Search Results for Computer networks -- Security measures - Narrowed by: 2017
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bnetworks$002b--$002bSecurity$002bmeasures$0026qf$003dPUBDATE$002509Publication$002bDate$0025092017$0025092017$0026ps$003d300?
2026-01-21T15:29:27Z
Security for Service Oriented Architectures.
ent://SD_ILS/0/SD_ILS:542633
2026-01-21T15:29:27Z
2026-01-21T15:29:27Z
Author Williams, Walter, author. CRC Press LLC.<br/>Preferred Shelf Number TK5105.5828 .W55 2017<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429072185">https://www.taylorfrancis.com/books/9780429072185</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The basics of cyber safety : computer and mobile device safety made easy
ent://SD_ILS/0/SD_ILS:459044
2026-01-21T15:29:27Z
2026-01-21T15:29:27Z
Author Sammons, John, author. Cross, Michael, 1965- author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166509">http://www.sciencedirect.com/science/book/9780124166509</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing the internet of things
ent://SD_ILS/0/SD_ILS:459335
2026-01-21T15:29:27Z
2026-01-21T15:29:27Z
Author Li, Shancang, author. Xu, Li D., author. Romdhani, Imed, contributor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128044582">https://www.sciencedirect.com/science/book/9780128044582</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Safety of web applications : risks, encryption and handling vulnerabilities with PHP
ent://SD_ILS/0/SD_ILS:459467
2026-01-21T15:29:27Z
2026-01-21T15:29:27Z
Author Quinton, Éric, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781785482281">http://www.sciencedirect.com/science/book/9781785482281</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer and information security handbook
ent://SD_ILS/0/SD_ILS:459518
2026-01-21T15:29:27Z
2026-01-21T15:29:27Z
Author Vacca, John R., editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128038437">https://www.sciencedirect.com/science/book/9780128038437</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Penetration tester's open source toolkit
ent://SD_ILS/0/SD_ILS:459114
2026-01-21T15:29:27Z
2026-01-21T15:29:27Z
Author Faircloth, Jeremy, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128021491">http://www.sciencedirect.com/science/book/9780128021491</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems
ent://SD_ILS/0/SD_ILS:459145
2026-01-21T15:29:27Z
2026-01-21T15:29:27Z
Author Griffor, Edward R., editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128037737">http://www.sciencedirect.com/science/book/9780128037737</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Building a practical information security program
ent://SD_ILS/0/SD_ILS:459146
2026-01-21T15:29:27Z
2026-01-21T15:29:27Z
Author Andress, Jason, author. Leary, Mark, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128020425">http://www.sciencedirect.com/science/book/9780128020425</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies
ent://SD_ILS/0/SD_ILS:459204
2026-01-21T15:29:27Z
2026-01-21T15:29:27Z
Author Winkler, Ira, author. Gomes, Araceli Treu, author. Shackleford, Dave, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128093160">https://www.sciencedirect.com/science/book/9780128093160</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in network functions virtualization
ent://SD_ILS/0/SD_ILS:459901
2026-01-21T15:29:27Z
2026-01-21T15:29:27Z
Author Zhang, Zonghua, author. Meddahi, Ahmed, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781785482571">https://www.sciencedirect.com/science/book/9781785482571</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
DEFENSE AGAINST THE BLACK ARTS : how hackers do what they do and how to protect against it.
ent://SD_ILS/0/SD_ILS:542757
2026-01-21T15:29:27Z
2026-01-21T15:29:27Z
Author VARSALONE, JESSE.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429103766">https://www.taylorfrancis.com/books/9780429103766</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Managing a network vulnerability assessment
ent://SD_ILS/0/SD_ILS:543286
2026-01-21T15:29:27Z
2026-01-21T15:29:27Z
Author PELTIER, THOMAS R.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429210747">https://www.taylorfrancis.com/books/9780429210747</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network forensics
ent://SD_ILS/0/SD_ILS:593814
2026-01-21T15:29:27Z
2026-01-21T15:29:27Z
Author Messier, Ric, author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119329190</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity essentials
ent://SD_ILS/0/SD_ILS:594756
2026-01-21T15:29:27Z
2026-01-21T15:29:27Z
Author Brooks, Charles J., author. Grow, Christopher, author. Craig, Philip, author. Short, Donald, author.<br/>Preferred Shelf Number TK5105.59<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The cyber risk handbook : creating and measuring effective cybersecurity capabilities
ent://SD_ILS/0/SD_ILS:593609
2026-01-21T15:29:27Z
2026-01-21T15:29:27Z
Author Antonucci, Domenic, author.<br/>Preferred Shelf Number HV6773 .A58 2017<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119309741">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119309741</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced penetration testing : hacking the world's most secure networks
ent://SD_ILS/0/SD_ILS:593439
2026-01-21T15:29:27Z
2026-01-21T15:29:27Z
Author Allsopp, Wil, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119367741">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119367741</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>