Search Results for -- AMER&#304;KAN EDEB&#304;YATI -- 20. Y&Uuml;ZYIL -- TAR&#304;H&Ccedil;E VE ELE&#350;T&#304;RME. - Narrowed by: Alder, Raven. - Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003d--$002bAMER$0025C4$0025B0KAN$002bEDEB$0025C4$0025B0YATI$002b--$002b20.$002bY$0025C3$00259CZYIL$002b--$002bTAR$0025C4$0025B0H$0025C3$002587E$002bVE$002bELE$0025C5$00259ET$0025C4$0025B0RME.$0026qf$003dAUTHOR$002509Author$002509Alder$00252C$002bRaven.$002509Alder$00252C$002bRaven.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300$0026isd$003dtrue? 2024-09-10T03:22:26Z Stealing the network how to own an identity ent://SD_ILS/0/SD_ILS:253663 2024-09-10T03:22:26Z 2024-09-10T03:22:26Z Author&#160;Alder, Raven.&#160;Mullen, Timothy M.&#160;Long, Johnny.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490061">http://www.sciencedirect.com/science/book/9781597490061</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Snort 2.1 intrusion detection ent://SD_ILS/0/SD_ILS:253989 2024-09-10T03:22:26Z 2024-09-10T03:22:26Z Author&#160;Beale, Jay.&#160;Alder, Raven.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836043">http://www.sciencedirect.com/science/book/9781931836043</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>