Search Results for Computer Security. - Narrowed by: 2007SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092007$0025092007$0026pe$003dd$00253A$0026ps$003d300?dt=list2025-01-01T05:33:32ZComputer security and cryptographyent://SD_ILS/0/SD_ILS:2968652025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Konheim, Alan G., 1934-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.contentreserve.com/TitleInfo.asp?ID={24307C36-99BB-4A76-9317-7D1A7CC786FB}&Format=50">Click for information</a>
<a href="http://proquest.safaribooksonline.com/?fpi=9780471947837">Available by subscription from Safari Books Online</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170</a>
John Wiley <a href="http://dx.doi.org/10.1002/0470083980">http://dx.doi.org/10.1002/0470083980</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9780471947837">http://proquest.tech.safaribooksonline.de/9780471947837</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security of e-Systems and Computer Networksent://SD_ILS/0/SD_ILS:2360232025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Obaidat, Mohammad. Boudriga, Noureddine.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511536700">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Sequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transferent://SD_ILS/0/SD_ILS:621882025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Davies, Donald Watts, 1924- Price, W. L., ort.yaz.<br/>Preferred Shelf Number TK 5105 D43 1989<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Computer Security – ESORICS 2007 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 — 26, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1872832025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Biskup, Joachim. editor. López, Javier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-74835-9">http://dx.doi.org/10.1007/978-3-540-74835-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer Safety, Reliability, and Security 26th International Conference, SAFECOMP 2007, Nuremberg, Germany, September 18-21, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1873352025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Saglietti, Francesca. editor. Oster, Norbert. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-75101-4">http://dx.doi.org/10.1007/978-3-540-75101-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Computer Science – ASIAN 2007. Computer and Network Security 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1877272025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Cervesato, Iliano. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-76929-3">http://dx.doi.org/10.1007/978-3-540-76929-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer Network Security Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13–15, 2007 Proceedingsent://SD_ILS/0/SD_ILS:1870232025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Gorodetsky, Vladimir. editor. Kotenko, Igor. editor. Skormin, Victor A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-73986-9">http://dx.doi.org/10.1007/978-3-540-73986-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007. Proceedingsent://SD_ILS/0/SD_ILS:1874672025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Miyaji, Atsuko. editor. Kikuchi, Hiroaki. editor. Rannenberg, Kai. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-75651-4">http://dx.doi.org/10.1007/978-3-540-75651-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2871232025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Tipton, Harold F. Nozaki, Micki Krause.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439893159">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2891512025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2903202025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2907632025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Tipton, Harold F. Nozaki, Micki Krause.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439853467">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2897342025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420090956">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The best damn IT security management book periodent://SD_ILS/0/SD_ILS:1452742025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Cunningham, Bryan, JD.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492270">http://www.sciencedirect.com/science/book/9781597492270</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Botnets the killer web appent://SD_ILS/0/SD_ILS:1452832025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Schiller, Craig A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491358">http://www.sciencedirect.com/science/book/9781597491358</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The history of information security a comprehensive handbookent://SD_ILS/0/SD_ILS:1455322025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Leeuw, Karl de. Bergstra, J. A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444516084">http://www.sciencedirect.com/science/book/9780444516084</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Integrated security systems design concepts, specifications, and implementationent://SD_ILS/0/SD_ILS:1455522025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Norman, Thomas L.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679091">http://www.sciencedirect.com/science/book/9780750679091</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>How to cheat at securing your networkent://SD_ILS/0/SD_ILS:1456542025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Dubrawsky, Ido.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492317">http://www.sciencedirect.com/science/book/9781597492317</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>How to cheat at securing SQL server 2005ent://SD_ILS/0/SD_ILS:1456552025-01-01T05:33:32Z2025-01-01T05:33:32ZPreferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491969">http://www.sciencedirect.com/science/book/9781597491969</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Microsoft Vista for IT security professionalsent://SD_ILS/0/SD_ILS:1462422025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Piltzecker, Tony, 1975- Chaffin, Larry.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491396">http://www.sciencedirect.com/science/book/9781597491396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network security assessment from vulnerability to patchent://SD_ILS/0/SD_ILS:1463342025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Manzuik, Steve. Gold, André. Gatford, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491013">http://www.sciencedirect.com/science/book/9781597491013</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Microsoft windows security fundamentalsent://SD_ILS/0/SD_ILS:1463462025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Clercq, Jan de, 1968- Grillenmeier, Guido.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583408">http://www.sciencedirect.com/science/book/9781555583408</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Developer's guide to web application securityent://SD_ILS/0/SD_ILS:1476642025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Cross, Michael, 1965-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Configuring Juniper Networks NetScreen & SSG firewallsent://SD_ILS/0/SD_ILS:1488032025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Cameron, Rob. Juniper Networks, Inc.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491181">http://www.sciencedirect.com/science/book/9781597491181</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network security current status and future directionsent://SD_ILS/0/SD_ILS:2495062025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Douligeris, C. (Christos)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5237765">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5237765</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Applied cryptanalysis breaking ciphers in the real worldent://SD_ILS/0/SD_ILS:2495082025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Stamp, Mark. Low, Richard M., 1967-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Metasploit Toolkit for Penetration Testing, Exploit Development, And Vulnerabiity Researchent://SD_ILS/0/SD_ILS:1470512025-01-01T05:33:32Z2025-01-01T05:33:32ZPreferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">http://www.sciencedirect.com/science/book/9781597490740</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security cost managementent://SD_ILS/0/SD_ILS:2865452025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Bazavan, Ioana V. Lim, Ian.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420013832">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Testing code securityent://SD_ILS/0/SD_ILS:2865522025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Van der Linden, Maura A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420013795">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Mechanics of user identification and authentication fundamentals of identity managementent://SD_ILS/0/SD_ILS:2868302025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Todorov, Dobromir.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420052206">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security design, implementation, measurement, and complianceent://SD_ILS/0/SD_ILS:2884902025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Layton, Timothy P.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420013412">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2851612025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439833032">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security in distributed, grid, mobile, and pervasive computingent://SD_ILS/0/SD_ILS:2874922025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Xiao, Yang, 1966-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780849379253">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Software deployment, updating, and patchingent://SD_ILS/0/SD_ILS:2894092025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Stackpole, Bill. Hanrion, Patrick.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420013290">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Complete guide to CISM certificationent://SD_ILS/0/SD_ILS:2893972025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Peltier, Thomas R. Peltier, Justin.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420013252">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Official (ISC)2 guide to the SSCP CBKent://SD_ILS/0/SD_ILS:2900782025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Contesti, Diana-Lynn.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203331576">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>802.1X port-based authenticationent://SD_ILS/0/SD_ILS:2913222025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Brown, Edwin Lyle.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420044652">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Grid computing securityent://SD_ILS/0/SD_ILS:2487472025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Chakrabarti, Anirban.<br/>Preferred Shelf Number QA76.9.C58 C53 2007<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Data-driven block ciphers for fast telecommunication systemsent://SD_ILS/0/SD_ILS:2877632025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Moldovyan, Nick. Moldovyan, Alex.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420054125">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Complete guide to security and privacy metrics measuring regulatory compliance, operational resilience, and ROIent://SD_ILS/0/SD_ILS:2893602025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Herrmann, Debra S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420013283">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Phishing and countermeasures understanding the increasing problem of electronic identity theftent://SD_ILS/0/SD_ILS:2968752025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Jakobsson, Markus. Myers, Steven, 1975-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=18418">http://www.books24x7.com/marc.asp?bookid=18418</a>
John Wiley <a href="http://dx.doi.org/10.1002/0470086106">http://dx.doi.org/10.1002/0470086106</a>
MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=82196&ref=toc">http://www.myilibrary.com?id=82196&ref=toc</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Trustworthy computing analytical and quantitative engineering evaluationent://SD_ILS/0/SD_ILS:2969572025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Sahinoglu, Mehmet, 1951- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0739/2006033567-b.html">http://catdir.loc.gov/catdir/enhancements/fy0739/2006033567-b.html</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470127872">http://dx.doi.org/10.1002/9780470127872</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Trust, complexity and control confidence in a convergent worldent://SD_ILS/0/SD_ILS:2975212025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Cofta, Piotr.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0745/2007015560-b.html">http://catdir.loc.gov/catdir/enhancements/fy0745/2007015560-b.html</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470517857">http://dx.doi.org/10.1002/9780470517857</a>
HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/123232368.html">http://catalog.hathitrust.org/api/volumes/oclc/123232368.html</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Developer's guide to web application securityent://SD_ILS/0/SD_ILS:3064642025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Cross, Michael, 1965-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Metasploit toolkit for penetration testing, exploit development, and vulnerability researchent://SD_ILS/0/SD_ILS:3064692025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Maynor, David. Mookhey, K. K.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">http://www.sciencedirect.com/science/book/9781597490740</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>How to cheat at securing your networkent://SD_ILS/0/SD_ILS:3065032025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Dubrawsky, Ido.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492317">http://www.sciencedirect.com/science/book/9781597492317</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Asterisk hackingent://SD_ILS/0/SD_ILS:1453552025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Brashars, Joshua.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491518">http://www.sciencedirect.com/science/book/9781597491518</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>How to cheat at configuring Open Source security toolsent://SD_ILS/0/SD_ILS:1455782025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Alder, Raven.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491709">http://www.sciencedirect.com/science/book/9781597491709</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>How to cheat at Voip securityent://SD_ILS/0/SD_ILS:1454862025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Porter, Thomas, PhD. Gough, Michael, 1963-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491693">http://www.sciencedirect.com/science/book/9781597491693</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>FISMA certification & accreditation handbookent://SD_ILS/0/SD_ILS:1458762025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Taylor, Laura. Shepherd, Matthew.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">http://www.sciencedirect.com/science/book/9781597491167</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Physical and logical security convergence powered by enterprise security managementent://SD_ILS/0/SD_ILS:1481922025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Contos, Brian T.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491228">http://www.sciencedirect.com/science/book/9781597491228</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>PCI compliance implementing effective PCI data security standardsent://SD_ILS/0/SD_ILS:1481952025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Bradley, Tony, 1969-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491655">http://www.sciencedirect.com/science/book/9781597491655</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Optimizing and testing WLANs proven techniques for maximum performanceent://SD_ILS/0/SD_ILS:1482702025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Alexander, Tom.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679862">http://www.sciencedirect.com/science/book/9780750679862</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The official CHFI study guide (Exam 312-49) for computer hacking forensic investigator.ent://SD_ILS/0/SD_ILS:1483882025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Kleiman, Dave.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491976">http://www.sciencedirect.com/science/book/9781597491976</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Open source fuzzing toolsent://SD_ILS/0/SD_ILS:1484122025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Rathaus, Noam.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491952">http://www.sciencedirect.com/science/book/9781597491952</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Snort IDS and IPS toolkitent://SD_ILS/0/SD_ILS:1484442025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Beale, Jay. Baker, Andrew R. Esler, Joel. Northcutt, Stephen. Kohlenberg, Toby.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490993">http://www.sciencedirect.com/science/book/9781597490993</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Stealing the network how to own a shadow: the chase for Knuthent://SD_ILS/0/SD_ILS:1485512025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Long, Johnny. Russell, Ryan, 1969- Mullen, Timothy M. Pinzon, D. Scott. Black Hat Press (Goodhue, Minn.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490818">http://www.sciencedirect.com/science/book/9781597490818</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Techno security's guide to e-discovery and digital forensicsent://SD_ILS/0/SD_ILS:1485642025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Wiles, Jack.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492232">http://www.sciencedirect.com/science/book/9781597492232</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Techno Security's guide to managing risks for IT managers, auditors, and investigatorsent://SD_ILS/0/SD_ILS:1486412025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Wiles, Jack.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">http://www.sciencedirect.com/science/book/9781597491389</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security convergence managing enterprise security riskent://SD_ILS/0/SD_ILS:1490802025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Tyson, Dave.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Volltext <a href="http://www.sciencedirect.com/science/book/9780750684255">http://www.sciencedirect.com/science/book/9780750684255</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security+ study guide & DVD training systement://SD_ILS/0/SD_ILS:1490892025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Cross, Michael, 1965-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491532">http://www.sciencedirect.com/science/book/9781597491532</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>AVIEN malware defense guide for the Enterpriseent://SD_ILS/0/SD_ILS:1451832025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Harley, David.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491648">http://www.sciencedirect.com/science/book/9781597491648</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Best damn firewall book periodent://SD_ILS/0/SD_ILS:1453772025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Behrens, Thorsten.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492188">http://www.sciencedirect.com/science/book/9781597492188</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Windows forensic analysis DVD toolkitent://SD_ILS/0/SD_ILS:1456782025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Carvey, Harlan A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491563">http://www.sciencedirect.com/science/book/9781597491563</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:1456802025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Winkler, Ira.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">http://www.sciencedirect.com/science/book/9781597491686</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>WarDriving & wireless penetration testingent://SD_ILS/0/SD_ILS:1468052025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Hurley, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491112">http://www.sciencedirect.com/science/book/9781597491112</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Web application vulnerabilities detect, exploit, preventent://SD_ILS/0/SD_ILS:1469082025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Cross, Michael, 1965-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492096">http://www.sciencedirect.com/science/book/9781597492096</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Data warehousing and data mining techniques for cyber securityent://SD_ILS/0/SD_ILS:1104342025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Singhal, Anoop, 1958-<br/>Preferred Shelf Number QA76.9.A25 S563 2007<br/>Format: Books<br/>Availability Beytepe Library~1<br/>How to cheat at configuring Open Source security toolsent://SD_ILS/0/SD_ILS:1121022025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Alder, Raven.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491709">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>How to cheat at Voip securityent://SD_ILS/0/SD_ILS:1121062025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Porter, Thomas, PhD. Gough, Michael. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491693">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Snort IDS and IPS toolkitent://SD_ILS/0/SD_ILS:1121122025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Beale, Jay Baker, Andrew R. Esler, Joel. Northcutt, Stephen. Kohlenberg, Toby.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490993">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security+ study guide & DVD training systement://SD_ILS/0/SD_ILS:1121402025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Cross, Michael, 1965- ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491532">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Configuring Juniper Networks NetScreen & SSG firewallsent://SD_ILS/0/SD_ILS:1121542025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Cameron, Rob. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491181">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>FISMA certification & accreditation handbookent://SD_ILS/0/SD_ILS:1121692025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Taylor, Laura. Shepherd, Matthew. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>How to cheat at securing sql server 2005ent://SD_ILS/0/SD_ILS:1121742025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491969">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Integrated security systems design concepts, specifications, and implementationent://SD_ILS/0/SD_ILS:1121752025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Norman, Thomas, CSC. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679091">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Metasploit Toolkit for Penetration Testing, Exploit Development, And Vulnerabiity Researchent://SD_ILS/0/SD_ILS:1121792025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Microsoft Vista for IT security professionalsent://SD_ILS/0/SD_ILS:1121822025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Piltzecker, Tony, 1975- Chaffin, Larry. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491396">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Microsoft windows security fundamentalsent://SD_ILS/0/SD_ILS:1121832025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Clercq, Jan de, 1968- Grillenmeier, Guido. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583408">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network security assessment from vulnerability to patchent://SD_ILS/0/SD_ILS:1121862025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Manzuik, Steve. Gold, André. Gatford, Chris. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491013">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Open source fuzzing toolsent://SD_ILS/0/SD_ILS:1121872025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Rathaus, Noam ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491952">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>PCI compliance implementing effective PCI data security standardsent://SD_ILS/0/SD_ILS:1121892025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Bradley, Tony, 1969- ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491655">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security convergence managing enterprise security riskent://SD_ILS/0/SD_ILS:1121982025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Tyson, Dave. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750684255">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Stealing the network how to own a shadow: the chase for Knuthent://SD_ILS/0/SD_ILS:1122002025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Long, Johnny. Russell, Ryan, 1969- Mullen, Timothy M. Pinzon, D. Scott. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490818">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Techno Security's guide to managing risks for IT managers, auditors, and investigatorsent://SD_ILS/0/SD_ILS:1122032025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Wiles, Jack. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The history of information security a comprehensive handbookent://SD_ILS/0/SD_ILS:1122052025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Leeuw, Karl de. Bergstra, J. A. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444516084">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The official CHFI study guide (Exam 312-49) for computer hacking forensic investigator.ent://SD_ILS/0/SD_ILS:1122062025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Kleiman, Dave. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491976">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>WarDriving & wireless penetration testingent://SD_ILS/0/SD_ILS:1122102025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Hurley, Chris. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491112">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Windows forensic analysis DVD toolkitent://SD_ILS/0/SD_ILS:1122112025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Carvey, Harlan A. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491563">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:1122142025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Winkler, Ira. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security : contemporary casesent://SD_ILS/0/SD_ILS:1110212025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Wright, Marie A. Kakalik, John S.<br/>Preferred Shelf Number QA76.9.A25 W75 2007<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Security in computingent://SD_ILS/0/SD_ILS:1106822025-01-01T05:33:32Z2025-01-01T05:33:32ZAuthor Pfleeger, Charles P., 1948-<br/>Preferred Shelf Number QA76.9.A25 P45 2007<br/>Format: Books<br/>Availability Beytepe Library~1<br/>