Search Results for Computer Security - Narrowed by: Computer security. - Computers -- Access control. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Computers$002b--$002bAccess$002bcontrol.$002509Computers$002b--$002bAccess$002bcontrol.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300? 2024-09-10T02:38:18Z The state of the art in intrusion prevention and detection ent://SD_ILS/0/SD_ILS:356396 2024-09-10T02:38:18Z 2024-09-10T02:38:18Z Author&#160;Pathan, Al-Sakib Khan, editor.<br/>Preferred Shelf Number&#160;ONLINE(356396.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781482203523">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Federated identity primer ent://SD_ILS/0/SD_ILS:306461 2024-09-10T02:38:18Z 2024-09-10T02:38:18Z Author&#160;Rountree, Derrick.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124071896">http://www.sciencedirect.com/science/book/9780124071896</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed Windows Windows security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:293341 2024-09-10T02:38:18Z 2024-09-10T02:38:18Z Author&#160;Scambray, Joel.&#160;McClure, Stuart.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-windows-microsoft-security-secrets-solutions-third-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security information and event management (SIEM) implementation ent://SD_ILS/0/SD_ILS:293279 2024-09-10T02:38:18Z 2024-09-10T02:38:18Z Author&#160;Miller, David, 1959 Nov. 5-&#160;Harris, Shon.&#160;Harper, Allen.&#160;VanDyke, Stephen.&#160;Blask, Chris.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/security-information-event-management-siem-implementation">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Oracle security developing secure database and middleware environments ent://SD_ILS/0/SD_ILS:293376 2024-09-10T02:38:18Z 2024-09-10T02:38:18Z Author&#160;Knox, David (David C.)&#160;Gaetjen, Scott.&#160;Jahangir, Hamza.&#160;Muth, Tyler.&#160;Sack, Patrick.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/applied-oracle-security-developing-secure-database-middleware-environments">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed Linux Linux security secrets and solutions. ent://SD_ILS/0/SD_ILS:293324 2024-09-10T02:38:18Z 2024-09-10T02:38:18Z Author&#160;Hatch, Brian. Hacking Linux exposed.&#160;ISECOM (Organization)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-linux">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed malware &amp; rootkits malware &amp; rootkits security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:293397 2024-09-10T02:38:18Z 2024-09-10T02:38:18Z Author&#160;Davis, Michael A.&#160;Bodmer, Sean.&#160;LeMasters, Aaron.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-malware-rootkits">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Adaptive security management architecture ent://SD_ILS/0/SD_ILS:288451 2024-09-10T02:38:18Z 2024-09-10T02:38:18Z Author&#160;Tiller, James S.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420013375">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managed code rootkits hooking into runtime environments ent://SD_ILS/0/SD_ILS:147836 2024-09-10T02:38:18Z 2024-09-10T02:38:18Z Author&#160;Metula, Erez.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495745">http://www.sciencedirect.com/science/book/9781597495745</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Infosecurity 2008 threat analysis ent://SD_ILS/0/SD_ILS:145541 2024-09-10T02:38:18Z 2024-09-10T02:38:18Z Author&#160;Clark, Champ, III.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492249">http://www.sciencedirect.com/science/book/9781597492249</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Oracle identity management governance, risk, and compliance architecture ent://SD_ILS/0/SD_ILS:287794 2024-09-10T02:38:18Z 2024-09-10T02:38:18Z Author&#160;Pohlman, Marlin B.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420072488">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mechanics of user identification and authentication fundamentals of identity management ent://SD_ILS/0/SD_ILS:286830 2024-09-10T02:38:18Z 2024-09-10T02:38:18Z Author&#160;Todorov, Dobromir.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420052206">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:253676 2024-09-10T02:38:18Z 2024-09-10T02:38:18Z Author&#160;Long, Johnny.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490214">http://www.sciencedirect.com/science/book/9781597490214</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security assessment case studies for implementing the NSA IAM ent://SD_ILS/0/SD_ILS:254030 2024-09-10T02:38:18Z 2024-09-10T02:38:18Z Author&#160;Rogers, Russ.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266962">http://www.sciencedirect.com/science/book/9781932266962</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>