Search Results for -- UYGARLIK, ORTA&Ccedil;A&#286;, EDEB&#304;YATTA. - Narrowed by: Electronic Library - 2011 - Computer security. - Computers -- Access control. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003d--$002bUYGARLIK$00252C$002bORTA$0025C3$002587A$0025C4$00259E$00252C$002bEDEB$0025C4$0025B0YATTA.$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AELEKKUTUPH$002509Electronic$002bLibrary$0026qf$003dPUBDATE$002509Publication$002bDate$0025092011$0025092011$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Computers$002b--$002bAccess$002bcontrol.$002509Computers$002b--$002bAccess$002bcontrol.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300?dt=list 2024-08-12T12:08:33Z Security information and event management (SIEM) implementation ent://SD_ILS/0/SD_ILS:293279 2024-08-12T12:08:33Z 2024-08-12T12:08:33Z Author&#160;Miller, David, 1959 Nov. 5-&#160;Harris, Shon.&#160;Harper, Allen.&#160;VanDyke, Stephen.&#160;Blask, Chris.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/security-information-event-management-siem-implementation">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed malware &amp; rootkits malware &amp; rootkits security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:293397 2024-08-12T12:08:33Z 2024-08-12T12:08:33Z Author&#160;Davis, Michael A.&#160;Bodmer, Sean.&#160;LeMasters, Aaron.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-malware-rootkits">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Adaptive security management architecture ent://SD_ILS/0/SD_ILS:288451 2024-08-12T12:08:33Z 2024-08-12T12:08:33Z Author&#160;Tiller, James S.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420013375">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Oracle security developing secure database and middleware environments ent://SD_ILS/0/SD_ILS:293376 2024-08-12T12:08:33Z 2024-08-12T12:08:33Z Author&#160;Knox, David (David C.)&#160;Gaetjen, Scott.&#160;Jahangir, Hamza.&#160;Muth, Tyler.&#160;Sack, Patrick.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/applied-oracle-security-developing-secure-database-middleware-environments">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed Windows Windows security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:293341 2024-08-12T12:08:33Z 2024-08-12T12:08:33Z Author&#160;Scambray, Joel.&#160;McClure, Stuart.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-windows-microsoft-security-secrets-solutions-third-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed Linux Linux security secrets and solutions. ent://SD_ILS/0/SD_ILS:293324 2024-08-12T12:08:33Z 2024-08-12T12:08:33Z Author&#160;Hatch, Brian. Hacking Linux exposed.&#160;ISECOM (Organization)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-linux">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>