Search Results for Computer networks -- Security measures. - Narrowed by: 2009
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bnetworks$002b--$002bSecurity$002b$002bmeasures.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092009$0025092009$0026ic$003dtrue$0026ps$003d300?
2024-09-17T10:23:27Z
Information security management metrics a definitive guide to effective security monitoring and measurement
ent://SD_ILS/0/SD_ILS:291373
2024-09-17T10:23:27Z
2024-09-17T10:23:27Z
Author Brotby, W. Krag.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420052862">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
SIP security
ent://SD_ILS/0/SD_ILS:297791
2024-09-17T10:23:27Z
2024-09-17T10:23:27Z
Author Sisalem, Dorgham. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://onlinelibrary.wiley.com/book/10.1002/9780470516997">http://onlinelibrary.wiley.com/book/10.1002/9780470516997</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470516997">http://dx.doi.org/10.1002/9780470516997</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10298102">http://site.ebrary.com/lib/alltitles/Doc?id=10298102</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in an IPv6 environment
ent://SD_ILS/0/SD_ILS:291504
2024-09-17T10:23:27Z
2024-09-17T10:23:27Z
Author Minoli, Daniel, 1952- Kouns, Jake.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420092301">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cloud security and privacy
ent://SD_ILS/0/SD_ILS:144722
2024-09-17T10:23:27Z
2024-09-17T10:23:27Z
Author Mather, Tim. Kumaraswamy, Subra. Latif, Shahed.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=414816">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=414816</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Disappearing cryptography information hiding : steganography & watermarking
ent://SD_ILS/0/SD_ILS:146450
2024-09-17T10:23:27Z
2024-09-17T10:23:27Z
Author Wayner, Peter, 1964-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123744791">http://www.sciencedirect.com/science/book/9780123744791</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
GFI network security and PCI compliance power tools
ent://SD_ILS/0/SD_ILS:148143
2024-09-17T10:23:27Z
2024-09-17T10:23:27Z
Author Posey, Brien. Thompson, Troy.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492850">http://www.sciencedirect.com/science/book/9781597492850</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Next generation SSH2 implementation securing data in motion
ent://SD_ILS/0/SD_ILS:146275
2024-09-17T10:23:27Z
2024-09-17T10:23:27Z
Author Liu, Dale.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492836">http://www.sciencedirect.com/science/book/9781597492836</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cisco router and switch forensics investigating and analyzing malicious network activity
ent://SD_ILS/0/SD_ILS:148703
2024-09-17T10:23:27Z
2024-09-17T10:23:27Z
Author Liu, Dale.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494182">http://www.sciencedirect.com/science/book/9781597494182</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer and information security handbook
ent://SD_ILS/0/SD_ILS:148884
2024-09-17T10:23:27Z
2024-09-17T10:23:27Z
Author Vacca, John R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123743541">http://www.sciencedirect.com/science/book/9780123743541</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
SAP security configuration and deployment the IT administrator's guide to best practices
ent://SD_ILS/0/SD_ILS:148994
2024-09-17T10:23:27Z
2024-09-17T10:23:27Z
Author Wun-Young, Leslie. Hirao, Joey.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492843">http://www.sciencedirect.com/science/book/9781597492843</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Eleventh hour security+ exam SYO-201 study guide
ent://SD_ILS/0/SD_ILS:146534
2024-09-17T10:23:27Z
2024-09-17T10:23:27Z
Author Dubrawsky, Ido.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494274">http://www.sciencedirect.com/science/book/9781597494274</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>