Search Results for Computer Security. - Narrowed by: 2002SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092002$0025092002$0026te$003dILS$0026ps$003d300?dt=list2024-12-28T11:58:13ZSequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transferent://SD_ILS/0/SD_ILS:621882024-12-28T11:58:13Z2024-12-28T11:58:13ZAuthor Davies, Donald Watts, 1924- Price, W. L., ort.yaz.<br/>Preferred Shelf Number TK 5105 D43 1989<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Building a global information assurance programent://SD_ILS/0/SD_ILS:2874732024-12-28T11:58:13Z2024-12-28T11:58:13ZAuthor Curts, Raymond J. Campbell, Douglas E., 1954-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203997550">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The total CISSP exam prep book practice questions, answers, and test taking tips and techniquesent://SD_ILS/0/SD_ILS:2904152024-12-28T11:58:13Z2024-12-28T11:58:13ZAuthor Peltier, Thomas R. Howard, Patrick D.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420031447">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security policies, procedures, and standards guidelines for effective information security managementent://SD_ILS/0/SD_ILS:2902092024-12-28T11:58:13Z2024-12-28T11:58:13ZAuthor Peltier, Thomas R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780849390326">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security for ubiquitous computingent://SD_ILS/0/SD_ILS:3010392024-12-28T11:58:13Z2024-12-28T11:58:13ZAuthor Stajano, Frank. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/0470848693">http://dx.doi.org/10.1002/0470848693</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Secure Internet practices best practices for securing systems in the Internet and e-Business ageent://SD_ILS/0/SD_ILS:2904272024-12-28T11:58:13Z2024-12-28T11:58:13ZAuthor McBride, Patrick.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420031478">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Securing and controlling Cisco routersent://SD_ILS/0/SD_ILS:2904322024-12-28T11:58:13Z2024-12-28T11:58:13ZAuthor Davis, Peter T.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420031454">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>A practical guide to security engineering and information assuranceent://SD_ILS/0/SD_ILS:2904612024-12-28T11:58:13Z2024-12-28T11:58:13ZAuthor Herrmann, Debra S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420031492">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Scene of the cybercrime computer forensics handbookent://SD_ILS/0/SD_ILS:2536152024-12-28T11:58:13Z2024-12-28T11:58:13ZAuthor Shinder, Debra Littlejohn. Tittel, Ed.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836654">http://www.sciencedirect.com/science/book/9781931836654</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Managing Cisco network securityent://SD_ILS/0/SD_ILS:2536162024-12-28T11:58:13Z2024-12-28T11:58:13ZAuthor Knipp, Eric. Danielyan, Edgar.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836562">http://www.sciencedirect.com/science/book/9781931836562</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hack proofing your identity in the information age protect your family on the internet!ent://SD_ILS/0/SD_ILS:2536172024-12-28T11:58:13Z2024-12-28T11:58:13ZAuthor Bidwell, Teri. Cross, Michael, 1965- Russell, Ryan, 1969-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836517">http://www.sciencedirect.com/science/book/9781931836517</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hack proofing your networkent://SD_ILS/0/SD_ILS:2536182024-12-28T11:58:13Z2024-12-28T11:58:13ZAuthor Ahmad, David R. Mirza. Russell, Ryan, 1969-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994701">http://www.sciencedirect.com/science/book/9781928994701</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security best practices 205 basic rulesent://SD_ILS/0/SD_ILS:2547792024-12-28T11:58:13Z2024-12-28T11:58:13ZAuthor Stefanek, George L.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781878707963">http://www.sciencedirect.com/science/book/9781878707963</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hack proofing your wireless networkent://SD_ILS/0/SD_ILS:2540492024-12-28T11:58:13Z2024-12-28T11:58:13ZAuthor Barnes, Christian. O'Farrell, Neal.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994596">http://www.sciencedirect.com/science/book/9781928994596</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>ISA server and beyond real world security solutions for Microsoft enterprise networksent://SD_ILS/0/SD_ILS:2540532024-12-28T11:58:13Z2024-12-28T11:58:13ZAuthor Shinder, Thomas W. Grasdal, Martin. Shinder, Debra Littlejohn.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836661">http://www.sciencedirect.com/science/book/9781931836661</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Data networks routing, security, and performance optimizationent://SD_ILS/0/SD_ILS:2538292024-12-28T11:58:13Z2024-12-28T11:58:13ZAuthor Kenyon, Tony, 1960-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582715">http://www.sciencedirect.com/science/book/9781555582715</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hack proofing ColdFusionent://SD_ILS/0/SD_ILS:2539822024-12-28T11:58:13Z2024-12-28T11:58:13ZAuthor Meyer, Greg. Casco, Steven.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994770">http://www.sciencedirect.com/science/book/9781928994770</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hack proofing XMLent://SD_ILS/0/SD_ILS:2540002024-12-28T11:58:13Z2024-12-28T11:58:13ZAuthor 'Ken'@ftu.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836500">http://www.sciencedirect.com/science/book/9781931836500</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cisco security specialist's guide to PIX firewallsent://SD_ILS/0/SD_ILS:2540022024-12-28T11:58:13Z2024-12-28T11:58:13ZAuthor Osipav, Vitaly. Sweeney, Mike. Weaver, Woody.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836630">http://www.sciencedirect.com/science/book/9781931836630</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Nokia network security solutions handbookent://SD_ILS/0/SD_ILS:2540042024-12-28T11:58:13Z2024-12-28T11:58:13ZAuthor Maxwell, Doug.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836708">http://www.sciencedirect.com/science/book/9781931836708</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Disappearing cryptography information hiding : steganography & watermarkingent://SD_ILS/0/SD_ILS:2539002024-12-28T11:58:13Z2024-12-28T11:58:13ZAuthor Wayner, Peter, 1964-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607699">http://www.sciencedirect.com/science/book/9781558607699</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Internet and Wireless Securityent://SD_ILS/0/SD_ILS:2476822024-12-28T11:58:13Z2024-12-28T11:58:13ZAuthor Temple, Robert, ed. Regnault, John, ed.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1049/PBBT004E">http://dx.doi.org/10.1049/PBBT004E</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Enterprise directory and security implementation guide designing and implementing directories in your organizationent://SD_ILS/0/SD_ILS:2536892024-12-28T11:58:13Z2024-12-28T11:58:13ZAuthor Carrington, Charles (Charles Dudley)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780121604523">http://www.sciencedirect.com/science/book/9780121604523</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Introduction to communication electronic warfare systemsent://SD_ILS/0/SD_ILS:765592024-12-28T11:58:13Z2024-12-28T11:58:13ZAuthor Poisel, Richard.<br/>Preferred Shelf Number UG 590 P65 2002<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Nokia network security solutions handbookent://SD_ILS/0/SD_ILS:811492024-12-28T11:58:13Z2024-12-28T11:58:13ZAuthor Maxwell, Doug. Amon, Cherie, ort. yaz.<br/>Preferred Shelf Number TK 5105.59 M451 2002<br/>Format: Books<br/>Availability Beytepe Library~1<br/>