detection and safeguarding data with IBM QRadar and IBM Copy Services Manager on IBM DS8000
[Place of publication not identified] : IBM Redbooks, 2022
[First edition].Format: Electronic eBookFull text (Wentworth users only)
-
6
Snowflake access control : mastering the features for data privacy and regulatory compliance
[Berkeley] : Apress, 2022Format: Electronic eBookFull text (Wentworth users only)
-
7
CISSP 8 domains.
[Place of publication not identified] : Expanding Security, 2021
[First edition].Format: Electronic VideoStreaming video (Wentworth users only)
-
8
Making sense of application security.
[Place of publication not identified] : Manning Publications, 2022
[First edition].Format: Electronic VideoStreaming video (Wentworth users only)
-
9
IT security controls : a guide to corporate standards and frameworks
Berkeley, CA : Apress L. P., 2022Format: Electronic eBookFull text (Wentworth users only)
-
10
Encryption facility for z/OS version 1.10
[United States?] : IBM, International Technical Support Organization, 2007
1st ed.Format: Electronic eBookFull text (Wentworth users only)
-
11
The security culture playbook : an executive guide to reducing risk and developing your human defense layer
Newark, NJ : John Wiley & Sons, Inc., 2022Format: Electronic eBookFull text (Wentworth users only)
-
12
Essential cryptography for JavaScript developers : a practical guide to leveraging common cryptographic operations in Node.js and the browser
Birmingham : Packt Publishing, 2021Format: Electronic eBookFull text (Wentworth users only)
-
13
Microsoft Security Operations Analyst Exam Ref SC-200 certification guide
Birmingham, UK : Packt Publishing, 2022
[First edition].Format: Electronic eBookFull text (Wentworth users only)
-
14
Intelligent Data Analysis for e-Learning : Enhancing Security and Trustworthiness in Online Learning Systems.
San Francisco, UNITED STATES : Academic Press, 2016Format: Electronic eBookFull text (Wentworth users only)
-
15
Incident response techniques for ransomware attacks understand modern ransomware attacks and build an incident response strategy to work through them
Birmingham : Packt Publishing, Limited, 2022Format: Electronic eBookFull text (Wentworth users only)
-
16
Ransomware
[Place of publication not identified] : O'Reilly Media, Inc., 2022
[First edition].Format: Electronic VideoStreaming video (Wentworth users only)
-
17
The definitive guide to security in Jakarta EE : securing Java-based enterprise applications with Jakarta security, authorization, authentication and more
New York, NY : Apress, 2022
[First edition].Format: Electronic eBookFull text (Wentworth users only)
-
18
Security Observability with eBPF
Sebastopol, CA : O'Reilly Media, Inc., 2022
First edition.Format: Electronic eBookFull text (Wentworth users only)
-
19
Malware and incident response
[Boston, Massachusetts] : Addison-Wesley Professional, 2021
[First edition].Format: Electronic VideoStreaming video (Wentworth users only)
-
20
Container storage and data protection for applications on Kubernetes
Sebastopol, CA : O'Reilly Media, Inc., 2022
First edition.Format: Electronic eBookFull text (Wentworth users only)