Search Results for Computer Security - Narrowed by: English - Computer networks -- Access control. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bAccess$002bcontrol.$002509Computer$002bnetworks$002b--$002bAccess$002bcontrol.$0026te$003dILS$0026ps$003d300$0026isd$003dtrue? 2024-09-09T16:56:30Z UTM security with Fortinet Mastering FortiOS ent://SD_ILS/0/SD_ILS:146934 2024-09-09T16:56:30Z 2024-09-09T16:56:30Z Author&#160;Tam, Kenneth.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497473">http://www.sciencedirect.com/science/book/9781597497473</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Federated identity primer ent://SD_ILS/0/SD_ILS:306461 2024-09-09T16:56:30Z 2024-09-09T16:56:30Z Author&#160;Rountree, Derrick.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124071896">http://www.sciencedirect.com/science/book/9780124071896</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced persistent threat understanding the danger and how to protect your organization ent://SD_ILS/0/SD_ILS:146056 2024-09-09T16:56:30Z 2024-09-09T16:56:30Z Author&#160;Cole, Eric.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499491">http://www.sciencedirect.com/science/book/9781597499491</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network intrusion analysis methodologies, tools, and techniques for incident analysis and response ent://SD_ILS/0/SD_ILS:146274 2024-09-09T16:56:30Z 2024-09-09T16:56:30Z Author&#160;Fichera, Joe, 1966-&#160;Bolt, Steven.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499620">http://www.sciencedirect.com/science/book/9781597499620</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Client-side attacks and defense ent://SD_ILS/0/SD_ILS:148731 2024-09-09T16:56:30Z 2024-09-09T16:56:30Z Author&#160;Oriyano, Sean-Philip.&#160;Shimonski, Robert.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495905">http://www.sciencedirect.com/science/book/9781597495905</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cisco ASA configuration ent://SD_ILS/0/SD_ILS:293322 2024-09-09T16:56:30Z 2024-09-09T16:56:30Z Author&#160;Deal, Richard A.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/cisco-asa-configuration">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seven deadliest network attacks ent://SD_ILS/0/SD_ILS:149185 2024-09-09T16:56:30Z 2024-09-09T16:56:30Z Author&#160;Prowell, Stacy J.&#160;Kraus, Rob.&#160;Borkin, Mike.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495493">http://www.sciencedirect.com/science/book/9781597495493</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building DMZs for Enterprise networks ent://SD_ILS/0/SD_ILS:254009 2024-09-09T16:56:30Z 2024-09-09T16:56:30Z Author&#160;Shimonski, Robert.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836883">http://www.sciencedirect.com/science/book/9781931836883</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>