Search Results for Computer Security - Narrowed by: 2012SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity$0026qf$003dPUBDATE$002509Publication$002bDate$0025092012$0025092012$0026ps$003d300$0026isd$003dtrue?2024-11-18T23:11:37ZComputer security : principles and practiceent://SD_ILS/0/SD_ILS:3134732024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Stallings, William. Brown, Lawrie<br/>Preferred Shelf Number QA76.9 S73 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Sequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transferent://SD_ILS/0/SD_ILS:621882024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Davies, Donald Watts, 1924- Price, W. L., ort.yaz.<br/>Preferred Shelf Number TK 5105 D43 1989<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Computer Safety, Reliability, and Security SAFECOMP 2012 Workshops: Sassur, ASCoMS, DESEC4LCCI, ERCIM/EWICS, IWDE, Magdeburg, Germany, September 25-28, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1974192024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Ortmeier, Frank. editor. Daniel, Peter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33675-1">http://dx.doi.org/10.1007/978-3-642-33675-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer Safety, Reliability, and Security 31st International Conference, SAFECOMP 2012, Magdeburg, Germany, September 25-28, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1974202024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Ortmeier, Frank. editor. Daniel, Peter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33678-2">http://dx.doi.org/10.1007/978-3-642-33678-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer Network Security 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1974252024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Kotenko, Igor. editor. Skormin, Victor. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33704-8">http://dx.doi.org/10.1007/978-3-642-33704-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer Applications for Security, Control and System Engineering International Conferences, SecTech, CA, CES3 2012, Held in Conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1975862024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Kim, Tai-hoon. editor. Stoica, Adrian. editor. Fang, Wai-chi. editor. Vasilakos, Thanos. editor. Villalba, Javier García. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35264-5">http://dx.doi.org/10.1007/978-3-642-35264-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer Security – ESORICS 2012 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1973292024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Foresti, Sara. editor. Yung, Moti. editor. Martinelli, Fabio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33167-1">http://dx.doi.org/10.1007/978-3-642-33167-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Information and Computer Security 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1974752024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Hanaoka, Goichiro. editor. Yamauchi, Toshihiro. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34117-5">http://dx.doi.org/10.1007/978-3-642-34117-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Recent Trends in Computer Networks and Distributed Systems Security International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1974792024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Thampi, Sabu M. editor. Zomaya, Albert Y. editor. Strufe, Thorsten. editor. Alcaraz Calero, Jose M. editor. Thomas, Tony , 1927-1977 editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34135-9">http://dx.doi.org/10.1007/978-3-642-34135-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer architecture and security : fundamentals of designing secure computer systemsent://SD_ILS/0/SD_ILS:2488652024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Wang, Shuangbao Paul. Ledley, Robert Steven.<br/>Preferred Shelf Number QA76.9.A73 W36 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2891512024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2903202024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2871232024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Tipton, Harold F. Nozaki, Micki Krause.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439893159">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Privacy, Confidentiality, and Health Researchent://SD_ILS/0/SD_ILS:2379942024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Lowrance, William W..<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9781139107969">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practiceent://SD_ILS/0/SD_ILS:1452542024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Winterfeld, Steve. Andress, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124047372">http://www.sciencedirect.com/science/book/9780124047372</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Handbook on securing cyber-physical critical infrastructureent://SD_ILS/0/SD_ILS:1455792024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Das, Sajal K. Kant, Krishna. Zhang, Nan, 1982-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124158153">http://www.sciencedirect.com/science/book/9780124158153</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Windows forensic analysis toolkit advanced analysis techniques for Windows 7ent://SD_ILS/0/SD_ILS:1456892024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Carvey, Harlan A. Kolde, Jennifer.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497275">http://www.sciencedirect.com/science/book/9781597497275</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in intelligence and security informaticsent://SD_ILS/0/SD_ILS:1460552024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Mao, Wenji. Wang, Fei-Yue.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123972002">http://www.sciencedirect.com/science/book/9780123972002</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advanced persistent threat understanding the danger and how to protect your organizationent://SD_ILS/0/SD_ILS:1460562024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Cole, Eric.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499491">http://www.sciencedirect.com/science/book/9781597499491</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network intrusion analysis methodologies, tools, and techniques for incident analysis and responseent://SD_ILS/0/SD_ILS:1462742024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Fichera, Joe, 1966- Bolt, Steven.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499620">http://www.sciencedirect.com/science/book/9781597499620</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Embedded systems security practical methods for safe and secure software and systems developmentent://SD_ILS/0/SD_ILS:1464512024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Kleidermacher, David. Kleidermacher, Mike.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123868862">http://www.sciencedirect.com/science/book/9780123868862</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>SQL injection attacks and defenseent://SD_ILS/0/SD_ILS:1485162024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Clarke, Justin.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499637">http://www.sciencedirect.com/science/book/9781597499637</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Client-side attacks and defenseent://SD_ILS/0/SD_ILS:1487312024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Oriyano, Sean-Philip. Shimonski, Robert.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495905">http://www.sciencedirect.com/science/book/9781597495905</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>CISSP study guideent://SD_ILS/0/SD_ILS:1487692024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Conrad, Eric, 1967- Misenar, Seth. Feldman, Joshua.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499613">http://www.sciencedirect.com/science/book/9781597499613</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security risk assessment toolkit practical assessments through data collection and data analysisent://SD_ILS/0/SD_ILS:1454702024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Talabis, Mark. Martin, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497350">http://www.sciencedirect.com/science/book/9781597497350</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Low tech hacking street smarts for security professionalsent://SD_ILS/0/SD_ILS:1477422024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Wiles, Jack.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496650">http://www.sciencedirect.com/science/book/9781597496650</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The hacker's guide to OS X exploiting OS X from the root upent://SD_ILS/0/SD_ILS:1480062024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Bathurst, Robert. Rogers, Russ. Ghassemlouei, Alijohn.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499507">http://www.sciencedirect.com/science/book/9781597499507</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Malware forensics field guide for Windows dystems digital forensics field guidesent://SD_ILS/0/SD_ILS:1478982024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Malin, Cameron H. Casey, Eoghan. Aquilina, James M.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494724">http://www.sciencedirect.com/science/book/9781597494724</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking web apps detecting and preventing web application security problemsent://SD_ILS/0/SD_ILS:1481612024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Shema, Mike.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499514">http://www.sciencedirect.com/science/book/9781597499514</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>PCI compliance understand and implement effective PCI data security standard complianceent://SD_ILS/0/SD_ILS:1484292024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Chuvakin, Anton. Williams, Branden R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499484">http://www.sciencedirect.com/science/book/9781597499484</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network and application security fundamentals and practicesent://SD_ILS/0/SD_ILS:2889932024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Ganguly, Debashis. Lahiri, Shibamouli.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466502451">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Intelligent technologies for Web applicationsent://SD_ILS/0/SD_ILS:2890032024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Srinivas Sajja, Priti. Akerkar, Rajendra.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439871645">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2907632024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Tipton, Harold F. Nozaki, Micki Krause.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439853467">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Handbook on soft computing for video surveillanceent://SD_ILS/0/SD_ILS:2907962024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Pal, Sankar K. Petrosino, Alfredo. Maddalena, Lucia.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439856857">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Secure and resilient software requirements, test cases, and testing methodsent://SD_ILS/0/SD_ILS:2907992024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Merkow, Mark S. Raghavan, Lakshmikanth.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439866221">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Operating systems demystifiedent://SD_ILS/0/SD_ILS:2941012024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor McHoes, Ann McIver, 1950- Ballew, Joli.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/operating-systems-demystified">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wiki at war conflict in a socially networked worldent://SD_ILS/0/SD_ILS:2767002024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Carafano, James Jay, 1955- Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781603446587/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Robust control system networks how to achieve reliable control after Stuxnetent://SD_ILS/0/SD_ILS:2801812024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Langner, Ralph.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=501116">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=501116</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Asset protection through security awarenessent://SD_ILS/0/SD_ILS:2861362024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Speed, Tyler Justin.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439809839">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>CISO's guide to penetration testing a framework to plan, manage, and maximize benefitsent://SD_ILS/0/SD_ILS:2871052024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Tiller, James S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439880289">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Data mining tools for malware detectionent://SD_ILS/0/SD_ILS:2871022024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Masud, Mehedy. Khan, Latifur. Thuraisingham, Bhavani M.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439854556">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The 7 qualities of highly secure softwareent://SD_ILS/0/SD_ILS:2880552024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Paul, Mano.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439814475">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Defense against the black arts how hackers do what they do and how to protect against itent://SD_ILS/0/SD_ILS:2915812024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Varsalone, Jesse. McFadden, Matthew. Morrissey, Sean.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439821220">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Visual cryptography and secret image sharingent://SD_ILS/0/SD_ILS:2915822024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Cimato, Stelvio. Yang, Ching-Nung.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439837221">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Access contested security, identity, and resistance in Asian cyberspace information revolution and global politicsent://SD_ILS/0/SD_ILS:2475422024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Deibert, Ronald. Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9780262298919/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Reliability and availability of cloud computingent://SD_ILS/0/SD_ILS:2493832024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Bauer, Eric. Adams, Randee. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6266788">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6266788</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>RC4 stream cipher and its variantsent://SD_ILS/0/SD_ILS:2852492024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Paul, Goutam. Maitra, Subhamoy, 1970-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439831373">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity for industrial control systems SCADA, DCS, PLC, HMI, and SISent://SD_ILS/0/SD_ILS:2861402024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Macaulay, Tyson. Singer, Bryan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439801987">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity public sector threats and responsesent://SD_ILS/0/SD_ILS:2862022024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Andreasson, Kim J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439846643">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wiki at war conflict in a socially networked worldent://SD_ILS/0/SD_ILS:2418372024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Carafano, James Jay, 1955- Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781603446570/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking exposed 7 : network security secrets & solutionsent://SD_ILS/0/SD_ILS:2700332024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor McClure, Stuart. Scambray, Joel. Kurtz, George.<br/>Preferred Shelf Number TK5105.59 M48 2012<br/>Format: Books<br/>Availability Beytepe Library~1<br/>The healthy Mac preventive care, practical diagnostics, and proven remediesent://SD_ILS/0/SD_ILS:2934162024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Morris, Heather. Ballew, Joli.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/healthy-mac-preventive-care-practical-diagnostics-proven-remedies">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Windows 7 SP1ent://SD_ILS/0/SD_ILS:2934212024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Matthews, Martin S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/windows-7-sp1-quicksteps">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Windows 7 for seniorsent://SD_ILS/0/SD_ILS:2934242024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Matthews, Martin S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/windows-7-for-seniors-quicksteps">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computing for seniorsent://SD_ILS/0/SD_ILS:2934522024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Matthews, Martin S. Matthews, Carole Boggs. Bouton, Gary David, 1953- Sandberg, Bobbi.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/computing-for-seniors-quicksteps">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The healthy PC preventive care, home remedies, and green computingent://SD_ILS/0/SD_ILS:2934642024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Hart-Davis, Guy. Holzman, Carey. Healthy PC.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/healthy-pc-preventive-care-home-remedies-green-computing-2nd-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Windows 7ent://SD_ILS/0/SD_ILS:2934772024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Matthews, Martin S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/windows-7-quicksteps">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security metrics a beginner's guideent://SD_ILS/0/SD_ILS:2932382024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Wong, Caroline.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/security-metrics-beginners-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Securing the clicks network security in the age of social mediaent://SD_ILS/0/SD_ILS:2932402024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Bahadur, Gary. Inasi, Jason. Carvalho, Alex de. Powell, Juliette, 1976- Valencia, Connie.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/securing-clicks-network-security-in-age-social-media">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Web application security a beginner's guideent://SD_ILS/0/SD_ILS:2932412024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Sullivan, Bryan, 1974- Liu, Vincent.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/web-application-security-beginners-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Oracle WebLogic server 11g administration handbookent://SD_ILS/0/SD_ILS:2932432024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Alapati, Sam R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/oracle-weblogic-server-11g-administration-handbook">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber security policy guidebookent://SD_ILS/0/SD_ILS:2991952024-11-18T23:11:37Z2024-11-18T23:11:37ZAuthor Bayuk, Jennifer L.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118241530">An electronic book accessible through the World Wide Web; click for information</a>
<a href="http://lib.myilibrary.com?id=450182">Connect to MyiLibrary resource.</a>
ebrary <a href="http://site.ebrary.com/id/10630610">http://site.ebrary.com/id/10630610</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>