Search Results for Computer Security - Narrowed by: 2002 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity$0026qf$003dPUBDATE$002509Publication$002bDate$0025092002$0025092002$0026ps$003d300$0026isd$003dtrue? 2024-11-19T00:19:13Z Sequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transfer ent://SD_ILS/0/SD_ILS:62188 2024-11-19T00:19:13Z 2024-11-19T00:19:13Z Author&#160;Davies, Donald Watts, 1924-&#160;Price, W. L., ort.yaz.<br/>Preferred Shelf Number&#160;TK 5105 D43 1989<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Building a global information assurance program ent://SD_ILS/0/SD_ILS:287473 2024-11-19T00:19:13Z 2024-11-19T00:19:13Z Author&#160;Curts, Raymond J.&#160;Campbell, Douglas E., 1954-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203997550">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Nokia network security solutions handbook ent://SD_ILS/0/SD_ILS:81149 2024-11-19T00:19:13Z 2024-11-19T00:19:13Z Author&#160;Maxwell, Doug.&#160;Amon, Cherie, ort. yaz.<br/>Preferred Shelf Number&#160;TK 5105.59 M451 2002<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Introduction to communication electronic warfare systems ent://SD_ILS/0/SD_ILS:76559 2024-11-19T00:19:13Z 2024-11-19T00:19:13Z Author&#160;Poisel, Richard.<br/>Preferred Shelf Number&#160;UG 590 P65 2002<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> The total CISSP exam prep book practice questions, answers, and test taking tips and techniques ent://SD_ILS/0/SD_ILS:290415 2024-11-19T00:19:13Z 2024-11-19T00:19:13Z Author&#160;Peltier, Thomas R.&#160;Howard, Patrick D.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031447">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Internet practices best practices for securing systems in the Internet and e-Business age ent://SD_ILS/0/SD_ILS:290427 2024-11-19T00:19:13Z 2024-11-19T00:19:13Z Author&#160;McBride, Patrick.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031478">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A practical guide to security engineering and information assurance ent://SD_ILS/0/SD_ILS:290461 2024-11-19T00:19:13Z 2024-11-19T00:19:13Z Author&#160;Herrmann, Debra S.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031492">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security policies, procedures, and standards guidelines for effective information security management ent://SD_ILS/0/SD_ILS:290209 2024-11-19T00:19:13Z 2024-11-19T00:19:13Z Author&#160;Peltier, Thomas R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780849390326">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Internet and Wireless Security ent://SD_ILS/0/SD_ILS:247682 2024-11-19T00:19:13Z 2024-11-19T00:19:13Z Author&#160;Temple, Robert, ed.&#160;Regnault, John, ed.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1049/PBBT004E">http://dx.doi.org/10.1049/PBBT004E</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Disappearing cryptography information hiding : steganography &amp; watermarking ent://SD_ILS/0/SD_ILS:253900 2024-11-19T00:19:13Z 2024-11-19T00:19:13Z Author&#160;Wayner, Peter, 1964-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607699">http://www.sciencedirect.com/science/book/9781558607699</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ISA server and beyond real world security solutions for Microsoft enterprise networks ent://SD_ILS/0/SD_ILS:254053 2024-11-19T00:19:13Z 2024-11-19T00:19:13Z Author&#160;Shinder, Thomas W.&#160;Grasdal, Martin.&#160;Shinder, Debra Littlejohn.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836661">http://www.sciencedirect.com/science/book/9781931836661</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security best practices 205 basic rules ent://SD_ILS/0/SD_ILS:254779 2024-11-19T00:19:13Z 2024-11-19T00:19:13Z Author&#160;Stefanek, George L.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781878707963">http://www.sciencedirect.com/science/book/9781878707963</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Scene of the cybercrime computer forensics handbook ent://SD_ILS/0/SD_ILS:253615 2024-11-19T00:19:13Z 2024-11-19T00:19:13Z Author&#160;Shinder, Debra Littlejohn.&#160;Tittel, Ed.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836654">http://www.sciencedirect.com/science/book/9781931836654</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managing Cisco network security ent://SD_ILS/0/SD_ILS:253616 2024-11-19T00:19:13Z 2024-11-19T00:19:13Z Author&#160;Knipp, Eric.&#160;Danielyan, Edgar.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836562">http://www.sciencedirect.com/science/book/9781931836562</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hack proofing your identity in the information age protect your family on the internet! ent://SD_ILS/0/SD_ILS:253617 2024-11-19T00:19:13Z 2024-11-19T00:19:13Z Author&#160;Bidwell, Teri.&#160;Cross, Michael, 1965-&#160;Russell, Ryan, 1969-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836517">http://www.sciencedirect.com/science/book/9781931836517</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hack proofing your network ent://SD_ILS/0/SD_ILS:253618 2024-11-19T00:19:13Z 2024-11-19T00:19:13Z Author&#160;Ahmad, David R. Mirza.&#160;Russell, Ryan, 1969-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994701">http://www.sciencedirect.com/science/book/9781928994701</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Enterprise directory and security implementation guide designing and implementing directories in your organization ent://SD_ILS/0/SD_ILS:253689 2024-11-19T00:19:13Z 2024-11-19T00:19:13Z Author&#160;Carrington, Charles (Charles Dudley)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780121604523">http://www.sciencedirect.com/science/book/9780121604523</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data networks routing, security, and performance optimization ent://SD_ILS/0/SD_ILS:253829 2024-11-19T00:19:13Z 2024-11-19T00:19:13Z Author&#160;Kenyon, Tony, 1960-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582715">http://www.sciencedirect.com/science/book/9781555582715</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hack proofing ColdFusion ent://SD_ILS/0/SD_ILS:253982 2024-11-19T00:19:13Z 2024-11-19T00:19:13Z Author&#160;Meyer, Greg.&#160;Casco, Steven.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994770">http://www.sciencedirect.com/science/book/9781928994770</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hack proofing XML ent://SD_ILS/0/SD_ILS:254000 2024-11-19T00:19:13Z 2024-11-19T00:19:13Z Author&#160;'Ken'@ftu.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836500">http://www.sciencedirect.com/science/book/9781931836500</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cisco security specialist's guide to PIX firewalls ent://SD_ILS/0/SD_ILS:254002 2024-11-19T00:19:13Z 2024-11-19T00:19:13Z Author&#160;Osipav, Vitaly.&#160;Sweeney, Mike.&#160;Weaver, Woody.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836630">http://www.sciencedirect.com/science/book/9781931836630</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Nokia network security solutions handbook ent://SD_ILS/0/SD_ILS:254004 2024-11-19T00:19:13Z 2024-11-19T00:19:13Z Author&#160;Maxwell, Doug.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836708">http://www.sciencedirect.com/science/book/9781931836708</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hack proofing your wireless network ent://SD_ILS/0/SD_ILS:254049 2024-11-19T00:19:13Z 2024-11-19T00:19:13Z Author&#160;Barnes, Christian.&#160;O'Farrell, Neal.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994596">http://www.sciencedirect.com/science/book/9781928994596</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing and controlling Cisco routers ent://SD_ILS/0/SD_ILS:290432 2024-11-19T00:19:13Z 2024-11-19T00:19:13Z Author&#160;Davis, Peter T.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031454">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for ubiquitous computing ent://SD_ILS/0/SD_ILS:301039 2024-11-19T00:19:13Z 2024-11-19T00:19:13Z Author&#160;Stajano, Frank.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/0470848693">http://dx.doi.org/10.1002/0470848693</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>