Search Results for Computer Security. - Narrowed by: 2004SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092004$0025092004$0026te$003dILS$0026ps$003d300?dt=list2024-12-28T11:35:05ZSequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transferent://SD_ILS/0/SD_ILS:621882024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor Davies, Donald Watts, 1924- Price, W. L., ort.yaz.<br/>Preferred Shelf Number TK 5105 D43 1989<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2891512024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2903202024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Digital fortressent://SD_ILS/0/SD_ILS:3541672024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor Brown, Dan, 1964- .<br/>Preferred Shelf Number PS3552.R685434 D53 2009<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Disruptive security technologies with mobile code and peer-to-peer networksent://SD_ILS/0/SD_ILS:2913052024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor Brooks, R. R. (Richard R.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420038880">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Sockets, shellcode, porting & coding reverse engineering exploits and tool coding for security professionalsent://SD_ILS/0/SD_ILS:2539382024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor Foster, James C. Price, Mike (Mike Morgan) McClure, Stuart.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490054">http://www.sciencedirect.com/science/book/9781597490054</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network perimeter security building defense in-depthent://SD_ILS/0/SD_ILS:2910682024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor Riggs, Cliff.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203508046">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Public key infrastructure building trusted applications and Web servicesent://SD_ILS/0/SD_ILS:2901082024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor Vacca, John R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203498156">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security policies and procedures a practitioner's referenceent://SD_ILS/0/SD_ILS:2901372024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor Peltier, Thomas R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203488737">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Malware : fighting malicious codeent://SD_ILS/0/SD_ILS:2677372024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor Skoudis, Ed. Zeltser, Lenny.<br/>Preferred Shelf Number QA76.9.A25 S58 2004<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Strategic information securityent://SD_ILS/0/SD_ILS:2845782024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor Wylder, John.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203497081">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security sage's guide to hardening the network infrastructureent://SD_ILS/0/SD_ILS:2536362024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor Andrés, Steven.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836012">http://www.sciencedirect.com/science/book/9781931836012</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Managing and securing a Cisco structured wireless-aware networkent://SD_ILS/0/SD_ILS:2536372024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor Wall, David.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266917">http://www.sciencedirect.com/science/book/9781932266917</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Zero day exploit countdown to darknessent://SD_ILS/0/SD_ILS:2536432024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor Shein, Rob. Sachs, Marcus H.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Volltext <a href="http://www.sciencedirect.com/science/book/9781931836098">http://www.sciencedirect.com/science/book/9781931836098</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Programmer's ultimate security deskrefent://SD_ILS/0/SD_ILS:2536462024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor Foster, James C. Foster, Stephen C.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266726">http://www.sciencedirect.com/science/book/9781932266726</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Policy-based network management solutions for the next generationent://SD_ILS/0/SD_ILS:2539182024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor Strassner, John C.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558608597">http://www.sciencedirect.com/science/book/9781558608597</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>HP Nonstop server security a practical handbookent://SD_ILS/0/SD_ILS:2538492024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor Hill, Terri. Alvarado, Ellen. XYPRO Technology Corporation.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583149">http://www.sciencedirect.com/science/book/9781555583149</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking the code ASP.NET web application securityent://SD_ILS/0/SD_ILS:2540222024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor Burnett, Mark M. Foster, James C.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266658">http://www.sciencedirect.com/science/book/9781932266658</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Check Point Next Generation with application intelligence security administrationent://SD_ILS/0/SD_ILS:2540292024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor Tobkin, Chris. Kligerman, Daniel.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266894">http://www.sciencedirect.com/science/book/9781932266894</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wireless operational securityent://SD_ILS/0/SD_ILS:2540592024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor Rittinghouse, John W. Ransome, James F.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583170">http://www.sciencedirect.com/science/book/9781555583170</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Investigator's guide to steganographyent://SD_ILS/0/SD_ILS:2864022024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor Kipper, Gregory.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203504765">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Windows Server 2003 security infrastructuresent://SD_ILS/0/SD_ILS:2538372024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor Clercq, Jan de, 1968-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582838">http://www.sciencedirect.com/science/book/9781555582838</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>WarDriving drive, detect, defend : a guide to wireless securityent://SD_ILS/0/SD_ILS:2539882024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor Hurley, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836036">http://www.sciencedirect.com/science/book/9781931836036</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Snort 2.1 intrusion detectionent://SD_ILS/0/SD_ILS:2539892024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor Beale, Jay. Alder, Raven.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836043">http://www.sciencedirect.com/science/book/9781931836043</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Stealing the network how to own a continentent://SD_ILS/0/SD_ILS:2539902024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor 131ah. Russell, Ryan, 1969- Moss, Jeff.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836050">http://www.sciencedirect.com/science/book/9781931836050</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Nessus network auditingent://SD_ILS/0/SD_ILS:2539912024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor Deraison, Renaud. Syngress Media, Inc.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836081">http://www.sciencedirect.com/science/book/9781931836081</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber adversary characterization auditing the hacker mindent://SD_ILS/0/SD_ILS:2539922024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor Parker, Tom, 1982-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836111">http://www.sciencedirect.com/science/book/9781931836111</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>CYA securing Exchange Server 2003 and Outlook Web Access : cover your a** by getting it right the first timeent://SD_ILS/0/SD_ILS:2539942024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor Walther, Henrik. Santry, Patrick.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836241">http://www.sciencedirect.com/science/book/9781931836241</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>CYA securing IIS 6.0 : cover your a** by getting it right the first timeent://SD_ILS/0/SD_ILS:2539952024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor Cheah, Chun Hai. Schaefer, Ken. Peiris, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836258">http://www.sciencedirect.com/science/book/9781931836258</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Protocols for secure electronic commerceent://SD_ILS/0/SD_ILS:2894952024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor Sherif, Mostafa Hashem.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420040012">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security for Mobilityent://SD_ILS/0/SD_ILS:2479902024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor Mitchell, Chris J., ed.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1049/PBTE051E">http://dx.doi.org/10.1049/PBTE051E</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Implementing homeland security for enterprise ITent://SD_ILS/0/SD_ILS:2536562024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor Erbschloe, Michael.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">http://www.sciencedirect.com/science/book/9781555583125</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Ethereal packet sniffingent://SD_ILS/0/SD_ILS:2540262024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor Orebaugh, Angela. Morris, Greg. Warnicke, Ed. Ramirez, Gilbert. Syngress Media, Inc.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266825">http://www.sciencedirect.com/science/book/9781932266825</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security assessment case studies for implementing the NSA IAMent://SD_ILS/0/SD_ILS:2540302024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor Rogers, Russ.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266962">http://www.sciencedirect.com/science/book/9781932266962</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>How to break software security : effective technigues for security testingent://SD_ILS/0/SD_ILS:1055842024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor Whittaker, James A., 1965- Thomson, Herbert H., ort. yaz.<br/>Preferred Shelf Number QA 76.9.A25 W48 2004<br/>Format: Books<br/>Availability Beytepe Library~2<br/>Secure architectures with OpenBSDent://SD_ILS/0/SD_ILS:1095062024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor Palmer, Brandon. Nazario, Jose, ort. yaz.<br/>Preferred Shelf Number QA76.76.O63 P335 2004<br/>Format: Books<br/>Availability Beytepe Library~1<br/>İnternette güvenlik ve Hacker Cracker meselesi : el kitabıent://SD_ILS/0/SD_ILS:1041302024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor Güven, Mehmet.<br/>Preferred Shelf Number QA 76.9.A25 G88 2004<br/>Format: Books<br/>Availability Beytepe Library~2<br/>Dijital kaleent://SD_ILS/0/SD_ILS:963222024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor Brown, Dan, 1964- Soner, Sezer, çev. Huvaj, Muharrem Nesij, haz.<br/>Preferred Shelf Number PS3552.R685434 D542 2004<br/>Format: Books<br/>Availability Beytepe Library~7<br/>Hacking : Bilişim korsanlığı ve korunma yöntemlerient://SD_ILS/0/SD_ILS:885782024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor Yılmaz, Davut.<br/>Preferred Shelf Number TK 5105.59 Y56 2004<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Exploiting software : how to break codeent://SD_ILS/0/SD_ILS:965562024-12-28T11:35:05Z2024-12-28T11:35:05ZAuthor Hoglund, Greg. McGraw, Gary, 1966- ort. yaz.<br/>Preferred Shelf Number QA 76.9.A25 H635 2004<br/>Format: Books<br/>Availability Beytepe Library~1<br/>