Search Results for Computer networks -- Security measures.&nbsp; - Narrowed by: 2010 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bnetworks$002b--$002bSecurity$002bmeasures.$0025C2$0025A0$0026qf$003dPUBDATE$002509Publication$002bDate$0025092010$0025092010$0026ps$003d300? 2025-12-14T07:36:00Z Dissecting the hack the forb1dd3n network ent://SD_ILS/0/SD_ILS:146585 2025-12-14T07:36:00Z 2025-12-14T07:36:00Z Author&#160;Street, Jayson E.&#160;Street, Jayson E. Dissecting the hack.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495684">http://www.sciencedirect.com/science/book/9781597495684</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seven deadliest social network attacks ent://SD_ILS/0/SD_ILS:149145 2025-12-14T07:36:00Z 2025-12-14T07:36:00Z Author&#160;Timm, Carl.&#160;Perez, Richard, 1969 Oct. 17-&#160;Ely, Adam.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495455">http://www.sciencedirect.com/science/book/9781597495455</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Eleventh hour network+ exam N10-004 study guide ent://SD_ILS/0/SD_ILS:146455 2025-12-14T07:36:00Z 2025-12-14T07:36:00Z Author&#160;Alpern, Naomi J.&#160;Shimonski, Robert.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494281">http://www.sciencedirect.com/science/book/9781597494281</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> PCI compliance understand and implement effective PCI data security standard compliance. ent://SD_ILS/0/SD_ILS:148342 2025-12-14T07:36:00Z 2025-12-14T07:36:00Z Author&#160;Chuvakin, Anton.&#160;Williams, Branden R.&#160;Spangenberg, Ward.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494991">http://www.sciencedirect.com/science/book/9781597494991</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seven deadliest USB attacks ent://SD_ILS/0/SD_ILS:148953 2025-12-14T07:36:00Z 2025-12-14T07:36:00Z Author&#160;Anderson, Brian (Brian James)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495530">http://www.sciencedirect.com/science/book/9781597495530</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seven deadliest wireless technologies attacks ent://SD_ILS/0/SD_ILS:149033 2025-12-14T07:36:00Z 2025-12-14T07:36:00Z Author&#160;Haines, Brad.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495417">http://www.sciencedirect.com/science/book/9781597495417</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seven deadliest network attacks ent://SD_ILS/0/SD_ILS:149185 2025-12-14T07:36:00Z 2025-12-14T07:36:00Z Author&#160;Prowell, Stacy J.&#160;Kraus, Rob.&#160;Borkin, Mike.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495493">http://www.sciencedirect.com/science/book/9781597495493</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seven deadliest USB attacks ent://SD_ILS/0/SD_ILS:306328 2025-12-14T07:36:00Z 2025-12-14T07:36:00Z Author&#160;Anderson, Brian (Brian James)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495530">http://www.sciencedirect.com/science/book/9781597495530</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of financial cryptography and security ent://SD_ILS/0/SD_ILS:542098 2025-12-14T07:36:00Z 2025-12-14T07:36:00Z Author&#160;Rosenberg, Burton.<br/>Preferred Shelf Number&#160;HG1710 .H34 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420059823">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Mac security bible ent://SD_ILS/0/SD_ILS:303881 2025-12-14T07:36:00Z 2025-12-14T07:36:00Z Author&#160;Kissell, Joe.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118257739">An electronic book accessible through the World Wide Web; click for information</a> Safari Books Online <a href="http://proquest.safaribooksonline.com/640">http://proquest.safaribooksonline.com/640</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780470474198">http://proquest.safaribooksonline.com/?fpi=9780470474198</a> Safari Books Online <a href="http://proquest.safaribooksonline.com/9780470474198">http://proquest.safaribooksonline.com/9780470474198</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40737">http://www.books24x7.com/marc.asp?bookid=40737</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10358774">http://site.ebrary.com/lib/alltitles/Doc?id=10358774</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT audit, control, and security ent://SD_ILS/0/SD_ILS:304008 2025-12-14T07:36:00Z 2025-12-14T07:36:00Z Author&#160;Moeller, Robert R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118269138">An electronic book accessible through the World Wide Web; click for information</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40717">http://www.books24x7.com/marc.asp?bookid=40717</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10469768">http://site.ebrary.com/lib/alltitles/Doc?id=10469768</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=624573">http://swb.eblib.com/patron/FullRecord.aspx?p=624573</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams ent://SD_ILS/0/SD_ILS:297862 2025-12-14T07:36:00Z 2025-12-14T07:36:00Z Author&#160;Kouns, Jake.&#160;Minoli, Daniel, 1952-&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> China's cyberwarfare capability ent://SD_ILS/0/SD_ILS:281481 2025-12-14T07:36:00Z 2025-12-14T07:36:00Z Author&#160;Marvel, Elisabette M.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=581824">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=581824</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security 2020 reduce security risks this decade ent://SD_ILS/0/SD_ILS:303839 2025-12-14T07:36:00Z 2025-12-14T07:36:00Z Author&#160;Howard, Doug.&#160;Prince, Kevin.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255803">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital forensics for network, Internet, and cloud computing a forensic evidence guide for moving targets and data ent://SD_ILS/0/SD_ILS:146482 2025-12-14T07:36:00Z 2025-12-14T07:36:00Z Author&#160;Lillard, Terrence.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495370">http://www.sciencedirect.com/science/book/9781597495370</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seven deadliest web application attacks ent://SD_ILS/0/SD_ILS:149103 2025-12-14T07:36:00Z 2025-12-14T07:36:00Z Author&#160;Shema, Mike.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495431">http://www.sciencedirect.com/science/book/9781597495431</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cognitive Radio Networking and Security A Game-Theoretic View ent://SD_ILS/0/SD_ILS:238948 2025-12-14T07:36:00Z 2025-12-14T07:36:00Z Author&#160;Liu, K. J. Ray.&#160;Wang, Beibei.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511778773">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Security A Decision and Game-Theoretic Approach ent://SD_ILS/0/SD_ILS:237887 2025-12-14T07:36:00Z 2025-12-14T07:36:00Z Author&#160;Alpcan, Tansu.&#160;Ba&#351;ar, Tamer.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511760778">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security risk analysis ent://SD_ILS/0/SD_ILS:538713 2025-12-14T07:36:00Z 2025-12-14T07:36:00Z Author&#160;Peltier, Thomas R., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P429 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439839577">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>