Search Results for Computer Security. - Narrowed by: 2004 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092004$0025092004$0026te$003dILS$0026ps$003d300$0026isd$003dtrue?dt=list 2024-12-29T02:07:32Z Sequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transfer ent://SD_ILS/0/SD_ILS:62188 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;Davies, Donald Watts, 1924-&#160;Price, W. L., ort.yaz.<br/>Preferred Shelf Number&#160;TK 5105 D43 1989<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:289151 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:290320 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital fortress ent://SD_ILS/0/SD_ILS:354167 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;Brown, Dan, 1964- .<br/>Preferred Shelf Number&#160;PS3552.R685434 D53 2009<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Disruptive security technologies with mobile code and peer-to-peer networks ent://SD_ILS/0/SD_ILS:291305 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;Brooks, R. R. (Richard R.)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420038880">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sockets, shellcode, porting &amp; coding reverse engineering exploits and tool coding for security professionals ent://SD_ILS/0/SD_ILS:253938 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;Foster, James C.&#160;Price, Mike (Mike Morgan)&#160;McClure, Stuart.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490054">http://www.sciencedirect.com/science/book/9781597490054</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Strategic information security ent://SD_ILS/0/SD_ILS:284578 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;Wylder, John.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203497081">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public key infrastructure building trusted applications and Web services ent://SD_ILS/0/SD_ILS:290108 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;Vacca, John R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203498156">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network perimeter security building defense in-depth ent://SD_ILS/0/SD_ILS:291068 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;Riggs, Cliff.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203508046">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Investigator's guide to steganography ent://SD_ILS/0/SD_ILS:286402 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;Kipper, Gregory.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203504765">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Protocols for secure electronic commerce ent://SD_ILS/0/SD_ILS:289495 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;Sherif, Mostafa Hashem.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420040012">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security policies and procedures a practitioner's reference ent://SD_ILS/0/SD_ILS:290137 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;Peltier, Thomas R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203488737">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security sage's guide to hardening the network infrastructure ent://SD_ILS/0/SD_ILS:253636 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;Andr&eacute;s, Steven.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836012">http://www.sciencedirect.com/science/book/9781931836012</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managing and securing a Cisco structured wireless-aware network ent://SD_ILS/0/SD_ILS:253637 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;Wall, David.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266917">http://www.sciencedirect.com/science/book/9781932266917</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Zero day exploit countdown to darkness ent://SD_ILS/0/SD_ILS:253643 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;Shein, Rob.&#160;Sachs, Marcus H.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Volltext <a href="http://www.sciencedirect.com/science/book/9781931836098">http://www.sciencedirect.com/science/book/9781931836098</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Programmer's ultimate security deskref ent://SD_ILS/0/SD_ILS:253646 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;Foster, James C.&#160;Foster, Stephen C.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266726">http://www.sciencedirect.com/science/book/9781932266726</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Implementing homeland security for enterprise IT ent://SD_ILS/0/SD_ILS:253656 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;Erbschloe, Michael.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">http://www.sciencedirect.com/science/book/9781555583125</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Policy-based network management solutions for the next generation ent://SD_ILS/0/SD_ILS:253918 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;Strassner, John C.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558608597">http://www.sciencedirect.com/science/book/9781558608597</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> WarDriving drive, detect, defend : a guide to wireless security ent://SD_ILS/0/SD_ILS:253988 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;Hurley, Chris.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836036">http://www.sciencedirect.com/science/book/9781931836036</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Stealing the network how to own a continent ent://SD_ILS/0/SD_ILS:253990 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;131ah.&#160;Russell, Ryan, 1969-&#160;Moss, Jeff.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836050">http://www.sciencedirect.com/science/book/9781931836050</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber adversary characterization auditing the hacker mind ent://SD_ILS/0/SD_ILS:253992 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;Parker, Tom, 1982-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836111">http://www.sciencedirect.com/science/book/9781931836111</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CYA securing Exchange Server 2003 and Outlook Web Access : cover your a** by getting it right the first time ent://SD_ILS/0/SD_ILS:253994 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;Walther, Henrik.&#160;Santry, Patrick.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836241">http://www.sciencedirect.com/science/book/9781931836241</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CYA securing IIS 6.0 : cover your a** by getting it right the first time ent://SD_ILS/0/SD_ILS:253995 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;Cheah, Chun Hai.&#160;Schaefer, Ken.&#160;Peiris, Chris.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836258">http://www.sciencedirect.com/science/book/9781931836258</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking the code ASP.NET web application security ent://SD_ILS/0/SD_ILS:254022 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;Burnett, Mark M.&#160;Foster, James C.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266658">http://www.sciencedirect.com/science/book/9781932266658</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ethereal packet sniffing ent://SD_ILS/0/SD_ILS:254026 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;Orebaugh, Angela.&#160;Morris, Greg.&#160;Warnicke, Ed.&#160;Ramirez, Gilbert.&#160;Syngress Media, Inc.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266825">http://www.sciencedirect.com/science/book/9781932266825</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Check Point Next Generation with application intelligence security administration ent://SD_ILS/0/SD_ILS:254029 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;Tobkin, Chris.&#160;Kligerman, Daniel.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266894">http://www.sciencedirect.com/science/book/9781932266894</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security assessment case studies for implementing the NSA IAM ent://SD_ILS/0/SD_ILS:254030 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;Rogers, Russ.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266962">http://www.sciencedirect.com/science/book/9781932266962</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless operational security ent://SD_ILS/0/SD_ILS:254059 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;Rittinghouse, John W.&#160;Ransome, James F.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583170">http://www.sciencedirect.com/science/book/9781555583170</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Malware : fighting malicious code ent://SD_ILS/0/SD_ILS:267737 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;Skoudis, Ed.&#160;Zeltser, Lenny.<br/>Preferred Shelf Number&#160;QA76.9.A25 S58 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Security for Mobility ent://SD_ILS/0/SD_ILS:247990 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;Mitchell, Chris J., ed.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1049/PBTE051E">http://dx.doi.org/10.1049/PBTE051E</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking : Bili&#351;im korsanl&#305;&#287;&#305; ve korunma y&ouml;ntemleri ent://SD_ILS/0/SD_ILS:88578 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;Y&#305;lmaz, Davut.<br/>Preferred Shelf Number&#160;TK 5105.59 Y56 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> &#304;nternette g&uuml;venlik ve Hacker Cracker meselesi : el kitab&#305; ent://SD_ILS/0/SD_ILS:104130 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;G&uuml;ven, Mehmet.<br/>Preferred Shelf Number&#160;QA 76.9.A25 G88 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Dijital kale ent://SD_ILS/0/SD_ILS:96322 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;Brown, Dan, 1964-&#160;Soner, Sezer, &ccedil;ev.&#160;Huvaj, Muharrem Nesij, haz.<br/>Preferred Shelf Number&#160;PS3552.R685434 D542 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~7<br/> Exploiting software : how to break code ent://SD_ILS/0/SD_ILS:96556 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;Hoglund, Greg.&#160;McGraw, Gary, 1966- ort. yaz.<br/>Preferred Shelf Number&#160;QA 76.9.A25 H635 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> How to break software security : effective technigues for security testing ent://SD_ILS/0/SD_ILS:105584 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;Whittaker, James A., 1965-&#160;Thomson, Herbert H., ort. yaz.<br/>Preferred Shelf Number&#160;QA 76.9.A25 W48 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Secure architectures with OpenBSD ent://SD_ILS/0/SD_ILS:109506 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;Palmer, Brandon.&#160;Nazario, Jose, ort. yaz.<br/>Preferred Shelf Number&#160;QA76.76.O63 P335 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Windows Server 2003 security infrastructures ent://SD_ILS/0/SD_ILS:253837 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;Clercq, Jan de, 1968-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582838">http://www.sciencedirect.com/science/book/9781555582838</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> HP Nonstop server security a practical handbook ent://SD_ILS/0/SD_ILS:253849 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;Hill, Terri.&#160;Alvarado, Ellen.&#160;XYPRO Technology Corporation.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583149">http://www.sciencedirect.com/science/book/9781555583149</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Snort 2.1 intrusion detection ent://SD_ILS/0/SD_ILS:253989 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;Beale, Jay.&#160;Alder, Raven.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836043">http://www.sciencedirect.com/science/book/9781931836043</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Nessus network auditing ent://SD_ILS/0/SD_ILS:253991 2024-12-29T02:07:32Z 2024-12-29T02:07:32Z Author&#160;Deraison, Renaud.&#160;Syngress Media, Inc.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836081">http://www.sciencedirect.com/science/book/9781931836081</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>