Search Results for Computer Security - Narrowed by: 2004SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity$0026qf$003dPUBDATE$002509Publication$002bDate$0025092004$0025092004$0026ps$003d300$0026isd$003dtrue?2024-11-19T02:48:35ZSequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transferent://SD_ILS/0/SD_ILS:621882024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor Davies, Donald Watts, 1924- Price, W. L., ort.yaz.<br/>Preferred Shelf Number TK 5105 D43 1989<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2891512024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2903202024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Digital fortressent://SD_ILS/0/SD_ILS:3541672024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor Brown, Dan, 1964- .<br/>Preferred Shelf Number PS3552.R685434 D53 2009<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Sockets, shellcode, porting & coding reverse engineering exploits and tool coding for security professionalsent://SD_ILS/0/SD_ILS:2539382024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor Foster, James C. Price, Mike (Mike Morgan) McClure, Stuart.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490054">http://www.sciencedirect.com/science/book/9781597490054</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Disruptive security technologies with mobile code and peer-to-peer networksent://SD_ILS/0/SD_ILS:2913052024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor Brooks, R. R. (Richard R.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420038880">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Dijital kaleent://SD_ILS/0/SD_ILS:963222024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor Brown, Dan, 1964- Soner, Sezer, çev. Huvaj, Muharrem Nesij, haz.<br/>Preferred Shelf Number PS3552.R685434 D542 2004<br/>Format: Books<br/>Availability Beytepe Library~7<br/>Exploiting software : how to break codeent://SD_ILS/0/SD_ILS:965562024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor Hoglund, Greg. McGraw, Gary, 1966- ort. yaz.<br/>Preferred Shelf Number QA 76.9.A25 H635 2004<br/>Format: Books<br/>Availability Beytepe Library~1<br/>How to break software security : effective technigues for security testingent://SD_ILS/0/SD_ILS:1055842024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor Whittaker, James A., 1965- Thomson, Herbert H., ort. yaz.<br/>Preferred Shelf Number QA 76.9.A25 W48 2004<br/>Format: Books<br/>Availability Beytepe Library~2<br/>Hacking : Bilişim korsanlığı ve korunma yöntemlerient://SD_ILS/0/SD_ILS:885782024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor Yılmaz, Davut.<br/>Preferred Shelf Number TK 5105.59 Y56 2004<br/>Format: Books<br/>Availability Beytepe Library~1<br/>İnternette güvenlik ve Hacker Cracker meselesi : el kitabıent://SD_ILS/0/SD_ILS:1041302024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor Güven, Mehmet.<br/>Preferred Shelf Number QA 76.9.A25 G88 2004<br/>Format: Books<br/>Availability Beytepe Library~2<br/>Secure architectures with OpenBSDent://SD_ILS/0/SD_ILS:1095062024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor Palmer, Brandon. Nazario, Jose, ort. yaz.<br/>Preferred Shelf Number QA76.76.O63 P335 2004<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Network perimeter security building defense in-depthent://SD_ILS/0/SD_ILS:2910682024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor Riggs, Cliff.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203508046">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Investigator's guide to steganographyent://SD_ILS/0/SD_ILS:2864022024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor Kipper, Gregory.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203504765">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Protocols for secure electronic commerceent://SD_ILS/0/SD_ILS:2894952024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor Sherif, Mostafa Hashem.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420040012">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Public key infrastructure building trusted applications and Web servicesent://SD_ILS/0/SD_ILS:2901082024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor Vacca, John R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203498156">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security policies and procedures a practitioner's referenceent://SD_ILS/0/SD_ILS:2901372024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor Peltier, Thomas R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203488737">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Policy-based network management solutions for the next generationent://SD_ILS/0/SD_ILS:2539182024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor Strassner, John C.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558608597">http://www.sciencedirect.com/science/book/9781558608597</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking the code ASP.NET web application securityent://SD_ILS/0/SD_ILS:2540222024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor Burnett, Mark M. Foster, James C.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266658">http://www.sciencedirect.com/science/book/9781932266658</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Ethereal packet sniffingent://SD_ILS/0/SD_ILS:2540262024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor Orebaugh, Angela. Morris, Greg. Warnicke, Ed. Ramirez, Gilbert. Syngress Media, Inc.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266825">http://www.sciencedirect.com/science/book/9781932266825</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Check Point Next Generation with application intelligence security administrationent://SD_ILS/0/SD_ILS:2540292024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor Tobkin, Chris. Kligerman, Daniel.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266894">http://www.sciencedirect.com/science/book/9781932266894</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security assessment case studies for implementing the NSA IAMent://SD_ILS/0/SD_ILS:2540302024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor Rogers, Russ.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266962">http://www.sciencedirect.com/science/book/9781932266962</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wireless operational securityent://SD_ILS/0/SD_ILS:2540592024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor Rittinghouse, John W. Ransome, James F.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583170">http://www.sciencedirect.com/science/book/9781555583170</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security for Mobilityent://SD_ILS/0/SD_ILS:2479902024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor Mitchell, Chris J., ed.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1049/PBTE051E">http://dx.doi.org/10.1049/PBTE051E</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security sage's guide to hardening the network infrastructureent://SD_ILS/0/SD_ILS:2536362024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor Andrés, Steven.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836012">http://www.sciencedirect.com/science/book/9781931836012</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Managing and securing a Cisco structured wireless-aware networkent://SD_ILS/0/SD_ILS:2536372024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor Wall, David.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266917">http://www.sciencedirect.com/science/book/9781932266917</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Zero day exploit countdown to darknessent://SD_ILS/0/SD_ILS:2536432024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor Shein, Rob. Sachs, Marcus H.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Volltext <a href="http://www.sciencedirect.com/science/book/9781931836098">http://www.sciencedirect.com/science/book/9781931836098</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Programmer's ultimate security deskrefent://SD_ILS/0/SD_ILS:2536462024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor Foster, James C. Foster, Stephen C.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266726">http://www.sciencedirect.com/science/book/9781932266726</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Implementing homeland security for enterprise ITent://SD_ILS/0/SD_ILS:2536562024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor Erbschloe, Michael.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">http://www.sciencedirect.com/science/book/9781555583125</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Windows Server 2003 security infrastructuresent://SD_ILS/0/SD_ILS:2538372024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor Clercq, Jan de, 1968-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582838">http://www.sciencedirect.com/science/book/9781555582838</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>HP Nonstop server security a practical handbookent://SD_ILS/0/SD_ILS:2538492024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor Hill, Terri. Alvarado, Ellen. XYPRO Technology Corporation.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583149">http://www.sciencedirect.com/science/book/9781555583149</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>WarDriving drive, detect, defend : a guide to wireless securityent://SD_ILS/0/SD_ILS:2539882024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor Hurley, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836036">http://www.sciencedirect.com/science/book/9781931836036</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Snort 2.1 intrusion detectionent://SD_ILS/0/SD_ILS:2539892024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor Beale, Jay. Alder, Raven.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836043">http://www.sciencedirect.com/science/book/9781931836043</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Stealing the network how to own a continentent://SD_ILS/0/SD_ILS:2539902024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor 131ah. Russell, Ryan, 1969- Moss, Jeff.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836050">http://www.sciencedirect.com/science/book/9781931836050</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Nessus network auditingent://SD_ILS/0/SD_ILS:2539912024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor Deraison, Renaud. Syngress Media, Inc.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836081">http://www.sciencedirect.com/science/book/9781931836081</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber adversary characterization auditing the hacker mindent://SD_ILS/0/SD_ILS:2539922024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor Parker, Tom, 1982-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836111">http://www.sciencedirect.com/science/book/9781931836111</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>CYA securing Exchange Server 2003 and Outlook Web Access : cover your a** by getting it right the first timeent://SD_ILS/0/SD_ILS:2539942024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor Walther, Henrik. Santry, Patrick.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836241">http://www.sciencedirect.com/science/book/9781931836241</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>CYA securing IIS 6.0 : cover your a** by getting it right the first timeent://SD_ILS/0/SD_ILS:2539952024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor Cheah, Chun Hai. Schaefer, Ken. Peiris, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836258">http://www.sciencedirect.com/science/book/9781931836258</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Malware : fighting malicious codeent://SD_ILS/0/SD_ILS:2677372024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor Skoudis, Ed. Zeltser, Lenny.<br/>Preferred Shelf Number QA76.9.A25 S58 2004<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Strategic information securityent://SD_ILS/0/SD_ILS:2845782024-11-19T02:48:35Z2024-11-19T02:48:35ZAuthor Wylder, John.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203497081">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>