Search Results for Computer Security - Narrowed by: 2013SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity$0026qf$003dPUBDATE$002509Publication$002bDate$0025092013$0025092013$0026ps$003d300$0026isd$003dtrue?2024-11-19T00:22:03ZGuide to Computer Network Securityent://SD_ILS/0/SD_ILS:3310052024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Kizza, Joseph Migga. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331005.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4471-4543-1">http://dx.doi.org/10.1007/978-1-4471-4543-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Sequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transferent://SD_ILS/0/SD_ILS:621882024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Davies, Donald Watts, 1924- Price, W. L., ort.yaz.<br/>Preferred Shelf Number TK 5105 D43 1989<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Computer security literacy staying safe in a digital worldent://SD_ILS/0/SD_ILS:2908392024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Jacobson, Douglas. Idziorek, Joseph.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439856192">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Information and Computer Security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedingsent://SD_ILS/0/SD_ILS:3350982024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Sakiyama, Kazuo. editor. Terada, Masayuki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335098.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41383-4">http://dx.doi.org/10.1007/978-3-642-41383-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer Security – ESORICS 2013 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3349092024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Crampton, Jason. editor. Jajodia, Sushil. editor. Mayes, Keith. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334909.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40203-6">http://dx.doi.org/10.1007/978-3-642-40203-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer Safety, Reliability, and Security 32nd International Conference, SAFECOMP 2013, Toulouse, France, September 24-27, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3350052024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Bitsch, Friedemann. editor. Guiochet, Jérémie. editor. Kaâniche, Mohamed. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335005.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40793-2">http://dx.doi.org/10.1007/978-3-642-40793-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2891512024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2903202024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2871232024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Tipton, Harold F. Nozaki, Micki Krause.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439893159">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>FISMA and the risk management framework the new practice of federal cyber securityent://SD_ILS/0/SD_ILS:1459362024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Gantz, Stephen D. Philpott, Daniel R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496414">http://www.sciencedirect.com/science/book/9781597496414</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wireless reconnaissance in penetration testingent://SD_ILS/0/SD_ILS:1456902024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Neely, Matthew. Hamerstone, Alex. Sanyk, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497312">http://www.sciencedirect.com/science/book/9781597497312</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineersent://SD_ILS/0/SD_ILS:1469172024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor O'Connor, T. J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499576">http://www.sciencedirect.com/science/book/9781597499576</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>UTM security with Fortinet Mastering FortiOSent://SD_ILS/0/SD_ILS:1469342024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Tam, Kenneth.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497473">http://www.sciencedirect.com/science/book/9781597497473</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocolsent://SD_ILS/0/SD_ILS:1476022024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Raggo, Michael T. Hosmer, Chet.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497435">http://www.sciencedirect.com/science/book/9781597497435</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Elementary information securityent://SD_ILS/0/SD_ILS:2712722024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Smith, Richard E.<br/>Preferred Shelf Number QA76.9.A25 S652 2013<br/>Format: Books<br/>Availability Beytepe Library~1<br/>The complete guide to physical securityent://SD_ILS/0/SD_ILS:2906672024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Baker, Paul, 1958- Benny, Daniel J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420099645">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network attacks and defenses a hands-on approachent://SD_ILS/0/SD_ILS:2909242024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Trabelsi, Zouheir.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466517974">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Windows networking tools the complete guide to management, troubleshooting, and securityent://SD_ILS/0/SD_ILS:2916572024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Held, Gilbert, 1943-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466511071">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Discrete dynamical systems and chaotic machines theory and applicationsent://SD_ILS/0/SD_ILS:2917402024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Bahi, Jacques Mohcine. Guyeux, Christophe.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466554511">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Official (ISC)2 guide to the CISSP CBKent://SD_ILS/0/SD_ILS:2917432024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Tipton, Harold F., editor of compilation. Hernandez, Steven, editor of compilation.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466569782">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Automatic defense against zero-day polymorphic worms in communication networksent://SD_ILS/0/SD_ILS:2863072024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Mohammed, Mohssen, 1982- Pathan, Al-Sakib Khan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466557284">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Official (ISC)[superscript 2] guide to the CAP CBKent://SD_ILS/0/SD_ILS:2880562024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Howard, Patrick D.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439820766">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Iris biometric model for secured network accessent://SD_ILS/0/SD_ILS:2881602024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Khoury, Franjieh El.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466502147">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security policy development for compliance ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0ent://SD_ILS/0/SD_ILS:2881732024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Williams, Barry L.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466580596">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Technocrime, policing and surveillanceent://SD_ILS/0/SD_ILS:2606742024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Leman-Langlois, Stéphane, 1965-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203105245">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Data security, data mining and data management : technologies and challengesent://SD_ILS/0/SD_ILS:2809142024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor O'Byrne, Serge, editor of compilation.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=570680">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=570680</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Digital forensics for handheld devicesent://SD_ILS/0/SD_ILS:2862482024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Doherty, Eamon P.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439898789">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security for wireless sensor networks using identity-based cryptographyent://SD_ILS/0/SD_ILS:2862522024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Patil, Harsh Kupwade. Szygenda, Stephen A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439869024">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Handbook on mobile and ubiquitous computing status and perspectiveent://SD_ILS/0/SD_ILS:2862622024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Yang, Laurence Tianruo. Syukur, Evi. Loke, Seng.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439848128">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Handbook of SCADA/control systems securityent://SD_ILS/0/SD_ILS:2881552024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Radvanovsky, Robert. Brodsky, Jacob.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466502277">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The complete book of data anonymization from planning to implementationent://SD_ILS/0/SD_ILS:2890652024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Raghunathan, Balaji.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439877319">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>PRAGMATIC security metrics applying metametrics to information securityent://SD_ILS/0/SD_ILS:2899742024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Brotby, W. Krag. Hinson, Gary. Kabay, Michel E.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439881538">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Windows 8 kickstartent://SD_ILS/0/SD_ILS:2934082024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Russell, James Howard.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/windows-8-kickstart">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Privacy, Confidentiality, and Health Researchent://SD_ILS/0/SD_ILS:2379942024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Lowrance, William W..<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9781139107969">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in cyber security technology, operations, and experiencesent://SD_ILS/0/SD_ILS:2395912024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Hsu, D. Frank (Derbiau Frank), 1948- Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9780823250325/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information protection playbookent://SD_ILS/0/SD_ILS:3066492024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Kane, Greg, editor of compilation. Koppel, Lorna, editor of compilation.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124172326">http://www.sciencedirect.com/science/book/9780124172326</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Linux Malware Incident Response an Excerpt from Malware Forensic Field Guide for Linux Systems.ent://SD_ILS/0/SD_ILS:3066972024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Malin, Cameron H. Casey, Eoghan. Aquilina, James M.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124095076">http://www.sciencedirect.com/science/book/9780124095076</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The basics of web hacking tools and techniques to attack the Webent://SD_ILS/0/SD_ILS:3066992024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Pauli, Joshua J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166004">http://www.sciencedirect.com/science/book/9780124166004</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wireless reconnaissance in penetration testingent://SD_ILS/0/SD_ILS:3064602024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Neely, Matthew. Hamerstone, Alex. Sanyk, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497312">http://www.sciencedirect.com/science/book/9781597497312</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Federated identity primerent://SD_ILS/0/SD_ILS:3064612024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Rountree, Derrick.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124071896">http://www.sciencedirect.com/science/book/9780124071896</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Instant penetration testing setting up a test lab how-to : set up your own penetration testing lab using practical and precise recipesent://SD_ILS/0/SD_ILS:3130442024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Fadyushin, Vyacheslav.<br/>Preferred Shelf Number ONLINE(313044.1)<br/>Electronic Access Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpIPTSUTL3">http://app.knovel.com/web/toc.v/cid:kpIPTSUTL3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Secret history : the story of cryptologyent://SD_ILS/0/SD_ILS:3652582024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Bauer, Craig P.<br/>Preferred Shelf Number QA76.9.A25 B384 2013<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Applied network security monitoring collection, detection, and analysisent://SD_ILS/0/SD_ILS:3561222024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Sanders, Chris. Smith, Jason.<br/>Preferred Shelf Number ONLINE(356122.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124172081">http://www.sciencedirect.com/science/book/9780124172081</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber power : crime, conflict and security in cyberspaceent://SD_ILS/0/SD_ILS:3425982024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Ghernaouti-Hélie, Solange, 1958- author.<br/>Preferred Shelf Number ONLINE(342598.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466573055">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Delivering London 2012 ICT implementation and operationsent://SD_ILS/0/SD_ILS:5098892024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor IET, ed.<br/>Preferred Shelf Number XX(509889.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1049/PERICP2E">http://dx.doi.org/10.1049/PERICP2E</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Resilience, Security & Risk in Transportent://SD_ILS/0/SD_ILS:5098922024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor IET, ed.<br/>Preferred Shelf Number XX(509892.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1049/PERRSR3E">http://dx.doi.org/10.1049/PERRSR3E</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security for managersent://SD_ILS/0/SD_ILS:5165702024-11-19T00:22:03Z2024-11-19T00:22:03ZAuthor Workman, Michael D., 1957-. Phelps, Daniel C. Gathegi, John N.<br/>Preferred Shelf Number HF5548.37 W67 2013<br/>Format: Books<br/>Availability Beytepe Library~1<br/>