Search Results for Computer networks -- Security measures. - Narrowed by: 2010
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bnetworks$002b--$002bSecurity$002bmeasures.$0025C2$0025A0$0026qf$003dPUBDATE$002509Publication$002bDate$0025092010$0025092010$0026ps$003d300?
2025-12-14T07:36:00Z
Dissecting the hack the forb1dd3n network
ent://SD_ILS/0/SD_ILS:146585
2025-12-14T07:36:00Z
2025-12-14T07:36:00Z
Author Street, Jayson E. Street, Jayson E. Dissecting the hack.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495684">http://www.sciencedirect.com/science/book/9781597495684</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Seven deadliest social network attacks
ent://SD_ILS/0/SD_ILS:149145
2025-12-14T07:36:00Z
2025-12-14T07:36:00Z
Author Timm, Carl. Perez, Richard, 1969 Oct. 17- Ely, Adam.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495455">http://www.sciencedirect.com/science/book/9781597495455</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Eleventh hour network+ exam N10-004 study guide
ent://SD_ILS/0/SD_ILS:146455
2025-12-14T07:36:00Z
2025-12-14T07:36:00Z
Author Alpern, Naomi J. Shimonski, Robert.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494281">http://www.sciencedirect.com/science/book/9781597494281</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
PCI compliance understand and implement effective PCI data security standard compliance.
ent://SD_ILS/0/SD_ILS:148342
2025-12-14T07:36:00Z
2025-12-14T07:36:00Z
Author Chuvakin, Anton. Williams, Branden R. Spangenberg, Ward.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494991">http://www.sciencedirect.com/science/book/9781597494991</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Seven deadliest USB attacks
ent://SD_ILS/0/SD_ILS:148953
2025-12-14T07:36:00Z
2025-12-14T07:36:00Z
Author Anderson, Brian (Brian James)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495530">http://www.sciencedirect.com/science/book/9781597495530</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Seven deadliest wireless technologies attacks
ent://SD_ILS/0/SD_ILS:149033
2025-12-14T07:36:00Z
2025-12-14T07:36:00Z
Author Haines, Brad.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495417">http://www.sciencedirect.com/science/book/9781597495417</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Seven deadliest network attacks
ent://SD_ILS/0/SD_ILS:149185
2025-12-14T07:36:00Z
2025-12-14T07:36:00Z
Author Prowell, Stacy J. Kraus, Rob. Borkin, Mike.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495493">http://www.sciencedirect.com/science/book/9781597495493</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Seven deadliest USB attacks
ent://SD_ILS/0/SD_ILS:306328
2025-12-14T07:36:00Z
2025-12-14T07:36:00Z
Author Anderson, Brian (Brian James)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495530">http://www.sciencedirect.com/science/book/9781597495530</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of financial cryptography and security
ent://SD_ILS/0/SD_ILS:542098
2025-12-14T07:36:00Z
2025-12-14T07:36:00Z
Author Rosenberg, Burton.<br/>Preferred Shelf Number HG1710 .H34 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420059823">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Mac security bible
ent://SD_ILS/0/SD_ILS:303881
2025-12-14T07:36:00Z
2025-12-14T07:36:00Z
Author Kissell, Joe.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118257739">An electronic book accessible through the World Wide Web; click for information</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/640">http://proquest.safaribooksonline.com/640</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780470474198">http://proquest.safaribooksonline.com/?fpi=9780470474198</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/9780470474198">http://proquest.safaribooksonline.com/9780470474198</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40737">http://www.books24x7.com/marc.asp?bookid=40737</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10358774">http://site.ebrary.com/lib/alltitles/Doc?id=10358774</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IT audit, control, and security
ent://SD_ILS/0/SD_ILS:304008
2025-12-14T07:36:00Z
2025-12-14T07:36:00Z
Author Moeller, Robert R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118269138">An electronic book accessible through the World Wide Web; click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40717">http://www.books24x7.com/marc.asp?bookid=40717</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10469768">http://site.ebrary.com/lib/alltitles/Doc?id=10469768</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=624573">http://swb.eblib.com/patron/FullRecord.aspx?p=624573</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams
ent://SD_ILS/0/SD_ILS:297862
2025-12-14T07:36:00Z
2025-12-14T07:36:00Z
Author Kouns, Jake. Minoli, Daniel, 1952- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
China's cyberwarfare capability
ent://SD_ILS/0/SD_ILS:281481
2025-12-14T07:36:00Z
2025-12-14T07:36:00Z
Author Marvel, Elisabette M.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=581824">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=581824</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security 2020 reduce security risks this decade
ent://SD_ILS/0/SD_ILS:303839
2025-12-14T07:36:00Z
2025-12-14T07:36:00Z
Author Howard, Doug. Prince, Kevin. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255803">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital forensics for network, Internet, and cloud computing a forensic evidence guide for moving targets and data
ent://SD_ILS/0/SD_ILS:146482
2025-12-14T07:36:00Z
2025-12-14T07:36:00Z
Author Lillard, Terrence.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495370">http://www.sciencedirect.com/science/book/9781597495370</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Seven deadliest web application attacks
ent://SD_ILS/0/SD_ILS:149103
2025-12-14T07:36:00Z
2025-12-14T07:36:00Z
Author Shema, Mike.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495431">http://www.sciencedirect.com/science/book/9781597495431</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cognitive Radio Networking and Security A Game-Theoretic View
ent://SD_ILS/0/SD_ILS:238948
2025-12-14T07:36:00Z
2025-12-14T07:36:00Z
Author Liu, K. J. Ray. Wang, Beibei.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511778773">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Security A Decision and Game-Theoretic Approach
ent://SD_ILS/0/SD_ILS:237887
2025-12-14T07:36:00Z
2025-12-14T07:36:00Z
Author Alpcan, Tansu. Başar, Tamer.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511760778">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security risk analysis
ent://SD_ILS/0/SD_ILS:538713
2025-12-14T07:36:00Z
2025-12-14T07:36:00Z
Author Peltier, Thomas R., author.<br/>Preferred Shelf Number QA76.9 .A25 P429 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439839577">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>