Search Results for - Narrowed by: Electronic Library - 2010 - Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AELEKKUTUPH$002509Electronic$002bLibrary$0026qf$003dPUBDATE$002509Publication$002bDate$0025092010$0025092010$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026te$003dILS$0026rt$003dfalse$00257C$00257C$00257CISBN$00257C$00257C$00257CISBN$0026ps$003d300?
2024-09-27T12:25:01Z
Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams
ent://SD_ILS/0/SD_ILS:297862
2024-09-27T12:25:01Z
2024-09-27T12:25:01Z
Author Kouns, Jake. Minoli, Daniel, 1952- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Risk analysis and security countermeasure selection
ent://SD_ILS/0/SD_ILS:288785
2024-09-27T12:25:01Z
2024-09-27T12:25:01Z
Author Norman, Thomas L.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420078718">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptanalysis of RSA and its variants
ent://SD_ILS/0/SD_ILS:291418
2024-09-27T12:25:01Z
2024-09-27T12:25:01Z
Author Hinek, M. Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420075199">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hashing in computer science fifty years of slicing and dicing
ent://SD_ILS/0/SD_ILS:298025
2024-09-27T12:25:01Z
2024-09-27T12:25:01Z
Author Konheim, Alan G., 1934-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://proquest.safaribooksonline.com/?fpi=9781118031834">Available by subscription from Safari Books Online</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470630617">http://dx.doi.org/10.1002/9780470630617</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html">http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9781118031834">http://proquest.tech.safaribooksonline.de/9781118031834</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security 2020 reduce security risks this decade
ent://SD_ILS/0/SD_ILS:303839
2024-09-27T12:25:01Z
2024-09-27T12:25:01Z
Author Howard, Doug. Prince, Kevin. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255803">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mac security bible
ent://SD_ILS/0/SD_ILS:303881
2024-09-27T12:25:01Z
2024-09-27T12:25:01Z
Author Kissell, Joe.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118257739">An electronic book accessible through the World Wide Web; click for information</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/640">http://proquest.safaribooksonline.com/640</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780470474198">http://proquest.safaribooksonline.com/?fpi=9780470474198</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/9780470474198">http://proquest.safaribooksonline.com/9780470474198</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40737">http://www.books24x7.com/marc.asp?bookid=40737</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10358774">http://site.ebrary.com/lib/alltitles/Doc?id=10358774</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Safety of computer architectures
ent://SD_ILS/0/SD_ILS:304132
2024-09-27T12:25:01Z
2024-09-27T12:25:01Z
Author Boulanger, Jean-Louis.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://lib.myilibrary.com?id=450000">Connect to MyiLibrary resource.</a>
Wiley <a href="http://onlinelibrary.wiley.com/book/10.1002/9781118600696">http://onlinelibrary.wiley.com/book/10.1002/9781118600696</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118600696">http://dx.doi.org/10.1002/9781118600696</a>
ebrary <a href="http://site.ebrary.com/id/10657623">http://site.ebrary.com/id/10657623</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Seven deadliest USB attacks
ent://SD_ILS/0/SD_ILS:306328
2024-09-27T12:25:01Z
2024-09-27T12:25:01Z
Author Anderson, Brian (Brian James)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495530">http://www.sciencedirect.com/science/book/9781597495530</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security risk analysis
ent://SD_ILS/0/SD_ILS:288856
2024-09-27T12:25:01Z
2024-09-27T12:25:01Z
Author Peltier, Thomas R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439839577">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The executive MBA in information security
ent://SD_ILS/0/SD_ILS:286931
2024-09-27T12:25:01Z
2024-09-27T12:25:01Z
Author Trinckes, John J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439810088">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Vulnerability management
ent://SD_ILS/0/SD_ILS:287895
2024-09-27T12:25:01Z
2024-09-27T12:25:01Z
Author Foreman, Park.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439801512">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure and resilient software development
ent://SD_ILS/0/SD_ILS:290714
2024-09-27T12:25:01Z
2024-09-27T12:25:01Z
Author Merkow, Mark S. Raghavan, Lakshmikanth.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439826973">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
System assurance beyond detecting vulnerabilities
ent://SD_ILS/0/SD_ILS:148532
2024-09-27T12:25:01Z
2024-09-27T12:25:01Z
Author Mansourov, Nikolai. Campara, Djenana.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123814142">http://www.sciencedirect.com/science/book/9780123814142</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Seven deadliest USB attacks
ent://SD_ILS/0/SD_ILS:148953
2024-09-27T12:25:01Z
2024-09-27T12:25:01Z
Author Anderson, Brian (Brian James)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495530">http://www.sciencedirect.com/science/book/9781597495530</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Virtualization and forensics a digital forensic investigator's guide to virtual environments
ent://SD_ILS/0/SD_ILS:146715
2024-09-27T12:25:01Z
2024-09-27T12:25:01Z
Author Barrett, Diane. Kipper, Gregory.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A guide to kernel exploitation attacking the core
ent://SD_ILS/0/SD_ILS:148059
2024-09-27T12:25:01Z
2024-09-27T12:25:01Z
Author Perla, Enrico. Massimiliano, Oldani.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494861">http://www.sciencedirect.com/science/book/9781597494861</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Seven deadliest Microsoft attacks
ent://SD_ILS/0/SD_ILS:149018
2024-09-27T12:25:01Z
2024-09-27T12:25:01Z
Author Kraus, Rob.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495516">http://www.sciencedirect.com/science/book/9781597495516</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Seven deadliest wireless technologies attacks
ent://SD_ILS/0/SD_ILS:149033
2024-09-27T12:25:01Z
2024-09-27T12:25:01Z
Author Haines, Brad.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495417">http://www.sciencedirect.com/science/book/9781597495417</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Seven deadliest social network attacks
ent://SD_ILS/0/SD_ILS:149145
2024-09-27T12:25:01Z
2024-09-27T12:25:01Z
Author Timm, Carl. Perez, Richard, 1969 Oct. 17- Ely, Adam.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495455">http://www.sciencedirect.com/science/book/9781597495455</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The basics of hacking and penetration testing ethical hacking and penetration testing made easy
ent://SD_ILS/0/SD_ILS:145199
2024-09-27T12:25:01Z
2024-09-27T12:25:01Z
Author Engebretson, Pat (Patrick Henry), 1974-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496551">http://www.sciencedirect.com/science/book/9781597496551</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital forensics for network, Internet, and cloud computing a forensic evidence guide for moving targets and data
ent://SD_ILS/0/SD_ILS:146482
2024-09-27T12:25:01Z
2024-09-27T12:25:01Z
Author Lillard, Terrence.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495370">http://www.sciencedirect.com/science/book/9781597495370</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Dissecting the hack the forb1dd3n network
ent://SD_ILS/0/SD_ILS:146585
2024-09-27T12:25:01Z
2024-09-27T12:25:01Z
Author Street, Jayson E. Street, Jayson E. Dissecting the hack.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495684">http://www.sciencedirect.com/science/book/9781597495684</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Managed code rootkits hooking into runtime environments
ent://SD_ILS/0/SD_ILS:147836
2024-09-27T12:25:01Z
2024-09-27T12:25:01Z
Author Metula, Erez.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495745">http://www.sciencedirect.com/science/book/9781597495745</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IT audit, control, and security
ent://SD_ILS/0/SD_ILS:304008
2024-09-27T12:25:01Z
2024-09-27T12:25:01Z
Author Moeller, Robert R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118269138">An electronic book accessible through the World Wide Web; click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40717">http://www.books24x7.com/marc.asp?bookid=40717</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10469768">http://site.ebrary.com/lib/alltitles/Doc?id=10469768</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=624573">http://swb.eblib.com/patron/FullRecord.aspx?p=624573</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Virtualization and forensics a digital forensic investigator's guide to virtual environments
ent://SD_ILS/0/SD_ILS:306330
2024-09-27T12:25:01Z
2024-09-27T12:25:01Z
Author Barrett, Diane. Kipper, Gregory.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>