Search Results for Computer networks -- Security measures. - Narrowed by: 2009
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bnetworks$002b--$002bSecurity$002bmeasures.$0025C2$0025A0$0026qf$003dPUBDATE$002509Publication$002bDate$0025092009$0025092009$0026ps$003d300?
2025-12-15T07:22:33Z
Cloud security and privacy
ent://SD_ILS/0/SD_ILS:144722
2025-12-15T07:22:33Z
2025-12-15T07:22:33Z
Author Mather, Tim. Kumaraswamy, Subra. Latif, Shahed.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=414816">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=414816</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Next generation SSH2 implementation securing data in motion
ent://SD_ILS/0/SD_ILS:146275
2025-12-15T07:22:33Z
2025-12-15T07:22:33Z
Author Liu, Dale.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492836">http://www.sciencedirect.com/science/book/9781597492836</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Eleventh hour security+ exam SYO-201 study guide
ent://SD_ILS/0/SD_ILS:146534
2025-12-15T07:22:33Z
2025-12-15T07:22:33Z
Author Dubrawsky, Ido.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494274">http://www.sciencedirect.com/science/book/9781597494274</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cisco router and switch forensics investigating and analyzing malicious network activity
ent://SD_ILS/0/SD_ILS:148703
2025-12-15T07:22:33Z
2025-12-15T07:22:33Z
Author Liu, Dale.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494182">http://www.sciencedirect.com/science/book/9781597494182</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer and information security handbook
ent://SD_ILS/0/SD_ILS:148884
2025-12-15T07:22:33Z
2025-12-15T07:22:33Z
Author Vacca, John R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123743541">http://www.sciencedirect.com/science/book/9780123743541</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Disappearing cryptography information hiding : steganography & watermarking
ent://SD_ILS/0/SD_ILS:146450
2025-12-15T07:22:33Z
2025-12-15T07:22:33Z
Author Wayner, Peter, 1964-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123744791">http://www.sciencedirect.com/science/book/9780123744791</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
SAP security configuration and deployment the IT administrator's guide to best practices
ent://SD_ILS/0/SD_ILS:148994
2025-12-15T07:22:33Z
2025-12-15T07:22:33Z
Author Wun-Young, Leslie. Hirao, Joey.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492843">http://www.sciencedirect.com/science/book/9781597492843</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
GFI network security and PCI compliance power tools
ent://SD_ILS/0/SD_ILS:148143
2025-12-15T07:22:33Z
2025-12-15T07:22:33Z
Author Posey, Brien. Thompson, Troy.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492850">http://www.sciencedirect.com/science/book/9781597492850</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
SIP security
ent://SD_ILS/0/SD_ILS:297791
2025-12-15T07:22:33Z
2025-12-15T07:22:33Z
Author Sisalem, Dorgham. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://onlinelibrary.wiley.com/book/10.1002/9780470516997">http://onlinelibrary.wiley.com/book/10.1002/9780470516997</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470516997">http://dx.doi.org/10.1002/9780470516997</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10298102">http://site.ebrary.com/lib/alltitles/Doc?id=10298102</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security management metrics : a definitive guide to effective security monitoring and measurement
ent://SD_ILS/0/SD_ILS:546952
2025-12-15T07:22:33Z
2025-12-15T07:22:33Z
Author Brotby, W. Krag., author.<br/>Preferred Shelf Number HD30.2 .B78 2009<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420052862">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Architecting secure software systems
ent://SD_ILS/0/SD_ILS:538962
2025-12-15T07:22:33Z
2025-12-15T07:22:33Z
Author Talukder, Asoke K., author. Chaitanya, Manish.<br/>Preferred Shelf Number QA76.9 .A25 T34 2009<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420087857">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Security in an IPv6 environment
ent://SD_ILS/0/SD_ILS:546853
2025-12-15T07:22:33Z
2025-12-15T07:22:33Z
Author Minoli, Daniel, 1952, author. Kouns, Jake.<br/>Preferred Shelf Number TK5105.59 .M56 2009<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420092301">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Security software development : assessing and managing security risks
ent://SD_ILS/0/SD_ILS:543836
2025-12-15T07:22:33Z
2025-12-15T07:22:33Z
Author Ashbaugh, Douglas A., author.<br/>Preferred Shelf Number QA76.9 .A25 A8246 2009<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420063813">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>