Search Results for Computer networks -- Security measures. - Narrowed by: 2014SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bnetworks$002b--$002bSecurity$002bmeasures.$0025C2$0025A0$0026qf$003dPUBDATE$002509Publication$002bDate$0025092014$0025092014$0026ps$003d300?2025-12-15T09:11:45ZNetwork security essentials : applications and standardsent://SD_ILS/0/SD_ILS:3542322025-12-15T09:11:45Z2025-12-15T09:11:45ZAuthor Stallings, William.<br/>Preferred Shelf Number TK5105.59 S725 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:3557702025-12-15T09:11:45Z2025-12-15T09:11:45ZAuthor Andress, Jason, author.<br/>Preferred Shelf Number ONLINE(355770.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128007440">http://www.sciencedirect.com/science/book/9780128007440</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Targeted cyber attacks : multi-staged attacks driven by exploits and malwareent://SD_ILS/0/SD_ILS:3558532025-12-15T09:11:45Z2025-12-15T09:11:45ZAuthor Sood, Aditya K., author. Enbody, Richard J., author.<br/>Preferred Shelf Number ONLINE(355853.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128006047">http://www.sciencedirect.com/science/book/9780128006047</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cryptography and network security : principles and practiceent://SD_ILS/0/SD_ILS:3712882025-12-15T09:11:45Z2025-12-15T09:11:45ZAuthor Stallings, William.<br/>Preferred Shelf Number TK5105.59 S713 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Network and system securityent://SD_ILS/0/SD_ILS:3066902025-12-15T09:11:45Z2025-12-15T09:11:45ZAuthor Vacca, John R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166899">http://www.sciencedirect.com/science/book/9780124166899</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Managing information securityent://SD_ILS/0/SD_ILS:3066922025-12-15T09:11:45Z2025-12-15T09:11:45ZAuthor Vacca, John R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166882">http://www.sciencedirect.com/science/book/9780124166882</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Business continuity and disaster recovery planning for IT professionalsent://SD_ILS/0/SD_ILS:3066952025-12-15T09:11:45Z2025-12-15T09:11:45ZAuthor Snedaker, Susan. Rima, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124105263">http://www.sciencedirect.com/science/book/9780124105263</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking Interfaceent://SD_ILS/0/SD_ILS:3178472025-12-15T09:11:45Z2025-12-15T09:11:45ZAuthor Elbahadır, Hamza.<br/>Preferred Shelf Number QA 76.9 A25 E43 2014<br/>Format: Books<br/>Availability Beytepe Library~2<br/>Cybercrime and cyberwarfareent://SD_ILS/0/SD_ILS:3419802025-12-15T09:11:45Z2025-12-15T09:11:45ZAuthor Bernik, Igor, author.<br/>Preferred Shelf Number ONLINE(341980.1)<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9781118898604">http://dx.doi.org/10.1002/9781118898604</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber threat! : how to manage the growing risk of cyber attacksent://SD_ILS/0/SD_ILS:3420202025-12-15T09:11:45Z2025-12-15T09:11:45ZAuthor Ulsch, N. MacDonnell, 1951-<br/>Preferred Shelf Number ONLINE(342020.1)<br/>Electronic Access ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a>
MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a>
Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity for executives : a practical guideent://SD_ILS/0/SD_ILS:3419972025-12-15T09:11:45Z2025-12-15T09:11:45ZAuthor Touhill, Gregory J., author. Touhill, C. J., 1938- author.<br/>Preferred Shelf Number ONLINE(341997.1)<br/>Electronic Access Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1707094">http://public.eblib.com/choice/publicfullrecord.aspx?p=1707094</a>
ebrary <a href="http://site.ebrary.com/id/10879737">http://site.ebrary.com/id/10879737</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118908785">http://dx.doi.org/10.1002/9781118908785</a>
MyiLibrary <a href="http://www.myilibrary.com?id=621896">http://www.myilibrary.com?id=621896</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/?fpi=9781118908808">http://proquest.safaribooksonline.com/?fpi=9781118908808</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network Securityent://SD_ILS/0/SD_ILS:3421682025-12-15T09:11:45Z2025-12-15T09:11:45ZAuthor Perez, Andre.<br/>Preferred Shelf Number ONLINE(342168.1)<br/>Electronic Access ebrary <a href="http://site.ebrary.com/lib/alltitles/docDetail.action?docID=10945002">http://site.ebrary.com/lib/alltitles/docDetail.action?docID=10945002</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781119043942">http://dx.doi.org/10.1002/9781119043942</a>
MyiLibrary <a href="http://www.myilibrary.com?id=647917">http://www.myilibrary.com?id=647917</a>
Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{D8CDF404-6689-4759-9C8F-A065220E7032}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{D8CDF404-6689-4759-9C8F-A065220E7032}Img100.jpg</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Data analysis for network cyber-securityent://SD_ILS/0/SD_ILS:3547572025-12-15T09:11:45Z2025-12-15T09:11:45ZAuthor Adams, Niall M., 1968- Heard, Nicholas.<br/>Preferred Shelf Number TK5105.59 D375 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Windows forensic analysis toolkit : advanced analysis techniques for Windows 8ent://SD_ILS/0/SD_ILS:3559092025-12-15T09:11:45Z2025-12-15T09:11:45ZAuthor Carvey, Harlan A., author.<br/>Preferred Shelf Number ONLINE(355909.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124171572">http://www.sciencedirect.com/science/book/9780124171572</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security careers skills, compensation, and career pathsent://SD_ILS/0/SD_ILS:3560432025-12-15T09:11:45Z2025-12-15T09:11:45ZAuthor Walker, Stephen W. Foushee, James E.<br/>Preferred Shelf Number ONLINE(356043.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128001042">http://www.sciencedirect.com/science/book/9780128001042</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The basics of digital privacy simple tools to protect your personal information and your identity onlineent://SD_ILS/0/SD_ILS:3561232025-12-15T09:11:45Z2025-12-15T09:11:45ZAuthor Cherry, Denny. LaRock, Thomas.<br/>Preferred Shelf Number ONLINE(356123.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000113">http://www.sciencedirect.com/science/book/9780128000113</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Distributed networks : intelligence, security, and applicationsent://SD_ILS/0/SD_ILS:5404522025-12-15T09:11:45Z2025-12-15T09:11:45ZAuthor Memon, Qurban Ali, editor.<br/>Preferred Shelf Number QA76.9 .D5 D55626 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781315216218">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Conducting network penetration and espionage in a global environmentent://SD_ILS/0/SD_ILS:5411632025-12-15T09:11:45Z2025-12-15T09:11:45ZAuthor Middleton, Bruce, 1953, author.<br/>Preferred Shelf Number TK5105.59 .M53 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781482206487">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>What every engineer should know about cyber security and digital forensicsent://SD_ILS/0/SD_ILS:5397262025-12-15T09:11:45Z2025-12-15T09:11:45ZAuthor DeFranco, Joanna F., author.<br/>Preferred Shelf Number TK5105.59 .D44 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466564541">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Security for multihop wireless networksent://SD_ILS/0/SD_ILS:5386522025-12-15T09:11:45Z2025-12-15T09:11:45ZAuthor Khan, Shafiullah, editor. Lloret Mauri, Jaime, editor.<br/>Preferred Shelf Number TK5105.59 .S43 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466578043">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Network anomaly detection : a machine learning perspectiveent://SD_ILS/0/SD_ILS:5477482025-12-15T09:11:45Z2025-12-15T09:11:45ZAuthor Bhattacharyya, Dhruba K., author. Kalita, Jugal Kumar, author.<br/>Preferred Shelf Number TK5105.59 .B474 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466582095">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Security without obscurity : a guide to confidentiality, authentication, and integrityent://SD_ILS/0/SD_ILS:5441182025-12-15T09:11:45Z2025-12-15T09:11:45ZAuthor Stapleton, Jeffrey James, author.<br/>Preferred Shelf Number QA76.9 .A25 S734 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466592155">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Anonymous communication networks : protecting privacy on the webent://SD_ILS/0/SD_ILS:5436192025-12-15T09:11:45Z2025-12-15T09:11:45ZAuthor Peng, Kun, author.<br/>Preferred Shelf Number TK5105.59 .P463 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439881606">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>The state of the art in intrusion prevention and detectionent://SD_ILS/0/SD_ILS:5436762025-12-15T09:11:45Z2025-12-15T09:11:45ZAuthor Pathan, Al-Sakib Khan, editor.<br/>Preferred Shelf Number QA76.9 .A25 S7354 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781482203523">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>