Search Results for İNTERNET. - Narrowed by: Computer networks -- Security measures.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003d$0025C4$0025B0NTERNET.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300?2024-09-18T09:03:04ZSecuring the internet of thingsent://SD_ILS/0/SD_ILS:4593352024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Li, Shancang, author. Xu, Li D., author. Romdhani, Imed, contributor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128044582">https://www.sciencedirect.com/science/book/9780128044582</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Scalable and secure internet services and architectureent://SD_ILS/0/SD_ILS:2857962024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Xu, Chengzhong.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420035209">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wired/Wireless Internet Communications 16th IFIP WG 6.2 International Conference, WWIC 2018, Boston, MA, USA, June 18–20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4001862024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Chowdhury, Kaushik Roy. editor. Di Felice, Marco. editor. Matta, Ibrahim. editor. Sheng, Bo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-02931-9">https://doi.org/10.1007/978-3-030-02931-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Digital forensics for network, Internet, and cloud computing a forensic evidence guide for moving targets and dataent://SD_ILS/0/SD_ILS:1464822024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Lillard, Terrence.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495370">http://www.sciencedirect.com/science/book/9781597495370</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Internet security a jumpstart for systems administrators and IT managersent://SD_ILS/0/SD_ILS:2538432024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Speed, Tim. Ellis, Juanita.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582982">http://www.sciencedirect.com/science/book/9781555582982</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Secure Internet practices best practices for securing systems in the Internet and e-Business ageent://SD_ILS/0/SD_ILS:2904272024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor McBride, Patrick.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420031478">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Smart Computing and Communication Third International Conference, SmartCom 2018, Tokyo, Japan, December 10–12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4001072024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Qiu, Meikang. editor. (orcid)0000-0002-1004-0140 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-05755-8">https://doi.org/10.1007/978-3-030-05755-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Microsoft Windows server 2008 the complete referenceent://SD_ILS/0/SD_ILS:2933672024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Ruest, Danielle. Ruest, Nelson.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/microsoft-windows-server-2008-complete-reference">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Microsoft Windows server 2008 a beginner's guideent://SD_ILS/0/SD_ILS:2933682024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Matthews, Martin S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/microsoft-windows-server-2008-beginners-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>CYA securing IIS 6.0 : cover your a** by getting it right the first timeent://SD_ILS/0/SD_ILS:2539952024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Cheah, Chun Hai. Schaefer, Ken. Peiris, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836258">http://www.sciencedirect.com/science/book/9781931836258</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Artificial intelligence and security challenges in emerging networksent://SD_ILS/0/SD_ILS:4819752024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Abassi, Ryma, 1980- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7353-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7353-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The basics of cyber safety : computer and mobile device safety made easyent://SD_ILS/0/SD_ILS:4590442024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Sammons, John, author. Cross, Michael, 1965- author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166509">http://www.sciencedirect.com/science/book/9780124166509</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber guerillaent://SD_ILS/0/SD_ILS:4589532024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Haaster, Jelle van, author. Gevers, Rickey, author. Sprengers, Martijn, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128051979">http://www.sciencedirect.com/science/book/9780128051979</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>DNS security : defending the domain name systement://SD_ILS/0/SD_ILS:4589352024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Liska, Allan, author. Stowe, Geoffrey, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128033067">http://www.sciencedirect.com/science/book/9780128033067</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Managing online risk : apps, mobile, and social media securityent://SD_ILS/0/SD_ILS:3555142024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Gonzalez, Deborah, author.<br/>Preferred Shelf Number ONLINE(355514.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124200555">http://www.sciencedirect.com/science/book/9780124200555</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Windows forensic analysis toolkit : advanced analysis techniques for Windows 8ent://SD_ILS/0/SD_ILS:3559092024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Carvey, Harlan A., author.<br/>Preferred Shelf Number ONLINE(355909.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124171572">http://www.sciencedirect.com/science/book/9780124171572</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Anonymous communication networks : protecting privacy on the webent://SD_ILS/0/SD_ILS:3566572024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Peng, Kun, author.<br/>Preferred Shelf Number ONLINE(356657.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439881606">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybercrime and cyberwarfareent://SD_ILS/0/SD_ILS:3419802024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Bernik, Igor, author.<br/>Preferred Shelf Number ONLINE(341980.1)<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9781118898604">http://dx.doi.org/10.1002/9781118898604</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network Securityent://SD_ILS/0/SD_ILS:3421682024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Perez, Andre.<br/>Preferred Shelf Number ONLINE(342168.1)<br/>Electronic Access ebrary <a href="http://site.ebrary.com/lib/alltitles/docDetail.action?docID=10945002">http://site.ebrary.com/lib/alltitles/docDetail.action?docID=10945002</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781119043942">http://dx.doi.org/10.1002/9781119043942</a>
MyiLibrary <a href="http://www.myilibrary.com?id=647917">http://www.myilibrary.com?id=647917</a>
Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{D8CDF404-6689-4759-9C8F-A065220E7032}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{D8CDF404-6689-4759-9C8F-A065220E7032}Img100.jpg</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Automatic defense against zero-day polymorphic worms in communication networksent://SD_ILS/0/SD_ILS:2863072024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Mohammed, Mohssen, 1982- Pathan, Al-Sakib Khan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466557284">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in cyber security technology, operations, and experiencesent://SD_ILS/0/SD_ILS:2395912024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Hsu, D. Frank (Derbiau Frank), 1948- Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9780823250325/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Iris biometric model for secured network accessent://SD_ILS/0/SD_ILS:2881602024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Khoury, Franjieh El.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466502147">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wiki at war conflict in a socially networked worldent://SD_ILS/0/SD_ILS:2418372024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Carafano, James Jay, 1955- Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781603446570/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wiki at war conflict in a socially networked worldent://SD_ILS/0/SD_ILS:2767002024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Carafano, James Jay, 1955- Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781603446587/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Securing the clicks network security in the age of social mediaent://SD_ILS/0/SD_ILS:2932402024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Bahadur, Gary. Inasi, Jason. Carvalho, Alex de. Powell, Juliette, 1976- Valencia, Connie.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/securing-clicks-network-security-in-age-social-media">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Web application security a beginner's guideent://SD_ILS/0/SD_ILS:2932412024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Sullivan, Bryan, 1974- Liu, Vincent.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/web-application-security-beginners-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practiceent://SD_ILS/0/SD_ILS:1452542024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Winterfeld, Steve. Andress, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124047372">http://www.sciencedirect.com/science/book/9780124047372</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Windows forensic analysis toolkit advanced analysis techniques for Windows 7ent://SD_ILS/0/SD_ILS:1456892024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Carvey, Harlan A. Kolde, Jennifer.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497275">http://www.sciencedirect.com/science/book/9781597497275</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advanced persistent threat understanding the danger and how to protect your organizationent://SD_ILS/0/SD_ILS:1460562024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Cole, Eric.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499491">http://www.sciencedirect.com/science/book/9781597499491</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Engineering information security the application of systems engineering concepts to achieve information assuranceent://SD_ILS/0/SD_ILS:2499162024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Jacobs, Stuart.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Handbook of financial cryptography and securityent://SD_ILS/0/SD_ILS:2878292024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Rosenberg, Burton.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420059823">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Disappearing cryptography information hiding : steganography & watermarkingent://SD_ILS/0/SD_ILS:1464502024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Wayner, Peter, 1964-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123744791">http://www.sciencedirect.com/science/book/9780123744791</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cloud security and privacyent://SD_ILS/0/SD_ILS:1447222024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Mather, Tim. Kumaraswamy, Subra. Latif, Shahed.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=414816">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=414816</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Google hacking for penetration testers. Volume 2ent://SD_ILS/0/SD_ILS:1480292024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Long, Johnny.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491761">http://www.sciencedirect.com/science/book/9781597491761</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Asterisk hackingent://SD_ILS/0/SD_ILS:1453552024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Brashars, Joshua.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491518">http://www.sciencedirect.com/science/book/9781597491518</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>How to cheat at Voip securityent://SD_ILS/0/SD_ILS:1121062024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Porter, Thomas, PhD. Gough, Michael. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491693">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>How to cheat at Voip securityent://SD_ILS/0/SD_ILS:1454862024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Porter, Thomas, PhD. Gough, Michael, 1963-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491693">http://www.sciencedirect.com/science/book/9781597491693</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Practical VoIP securityent://SD_ILS/0/SD_ILS:2536692024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Porter, Thomas.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490603">http://www.sciencedirect.com/science/book/9781597490603</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>How to cheat at configuring ISA server 2004ent://SD_ILS/0/SD_ILS:2539482024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Shinder, Thomas W. Shinder, Debra Littlejohn.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490573">http://www.sciencedirect.com/science/book/9781597490573</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Implementing homeland security for enterprise ITent://SD_ILS/0/SD_ILS:2536562024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Erbschloe, Michael.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">http://www.sciencedirect.com/science/book/9781555583125</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Disappearing cryptography information hiding : steganography & watermarkingent://SD_ILS/0/SD_ILS:2539002024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Wayner, Peter, 1964-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607699">http://www.sciencedirect.com/science/book/9781558607699</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hack proofing your Web applicationsent://SD_ILS/0/SD_ILS:2539692024-09-18T09:03:04Z2024-09-18T09:03:04ZAuthor Traxler, Julie.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994312">http://www.sciencedirect.com/science/book/9781928994312</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>