Search Results for Computer Security - Narrowed by: 2011
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity$0026qf$003dPUBDATE$002509Publication$002bDate$0025092011$0025092011$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?
2025-12-10T19:21:23Z
Sequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transfer
ent://SD_ILS/0/SD_ILS:62188
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Davies, Donald Watts, 1924- Price, W. L., ort.yaz.<br/>Preferred Shelf Number TK 5105 D43 1989<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Computer Security – ESORICS 2011 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14,2011. Proceedings
ent://SD_ILS/0/SD_ILS:195458
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Atluri, Vijay. editor. Diaz, Claudia. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-23822-2">http://dx.doi.org/10.1007/978-3-642-23822-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Safety, Reliability, and Security 30th International Conference,SAFECOMP 2011, Naples, Italy, September 19-22, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195586
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Flammini, Francesco. editor. Bologna, Sandro. editor. Vittorini, Valeria. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24270-0">http://dx.doi.org/10.1007/978-3-642-24270-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Information and Computer Security 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings
ent://SD_ILS/0/SD_ILS:195856
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Iwata, Tetsu. editor. Nishigaki, Masakatsu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25141-2">http://dx.doi.org/10.1007/978-3-642-25141-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing the cloud cloud computer security techniques and tactics
ent://SD_ILS/0/SD_ILS:148980
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Winkler, J. R. (Joachim R.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:539793
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Tipton, Harold F. Nozaki, Micki Krause.<br/>Preferred Shelf Number QA76.9 .A25 I54165 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439893159">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:542831
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number QA76.9 .A25 I54165 2003<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420003406">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Cybercrime : investigating high-technology computer crime
ent://SD_ILS/0/SD_ILS:544523
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Moore, Robert, 1976-, author.<br/>Preferred Shelf Number HV8079 .C65 M66 2015<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781315721767">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:538782
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Tipton, Harold F. Nozaki, Micki Krause.<br/>Preferred Shelf Number QA76.9 .A25 I54165<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439853467">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
The Law and Economics of Cybersecurity
ent://SD_ILS/0/SD_ILS:235518
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Grady, Mark F.. Parisi, Francesco.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511511523">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ninja hacking unconventional penetration testing tactics and techniques
ent://SD_ILS/0/SD_ILS:146263
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Wilhelm, Thomas. Andress, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495882">http://www.sciencedirect.com/science/book/9781597495882</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Eleventh hour CISSP study guide
ent://SD_ILS/0/SD_ILS:146597
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Conrad, Eric, 1967- Misenar, Seth. Feldman, Joshua.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495660">http://www.sciencedirect.com/science/book/9781597495660</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Web application obfuscation -/WAFs.. Evasion.. Filters//alert (/Obfuscation/)-
ent://SD_ILS/0/SD_ILS:146922
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Heiderich, Mario.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496049">http://www.sciencedirect.com/science/book/9781597496049</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber attacks protecting national infrastructure
ent://SD_ILS/0/SD_ILS:147506
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Amoroso, Edward G.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123849175">http://www.sciencedirect.com/science/book/9780123849175</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Penetration tester's open source toolkit
ent://SD_ILS/0/SD_ILS:148225
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Faircloth, Jeremy.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496278">http://www.sciencedirect.com/science/book/9781597496278</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Windows Registry Forensics Advanced Digital Forensic Analysis of the Windows Registry.
ent://SD_ILS/0/SD_ILS:145659
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Carvey, Harlan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495806">http://www.sciencedirect.com/science/book/9781597495806</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Coding for penetration testers building better tools
ent://SD_ILS/0/SD_ILS:148785
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Andress, Jason. Linn, Ryan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497299">http://www.sciencedirect.com/science/book/9781597497299</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing SQL server protecting your database from attackers
ent://SD_ILS/0/SD_ILS:149034
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Cherry, Denny.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496254">http://www.sciencedirect.com/science/book/9781597496254</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wars of disruption and resilience cybered conflict, power, and national security
ent://SD_ILS/0/SD_ILS:244312
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Demchak, Chris C. Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9780820341378/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security strategies in Windows platforms and applications
ent://SD_ILS/0/SD_ILS:271537
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Solomon, Michael.<br/>Preferred Shelf Number QA76.76.O63 S64 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Security strategies in Linux platforms and applications
ent://SD_ILS/0/SD_ILS:271539
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Jang, Michael H.<br/>Preferred Shelf Number QA76.76.O63 J3638 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Engineering information security the application of systems engineering concepts to achieve information assurance
ent://SD_ILS/0/SD_ILS:249916
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Jacobs, Stuart.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The theory that would not die : how Bayes' rule cracked the enigma code, hunted down Russian submarines, & emerged triumphant from two centuries of controversy
ent://SD_ILS/0/SD_ILS:375386
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author McGrayne, Sharon Bertsch.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.jstor.org/stable/10.2307/j.ctt1np76s">http://www.jstor.org/stable/10.2307/j.ctt1np76s</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography and network security
ent://SD_ILS/0/SD_ILS:386241
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Kahate, Atul.<br/>Preferred Shelf Number TK5105.59 K12 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Hacker techniques, tools, and incident handling
ent://SD_ILS/0/SD_ILS:271438
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Oriyano, Sean-Philip. Gregg, Michael (Michael C.)<br/>Preferred Shelf Number TK5105.59 O786 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Network security essentials : applications and standards
ent://SD_ILS/0/SD_ILS:271446
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Stallings, William.<br/>Preferred Shelf Number TK5105.59 S782 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Network security firewalls and VPNs
ent://SD_ILS/0/SD_ILS:271452
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Stewart, James Michael.<br/>Preferred Shelf Number TK5105.59 S758 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Readings and cases in information security : law and ethics
ent://SD_ILS/0/SD_ILS:267743
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Whitman, Michael E. Mattord, Herbert J.<br/>Preferred Shelf Number TK5105.878 W54 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Auditing IT infrastructures for compliance
ent://SD_ILS/0/SD_ILS:271151
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Weiss, Martin M. Solomon, Michael G.<br/>Preferred Shelf Number QA76.9.A25 W428 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Managing risk in information systems
ent://SD_ILS/0/SD_ILS:271251
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Gibson, Darril.<br/>Preferred Shelf Number QA76.9.A25 G5 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Oracle Fusion middleware 11g architecture and management
ent://SD_ILS/0/SD_ILS:293252
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Shafii, Reza. Lee, Stephen, 1975 June 8- Konduri, Gangadhar.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/oracle-fusion-middleware-11g-architecture-management">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Gray hat hacking the ethical hacker's handbook
ent://SD_ILS/0/SD_ILS:293255
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Harris, Shon. Harper, Allen. Eagle, Chris. Ness, Jonathan. Lenkey, Gideon.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/gray-hat-hacking-ethical-hackers-handbook-3rd-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IT auditing using controls to protect information assets
ent://SD_ILS/0/SD_ILS:293262
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Davis, Chris (Christopher Michael) Schiller, Mike. Wheeler, Kevin.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/auditing-using-controls-to-protect-information-assets-2nd-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
iPad & iPhone administrator's guide enterprise deployment strategies and security solutions
ent://SD_ILS/0/SD_ILS:293268
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Hart-Davis, Guy.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/ipad-iphone-administrators-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed web applications web application security secrets and solutions
ent://SD_ILS/0/SD_ILS:293277
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Scambray, Joel. Liu, Vincent. Sima, Caleb.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-web-applications-3e">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security information and event management (SIEM) implementation
ent://SD_ILS/0/SD_ILS:293279
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Miller, David, 1959 Nov. 5- Harris, Shon. Harper, Allen. VanDyke, Stephen. Blask, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/security-information-event-management-siem-implementation">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IT security metrics a practical framework for measuring security & protecting data
ent://SD_ILS/0/SD_ILS:293294
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Hayden, Lance.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/security-metrics-practical-framework-for-measuring-protecting-data">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed Windows Windows security secrets & solutions
ent://SD_ILS/0/SD_ILS:293341
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Scambray, Joel. McClure, Stuart.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-windows-microsoft-security-secrets-solutions-third-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mac OS X system administration
ent://SD_ILS/0/SD_ILS:293298
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Hart-Davis, Guy.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/mac-os-x-system-administration">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed Web 2.0 Web 2.0 security secrets and solutions
ent://SD_ILS/0/SD_ILS:293352
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Cannings, Rich. Dwivedi, Himanshu. Lackey, Zane.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-web-20-security-secrets-solutions">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Oracle Enterprise manager 10g grid control implementation guide
ent://SD_ILS/0/SD_ILS:293355
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author New, Michael.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/oracle-enterprise-manager-10g-grid-control-implementation-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Networking a beginner's guide
ent://SD_ILS/0/SD_ILS:293314
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Hallberg, Bruce A., 1964-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/networking-beginners-guide-fifth-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Microsoft Windows server 2008 the complete reference
ent://SD_ILS/0/SD_ILS:293367
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Ruest, Danielle. Ruest, Nelson.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/microsoft-windows-server-2008-complete-reference">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Microsoft Windows server 2008 a beginner's guide
ent://SD_ILS/0/SD_ILS:293368
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Matthews, Martin S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/microsoft-windows-server-2008-beginners-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Citrix Access Suite 4 advanced concepts the official guide
ent://SD_ILS/0/SD_ILS:293372
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Kaplan, Steve, 1955- Jones, Andy.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/citrix-access-suite-4-advanced-concepts-official-guide-second-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Oracle security developing secure database and middleware environments
ent://SD_ILS/0/SD_ILS:293376
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Knox, David (David C.) Gaetjen, Scott. Jahangir, Hamza. Muth, Tyler. Sack, Patrick.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/applied-oracle-security-developing-secure-database-middleware-environments">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed malware & rootkits malware & rootkits security secrets & solutions
ent://SD_ILS/0/SD_ILS:293397
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Davis, Michael A. Bodmer, Sean. LeMasters, Aaron.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-malware-rootkits">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
CNET do-it-yourself home networking projects 24 cool things you didn't know you could do!
ent://SD_ILS/0/SD_ILS:293687
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Aspinwall, Jim. CNET (Firm)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/cnet-doityourself-home-networking-projects">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Schaum's outline of theory and problems of computer networking
ent://SD_ILS/0/SD_ILS:293925
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Tittel, Ed.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/schaums-outline-computer-networking">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Schaum's outline of fundamentals of relational databases
ent://SD_ILS/0/SD_ILS:293961
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Mata-Toledo, Ramon A. Cushman, Pauline K.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/schaums-outline-fundamentals-relational-databases">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security principles and practice
ent://SD_ILS/0/SD_ILS:298878
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Stamp, Mark.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118027974">An electronic book accessible through the World Wide Web; click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=738753">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=738753</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10478419">http://site.ebrary.com/lib/alltitles/Doc?id=10478419</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=738753">http://swb.eblib.com/patron/FullRecord.aspx?p=738753</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Auditing cloud computing a security and privacy guide
ent://SD_ILS/0/SD_ILS:299263
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Halpert, Ben, 1986-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=44303">http://www.books24x7.com/marc.asp?bookid=44303</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118269091">http://dx.doi.org/10.1002/9781118269091</a>
OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50</a>
OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in computing
ent://SD_ILS/0/SD_ILS:313297
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Pfleeger, Charles P., 1948-<br/>Preferred Shelf Number QA76.9 A25 P45 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Security policies and implementation issues
ent://SD_ILS/0/SD_ILS:271534
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Johnson, Rob (Robert) Merkow, Mark S.<br/>Preferred Shelf Number QA76.9.A25 J64 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Home networking demystified a self-teaching guide
ent://SD_ILS/0/SD_ILS:294143
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Long, Larry E.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/home-networking-demystified">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Microsoft Windows Vista administration
ent://SD_ILS/0/SD_ILS:293327
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Velte, Anthony T. Glendenning, Dennis R. (Dennis Robert) Velte, Toby J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/microsoft-windows-vista-administration">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Fedora 7 & Red Hat Enterprise Linux the complete reference
ent://SD_ILS/0/SD_ILS:293328
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Petersen, Richard, 1949-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/fedora-core-7-red-hat-enterprise-linux-complete-reference">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Designing an IAM framework with Oracle identity and access management suite
ent://SD_ILS/0/SD_ILS:293289
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Scheidel, Jeff.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/designing-iam-framework-oracle-identity-access-management-suite">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Linux the complete reference
ent://SD_ILS/0/SD_ILS:293343
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Petersen, Richard, 1949-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/linux-complete-reference-sixth-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed wireless wireless security secrets & solutions
ent://SD_ILS/0/SD_ILS:293300
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Cache, Johnny. Wright, Joshua. Liu, Vincent.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-wireless-second-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mobile application security
ent://SD_ILS/0/SD_ILS:293312
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Dwivedi, Himanshu. Clark, Chris, 1980- Thiel, David V.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/mobile-application-security">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
24 deadly sins of software security programming flaws and how to fix them
ent://SD_ILS/0/SD_ILS:293319
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Howard, Michael, 1965- LeBlanc, David, 1960- Viega, John.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/24-deadly-sins-software-security-programming-flaws-how-to-fix-them">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cisco ASA configuration
ent://SD_ILS/0/SD_ILS:293322
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Deal, Richard A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/cisco-asa-configuration">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed Linux Linux security secrets and solutions.
ent://SD_ILS/0/SD_ILS:293324
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Hatch, Brian. Hacking Linux exposed. ISECOM (Organization)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-linux">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Schaum's outline of fundamentals of SQL programming
ent://SD_ILS/0/SD_ILS:293910
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Mata-Toledo, Ramon A. Cushman, Pauline K.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/schaums-outline-fundamentals-sql-programming">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Implementing SSL/TLS using cryptography and PKI
ent://SD_ILS/0/SD_ILS:303838
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Davies, Joshua A. (Joshua Aaron)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255797">An electronic book accessible through the World Wide Web; click for information</a>
<a href="http://proquest.safaribooksonline.com/?fpi=9780470920411">Available by subscription from Safari Books Online</a>
<a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=706899">Click here to view book</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40694">http://www.books24x7.com/marc.asp?bookid=40694</a>
Volltext <a href="http://proquest.safaribooksonline.com/9780470920411">http://proquest.safaribooksonline.com/9780470920411</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The basics of information security understanding the fundamentals of InfoSec in theory and practice
ent://SD_ILS/0/SD_ILS:145371
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Andress, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Industrial network security securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems
ent://SD_ILS/0/SD_ILS:145457
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Knapp, Eric.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496452">http://www.sciencedirect.com/science/book/9781597496452</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Thor's Microsoft security bible a collection of practical security techniques
ent://SD_ILS/0/SD_ILS:146808
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Mullen, Timothy M.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495721">http://www.sciencedirect.com/science/book/9781597495721</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber warfare techniques, tactics and tools for security practitioners
ent://SD_ILS/0/SD_ILS:147479
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Andress, Jason. Winterfeld, Steve. Rogers, Russ.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496377">http://www.sciencedirect.com/science/book/9781597496377</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security 2020 reduce security risks this decade
ent://SD_ILS/0/SD_ILS:318966
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Howard, Doug. Prince, Kevin.<br/>Preferred Shelf Number ONLINE(318966.1)<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255803">An electronic book accessible through the World Wide Web; click for information</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40805">http://www.books24x7.com/marc.asp?bookid=40805</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=694289">http://public.eblib.com/choice/publicfullrecord.aspx?p=694289</a>
ebrary <a href="http://site.ebrary.com/id/10469690">http://site.ebrary.com/id/10469690</a>
MyiLibrary <a href="http://www.myilibrary.com?id=294413">http://www.myilibrary.com?id=294413</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The security risk assessment handbook : a complete guide for performing security risk assessments
ent://SD_ILS/0/SD_ILS:539743
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Landoll, Douglas J., author.<br/>Preferred Shelf Number HF5548.37 .L358 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439821497">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Adaptive security management architecture
ent://SD_ILS/0/SD_ILS:541852
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Tiller, James S., author.<br/>Preferred Shelf Number QA76.9 .A25 T55 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420013375">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Official (ISC)[superscript 2] guide to the ISSAP CBK
ent://SD_ILS/0/SD_ILS:544376
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Tipton, Harold F. International Information Systems Security Certification Consortium.<br/>Preferred Shelf Number QA76.3 .O384 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439800980">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Machine learning forensics for law enforcement, security, and intelligence
ent://SD_ILS/0/SD_ILS:544765
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Mena, Jesus., author.<br/>Preferred Shelf Number HV8073 .M395 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439860700">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Security of self-organizing networks : MANET, WSN, WMN, VANET
ent://SD_ILS/0/SD_ILS:544711
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Pathan, Al-Sakib Khan.<br/>Preferred Shelf Number TK5105.77 .S43 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439819203">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Security and policy driven computing
ent://SD_ILS/0/SD_ILS:539761
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Liu, Lei, 1968, author.<br/>Preferred Shelf Number QA76.9 .A25 L587 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439825808">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
FISMA principles and best practices : beyond compliance
ent://SD_ILS/0/SD_ILS:539841
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Howard, Patrick D., author.<br/>Preferred Shelf Number QA76.9 .A25 H69 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420078305">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Secure semantic service-oriented systems
ent://SD_ILS/0/SD_ILS:540399
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Thuraisingham, Bhavani M., author.<br/>Preferred Shelf Number TK5105.5828 .T48 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420073324">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Security patch management
ent://SD_ILS/0/SD_ILS:542763
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Nicastro, Felicia M., author.<br/>Preferred Shelf Number QA76.9 .A25 N53 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439825006">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Data mining and machine learning in cybersecurity
ent://SD_ILS/0/SD_ILS:540614
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Dua, Sumeet., author. Du, Xian.<br/>Preferred Shelf Number QA76.9 .D343 D825 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439839430">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Practical risk management for the CIO
ent://SD_ILS/0/SD_ILS:541595
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Scherling, Mark., author.<br/>Preferred Shelf Number HF5548.37 .S34 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439856543">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Official (ISC)2 guide to the CSSLP
ent://SD_ILS/0/SD_ILS:541754
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Paul, Mano., author.<br/>Preferred Shelf Number QA76.76 .D47 P3775 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439826065">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Official (ISC)2 guide to the SSCP CBK
ent://SD_ILS/0/SD_ILS:543369
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Tipton, Harold F. International Information Systems Security Certification Consortium.<br/>Preferred Shelf Number QA76.3 .O3845 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439804841">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Honeypot : a new paradigm to information security
ent://SD_ILS/0/SD_ILS:545590
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Joshi, R. C., author. Sardana, Anjali.<br/>Preferred Shelf Number QA76.9 .A25 J66 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439869994">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Security de-engineering : solving the problems in information risk management
ent://SD_ILS/0/SD_ILS:545608
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Tibble, Ian., author.<br/>Preferred Shelf Number HF5548.37 .T53 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439868355">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Social engineering : the art of human hacking
ent://SD_ILS/0/SD_ILS:377976
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Hadnagy, Christopher.<br/>Preferred Shelf Number QA76.9.C66 H33 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Official (ISC)2 guide to the ISSMP CBK
ent://SD_ILS/0/SD_ILS:544375
2025-12-10T19:21:23Z
2025-12-10T19:21:23Z
Author Tipton, Harold F.<br/>Preferred Shelf Number QA76.9 .A25 O34 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420094442">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>