Search Results for - Narrowed by: 2004 - Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092004$0025092004$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?dt=list
2024-10-04T03:43:19Z
Hacking : Bilişim korsanlığı ve korunma yöntemleri
ent://SD_ILS/0/SD_ILS:88578
2024-10-04T03:43:19Z
2024-10-04T03:43:19Z
Author Yılmaz, Davut.<br/>Preferred Shelf Number TK 5105.59 Y56 2004<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Exploiting software : how to break code
ent://SD_ILS/0/SD_ILS:96556
2024-10-04T03:43:19Z
2024-10-04T03:43:19Z
Author Hoglund, Greg. McGraw, Gary, 1966- ort. yaz.<br/>Preferred Shelf Number QA 76.9.A25 H635 2004<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
How to break software security : effective technigues for security testing
ent://SD_ILS/0/SD_ILS:105584
2024-10-04T03:43:19Z
2024-10-04T03:43:19Z
Author Whittaker, James A., 1965- Thomson, Herbert H., ort. yaz.<br/>Preferred Shelf Number QA 76.9.A25 W48 2004<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
İnternette güvenlik ve Hacker Cracker meselesi : el kitabı
ent://SD_ILS/0/SD_ILS:104130
2024-10-04T03:43:19Z
2024-10-04T03:43:19Z
Author Güven, Mehmet.<br/>Preferred Shelf Number QA 76.9.A25 G88 2004<br/>Format: Books<br/>Availability Beytepe Library~2<br/>
Secure architectures with OpenBSD
ent://SD_ILS/0/SD_ILS:109506
2024-10-04T03:43:19Z
2024-10-04T03:43:19Z
Author Palmer, Brandon. Nazario, Jose, ort. yaz.<br/>Preferred Shelf Number QA76.76.O63 P335 2004<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Investigator's guide to steganography
ent://SD_ILS/0/SD_ILS:286402
2024-10-04T03:43:19Z
2024-10-04T03:43:19Z
Author Kipper, Gregory.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203504765">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security for Mobility
ent://SD_ILS/0/SD_ILS:247990
2024-10-04T03:43:19Z
2024-10-04T03:43:19Z
Author Mitchell, Chris J., ed.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1049/PBTE051E">http://dx.doi.org/10.1049/PBTE051E</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Public key infrastructure building trusted applications and Web services
ent://SD_ILS/0/SD_ILS:290108
2024-10-04T03:43:19Z
2024-10-04T03:43:19Z
Author Vacca, John R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203498156">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security policies and procedures a practitioner's reference
ent://SD_ILS/0/SD_ILS:290137
2024-10-04T03:43:19Z
2024-10-04T03:43:19Z
Author Peltier, Thomas R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203488737">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Malware : fighting malicious code
ent://SD_ILS/0/SD_ILS:267737
2024-10-04T03:43:19Z
2024-10-04T03:43:19Z
Author Skoudis, Ed. Zeltser, Lenny.<br/>Preferred Shelf Number QA76.9.A25 S58 2004<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Implementing homeland security for enterprise IT
ent://SD_ILS/0/SD_ILS:253656
2024-10-04T03:43:19Z
2024-10-04T03:43:19Z
Author Erbschloe, Michael.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">http://www.sciencedirect.com/science/book/9781555583125</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Windows Server 2003 security infrastructures
ent://SD_ILS/0/SD_ILS:253837
2024-10-04T03:43:19Z
2024-10-04T03:43:19Z
Author Clercq, Jan de, 1968-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582838">http://www.sciencedirect.com/science/book/9781555582838</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
HP Nonstop server security a practical handbook
ent://SD_ILS/0/SD_ILS:253849
2024-10-04T03:43:19Z
2024-10-04T03:43:19Z
Author Hill, Terri. Alvarado, Ellen. XYPRO Technology Corporation.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583149">http://www.sciencedirect.com/science/book/9781555583149</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
WarDriving drive, detect, defend : a guide to wireless security
ent://SD_ILS/0/SD_ILS:253988
2024-10-04T03:43:19Z
2024-10-04T03:43:19Z
Author Hurley, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836036">http://www.sciencedirect.com/science/book/9781931836036</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Snort 2.1 intrusion detection
ent://SD_ILS/0/SD_ILS:253989
2024-10-04T03:43:19Z
2024-10-04T03:43:19Z
Author Beale, Jay. Alder, Raven.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836043">http://www.sciencedirect.com/science/book/9781931836043</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Nessus network auditing
ent://SD_ILS/0/SD_ILS:253991
2024-10-04T03:43:19Z
2024-10-04T03:43:19Z
Author Deraison, Renaud. Syngress Media, Inc.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836081">http://www.sciencedirect.com/science/book/9781931836081</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber adversary characterization auditing the hacker mind
ent://SD_ILS/0/SD_ILS:253992
2024-10-04T03:43:19Z
2024-10-04T03:43:19Z
Author Parker, Tom, 1982-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836111">http://www.sciencedirect.com/science/book/9781931836111</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security assessment case studies for implementing the NSA IAM
ent://SD_ILS/0/SD_ILS:254030
2024-10-04T03:43:19Z
2024-10-04T03:43:19Z
Author Rogers, Russ.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266962">http://www.sciencedirect.com/science/book/9781932266962</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireless operational security
ent://SD_ILS/0/SD_ILS:254059
2024-10-04T03:43:19Z
2024-10-04T03:43:19Z
Author Rittinghouse, John W. Ransome, James F.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583170">http://www.sciencedirect.com/science/book/9781555583170</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>