Search Results for Computer networks -- Security measures. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300$0026isd$003dtrue?dt=list 2024-11-23T21:18:22Z Elektronik harp ent://SD_ILS/0/SD_ILS:514348 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Pakfiliz, Ahmet G&uuml;ng&ouml;r.<br/>Preferred Shelf Number&#160;UG485 P35 2021<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> A&#287; y&ouml;netimi ve bilgi g&uuml;venli&#287;i ent://SD_ILS/0/SD_ILS:516275 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Bilge, Alper.&#160;Ka&ccedil;maz, Emre.<br/>Preferred Shelf Number&#160;TK5105.59 A98 2021<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> T&uuml;rkiye&rsquo;de ve d&uuml;nyada siber g&uuml;venlik ent://SD_ILS/0/SD_ILS:514958 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;&Ccedil;elikta&#351;, Bar&#305;&#351; .<br/>Preferred Shelf Number&#160;UG485 C45 2020<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Uygulamalarla siber g&uuml;venli&#287;e giri&#351; ent://SD_ILS/0/SD_ILS:510151 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Aky&#305;ld&#305;z, M. Alparslan.<br/>Preferred Shelf Number&#160;TK5105.59.A39 U94 2020<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Ethical hacking : (hacking kursu) ent://SD_ILS/0/SD_ILS:423950 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Usta, G&ouml;khan.<br/>Preferred Shelf Number&#160;QA76.9.A25 U88 2019<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Artificial intelligence and security challenges in emerging networks ent://SD_ILS/0/SD_ILS:481975 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Abassi, Ryma, 1980- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7353-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7353-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced methodologies and technologies in system security, information privacy, and forensics ent://SD_ILS/0/SD_ILS:482009 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Khosrow-Pour, Mehdi, 1951- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security Workshops ACNS 2019 Satellite Workshops, SiMLA, Cloud S&amp;P, AIBlock, and AIoTS, Bogota, Colombia, June 5&ndash;7, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484047 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Zhou, Jianying. editor. (orcid)0000-0003-0594-0432&#160;Deng, Robert. editor. (orcid)0000-0003-3491-8146&#160;Li, Zhou. editor.&#160;Majumdar, Suryadipta. editor. (orcid)0000-0002-6501-4214&#160;Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-29729-9">https://doi.org/10.1007/978-3-030-29729-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Cryptography and Machine Learning Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27&ndash;28, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484186 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Dolev, Shlomi. editor.&#160;Hendler, Danny. editor.&#160;Lodha, Sachin. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-20951-3">https://doi.org/10.1007/978-3-030-20951-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10&ndash;11, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:484518 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Blazy, Olivier. editor. (orcid)0000-0001-6205-8249&#160;Yeun, Chan Yeob. editor. (orcid)0000-0002-1398-952X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-20074-9">https://doi.org/10.1007/978-3-030-20074-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity education for awareness and compliance ent://SD_ILS/0/SD_ILS:482092 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Vasileiou, Ismini, 1980- editor.&#160;Furnell, Steven, 1970- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7847-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7847-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Countering cyber attacks and preserving the integrity and availability of critical systems ent://SD_ILS/0/SD_ILS:482177 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Geetha, S., 1979- editor.&#160;Phamila, Asnath Victy, 1978- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity in Nigeria A Case Study of Surveillance and Prevention of Digital Crime ent://SD_ILS/0/SD_ILS:483013 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Iorliam, Aamo. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-15210-9">https://doi.org/10.1007/978-3-030-15210-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9&ndash;11, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483112 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Nandi, Sukumar. editor.&#160;Jinwala, Devesh. editor.&#160;Singh, Virendra. editor.&#160;Laxmi, Vijay. editor.&#160;Gaur, Manoj Singh. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-7561-3">https://doi.org/10.1007/978-981-13-7561-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Social Networks and Big Data 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483889 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Meng, Weizhi. editor. (orcid)0000-0003-4384-5786&#160;Furnell, Steven. editor. (orcid)0000-0003-0984-7542&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-15-0758-8">https://doi.org/10.1007/978-981-15-0758-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Innovations and Interdisciplinary Solutions for Underserved Areas Third EAI International Conference, InterSol 2019, Cairo, Egypt, February 14&ndash;15, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484846 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Bassioni, Ghada. editor.&#160;Kebe, Cheikh M.F. editor.&#160;Gueye, Assane. editor. (orcid)0000-0001-6469-4716&#160;Ndiaye, Ababacar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-34863-2">https://doi.org/10.1007/978-3-030-34863-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure IT Systems 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18&ndash;20, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484847 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Askarov, Aslan. editor.&#160;Hansen, Ren&eacute; Rydhof. editor.&#160;Rafnsson, Willard. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-35055-0">https://doi.org/10.1007/978-3-030-35055-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 22nd International Conference, ISC 2019, New York City, NY, USA, September 16&ndash;18, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484908 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Lin, Zhiqiang. editor.&#160;Papamanthou, Charalampos. editor.&#160;Polychronakis, Michalis. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-30215-3">https://doi.org/10.1007/978-3-030-30215-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyberdanger Understanding and Guarding Against Cybercrime ent://SD_ILS/0/SD_ILS:485936 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Willems, Eddy. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-04531-9">https://doi.org/10.1007/978-3-030-04531-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography &ndash; SAC 2018 25th International Conference, Calgary, AB, Canada, August 15&ndash;17, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483366 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Cid, Carlos. editor. (orcid)0000-0001-5761-8694&#160;Jacobson Jr., Michael J. editor. (orcid)0000-0002-4906-0544&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-10970-7">https://doi.org/10.1007/978-3-030-10970-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Operational Technology Security Systems First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486944 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Fournaris, Apostolos P. editor. (orcid)0000-0002-4758-2349&#160;Lampropoulos, Konstantinos. editor.&#160;Mar&iacute;n Tordera, Eva. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-12085-6">https://doi.org/10.1007/978-3-030-12085-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Siber g&uuml;venlik ve savunma : standartlar ve uygulamalar ent://SD_ILS/0/SD_ILS:462283 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Sa&#287;&#305;ro&#287;lu, &#350;eref.<br/>Preferred Shelf Number&#160;TK5105.59 S53 2019<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Network security and its impact on business strategy ent://SD_ILS/0/SD_ILS:482213 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Oncioiu, Ionica, 1972- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Exploit geli&#351;tirme 101 ent://SD_ILS/0/SD_ILS:389077 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Aky&#305;ld&#305;z, M. Alparslan.<br/>Preferred Shelf Number&#160;QA76.9.A25 A59 2018<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Wired/Wireless Internet Communications 16th IFIP WG 6.2 International Conference, WWIC 2018, Boston, MA, USA, June 18&ndash;20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400186 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Chowdhury, Kaushik Roy. editor.&#160;Di Felice, Marco. editor.&#160;Matta, Ibrahim. editor.&#160;Sheng, Bo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-02931-9">https://doi.org/10.1007/978-3-030-02931-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Computing and Communication Third International Conference, SmartCom 2018, Tokyo, Japan, December 10&ndash;12, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400107 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Qiu, Meikang. editor. (orcid)0000-0002-1004-0140&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-05755-8">https://doi.org/10.1007/978-3-030-05755-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Arithmetic of Finite Fields 7th International Workshop, WAIFI 2018, Bergen, Norway, June 14-16, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:400306 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Budaghyan, Lilya. editor.&#160;Rodr&iacute;guez-Henr&iacute;quez, Francisco. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-05153-2">https://doi.org/10.1007/978-3-030-05153-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:459114 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Faircloth, Jeremy, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128021491">http://www.sciencedirect.com/science/book/9780128021491</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Safety of web applications : risks, encryption and handling vulnerabilities with PHP ent://SD_ILS/0/SD_ILS:459467 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Quinton, &Eacute;ric, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781785482281">http://www.sciencedirect.com/science/book/9781785482281</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in network functions virtualization ent://SD_ILS/0/SD_ILS:459901 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Zhang, Zonghua, author.&#160;Meddahi, Ahmed, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781785482571">https://www.sciencedirect.com/science/book/9781785482571</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies ent://SD_ILS/0/SD_ILS:459204 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Winkler, Ira, author.&#160;Gomes, Araceli Treu, author.&#160;Shackleford, Dave, editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128093160">https://www.sciencedirect.com/science/book/9780128093160</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems ent://SD_ILS/0/SD_ILS:459145 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Griffor, Edward R., editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128037737">http://www.sciencedirect.com/science/book/9780128037737</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building a practical information security program ent://SD_ILS/0/SD_ILS:459146 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Andress, Jason, author.&#160;Leary, Mark, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128020425">http://www.sciencedirect.com/science/book/9780128020425</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing the internet of things ent://SD_ILS/0/SD_ILS:459335 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Li, Shancang, author.&#160;Xu, Li D., author.&#160;Romdhani, Imed, contributor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128044582">https://www.sciencedirect.com/science/book/9780128044582</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The basics of cyber safety : computer and mobile device safety made easy ent://SD_ILS/0/SD_ILS:459044 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Sammons, John, author.&#160;Cross, Michael, 1965- author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166509">http://www.sciencedirect.com/science/book/9780124166509</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:459518 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Vacca, John R., editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128038437">https://www.sciencedirect.com/science/book/9780128038437</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security awareness for CEOs and management ent://SD_ILS/0/SD_ILS:458665 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Willson, David (Lawyer), author.&#160;Dalziel, Henry, editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128047545">http://www.sciencedirect.com/science/book/9780128047545</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Windows registry forensics : advanced digital forensic analysis of the Windows registry ent://SD_ILS/0/SD_ILS:458777 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Carvey, Harlan A., author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128032916">http://www.sciencedirect.com/science/book/9780128032916</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data breach preparation and response : breaches are certain, impact is not ent://SD_ILS/0/SD_ILS:458926 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Fowler, Kevvie, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128034514">https://www.sciencedirect.com/science/book/9780128034514</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> DNS security : defending the domain name system ent://SD_ILS/0/SD_ILS:458935 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Liska, Allan, author.&#160;Stowe, Geoffrey, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128033067">http://www.sciencedirect.com/science/book/9780128033067</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber guerilla ent://SD_ILS/0/SD_ILS:458953 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Haaster, Jelle van, author.&#160;Gevers, Rickey, author.&#160;Sprengers, Martijn, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128051979">http://www.sciencedirect.com/science/book/9780128051979</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking Interface ent://SD_ILS/0/SD_ILS:513452 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Elbahad&#305;r, Hamza.<br/>Preferred Shelf Number&#160;QA76.9.A25 E43 2016<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Network performance and security : testing and analyzing using open source and low-cost tools ent://SD_ILS/0/SD_ILS:458789 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Chapman, Chris, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128035849">http://www.sciencedirect.com/science/book/9780128035849</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Eleventh Hour CISSP&reg; ent://SD_ILS/0/SD_ILS:459073 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Conrad, Eric, author.&#160;Seth Misenar, author.&#160;Joshua Feldman, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128112489">http://www.sciencedirect.com/science/book/9780128112489</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Coding for penetration testers : building better tools ent://SD_ILS/0/SD_ILS:459217 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Andress, Jason, author.&#160;Linn, Ryan, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128054727">http://www.sciencedirect.com/science/book/9780128054727</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> PCI compliance : understand and implement effective PCI data security standard compliance ent://SD_ILS/0/SD_ILS:355363 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Williams, Branden R., author.&#160;Chuvakin, Anton A., author.&#160;Milroy, Derek, editor<br/>Preferred Shelf Number&#160;ONLINE(355363.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128015797">http://www.sciencedirect.com/science/book/9780128015797</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Siber istihbarat ent://SD_ILS/0/SD_ILS:384051 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Kele&#351;temur, Atalay<br/>Preferred Shelf Number&#160;QA76.9.A25 K45 2015<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Managing online risk : apps, mobile, and social media security ent://SD_ILS/0/SD_ILS:355514 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Gonzalez, Deborah, author.<br/>Preferred Shelf Number&#160;ONLINE(355514.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124200555">http://www.sciencedirect.com/science/book/9780124200555</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A&#287; ve yaz&#305;l&#305;m g&uuml;venli&#287;i ent://SD_ILS/0/SD_ILS:379758 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;&Ccedil;ontar, Furkan.<br/>Preferred Shelf Number&#160;TK5105.59 C66 2015<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Dissecting the hack : the v3rb0ten network ent://SD_ILS/0/SD_ILS:458624 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Street, Jayson E., author.&#160;Sims, Kristin, author.&#160;Baskin, Brian, author.&#160;Martin, Brian, editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128042786">https://www.sciencedirect.com/science/book/9780128042786</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tam kapsaml&#305; sanal test laboratuvar&#305; kurulumu ve uygulamal&#305; s&#305;zma testleri ent://SD_ILS/0/SD_ILS:513467 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Yal&ccedil;&#305;nkaya, Mehmet Ali, yazar.&#160;K&uuml;&ccedil;&uuml;ksille, Ecir U&#287;ur, yazar.<br/>Preferred Shelf Number&#160;TK5105.59 Y35 2015<br/>Format:&#160;Regular print<br/>Availability&#160;Beytepe Library~1<br/> Practical deployment of Cisco Identity Services Engine (ISE) : real-world examples of AAA deployments ent://SD_ILS/0/SD_ILS:458699 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Richter, Andy, author.&#160;Wood, Jeremy, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128044575">https://www.sciencedirect.com/science/book/9780128044575</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Case studies in secure computing : achievements and trends ent://SD_ILS/0/SD_ILS:356504 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Issac, Biju, editor.&#160;Israr, Nauman, editor.<br/>Preferred Shelf Number&#160;ONLINE(356504.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781482207071">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed networks : intelligence, security, and applications ent://SD_ILS/0/SD_ILS:285408 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Memon, Qurban Ali, editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466559585">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network and system security ent://SD_ILS/0/SD_ILS:306690 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Vacca, John R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166899">http://www.sciencedirect.com/science/book/9780124166899</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managing information security ent://SD_ILS/0/SD_ILS:306692 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Vacca, John R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166882">http://www.sciencedirect.com/science/book/9780124166882</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Business continuity and disaster recovery planning for IT professionals ent://SD_ILS/0/SD_ILS:306695 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Snedaker, Susan.&#160;Rima, Chris.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124105263">http://www.sciencedirect.com/science/book/9780124105263</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity for executives : a practical guide ent://SD_ILS/0/SD_ILS:341997 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Touhill, Gregory J., author.&#160;Touhill, C. J., 1938- author.<br/>Preferred Shelf Number&#160;ONLINE(341997.1)<br/>Electronic Access&#160;Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1707094">http://public.eblib.com/choice/publicfullrecord.aspx?p=1707094</a> ebrary <a href="http://site.ebrary.com/id/10879737">http://site.ebrary.com/id/10879737</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118908785">http://dx.doi.org/10.1002/9781118908785</a> MyiLibrary <a href="http://www.myilibrary.com?id=621896">http://www.myilibrary.com?id=621896</a> Safari Books Online <a href="http://proquest.safaribooksonline.com/?fpi=9781118908808">http://proquest.safaribooksonline.com/?fpi=9781118908808</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber threat! : how to manage the growing risk of cyber attacks ent://SD_ILS/0/SD_ILS:342020 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Ulsch, N. MacDonnell, 1951-<br/>Preferred Shelf Number&#160;ONLINE(342020.1)<br/>Electronic Access&#160;ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a> Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a> MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a> Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data analysis for network cyber-security ent://SD_ILS/0/SD_ILS:354757 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Adams, Niall M., 1968-&#160;Heard, Nicholas.<br/>Preferred Shelf Number&#160;TK5105.59 D375 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Hacking Interface ent://SD_ILS/0/SD_ILS:317847 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Elbahad&#305;r, Hamza.<br/>Preferred Shelf Number&#160;QA 76.9 A25 E43 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Network anomaly detection : a machine learning perspective ent://SD_ILS/0/SD_ILS:285413 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Bhattacharyya, Dhruba K., author.&#160;Kalita, Jugal Kumar, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466582095">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybercrime and cyberwarfare ent://SD_ILS/0/SD_ILS:341980 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Bernik, Igor, author.<br/>Preferred Shelf Number&#160;ONLINE(341980.1)<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9781118898604">http://dx.doi.org/10.1002/9781118898604</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> What every engineer should know about cyber security and digital forensics ent://SD_ILS/0/SD_ILS:342886 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;DeFranco, Joanna F., author.<br/>Preferred Shelf Number&#160;ONLINE(342886.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466564541">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:355770 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Andress, Jason, author.<br/>Preferred Shelf Number&#160;ONLINE(355770.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128007440">http://www.sciencedirect.com/science/book/9780128007440</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Targeted cyber attacks : multi-staged attacks driven by exploits and malware ent://SD_ILS/0/SD_ILS:355853 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Sood, Aditya K., author.&#160;Enbody, Richard J., author.<br/>Preferred Shelf Number&#160;ONLINE(355853.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128006047">http://www.sciencedirect.com/science/book/9780128006047</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The basics of digital privacy simple tools to protect your personal information and your identity online ent://SD_ILS/0/SD_ILS:356123 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Cherry, Denny.&#160;LaRock, Thomas.<br/>Preferred Shelf Number&#160;ONLINE(356123.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000113">http://www.sciencedirect.com/science/book/9780128000113</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Conducting network penetration and espionage in a global environment ent://SD_ILS/0/SD_ILS:356516 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Middleton, Bruce, 1953- author.<br/>Preferred Shelf Number&#160;ONLINE(356516.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781482206487">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for service oriented architectures ent://SD_ILS/0/SD_ILS:356556 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Williams, Walter (Telecommunications engineer), author.<br/>Preferred Shelf Number&#160;ONLINE(356556.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466584044">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The state of the art in intrusion prevention and detection ent://SD_ILS/0/SD_ILS:356396 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Pathan, Al-Sakib Khan, editor.<br/>Preferred Shelf Number&#160;ONLINE(356396.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781482203523">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and network security : principles and practice ent://SD_ILS/0/SD_ILS:371288 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Stallings, William.<br/>Preferred Shelf Number&#160;TK5105.59 S713 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Network Security ent://SD_ILS/0/SD_ILS:342168 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Perez, Andre.<br/>Preferred Shelf Number&#160;ONLINE(342168.1)<br/>Electronic Access&#160;ebrary <a href="http://site.ebrary.com/lib/alltitles/docDetail.action?docID=10945002">http://site.ebrary.com/lib/alltitles/docDetail.action?docID=10945002</a> John Wiley <a href="http://dx.doi.org/10.1002/9781119043942">http://dx.doi.org/10.1002/9781119043942</a> MyiLibrary <a href="http://www.myilibrary.com?id=647917">http://www.myilibrary.com?id=647917</a> Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{D8CDF404-6689-4759-9C8F-A065220E7032}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{D8CDF404-6689-4759-9C8F-A065220E7032}Img100.jpg</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network security essentials : applications and standards ent://SD_ILS/0/SD_ILS:354232 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Stallings, William.<br/>Preferred Shelf Number&#160;TK5105.59 S725 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 ent://SD_ILS/0/SD_ILS:355909 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Carvey, Harlan A., author.<br/>Preferred Shelf Number&#160;ONLINE(355909.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124171572">http://www.sciencedirect.com/science/book/9780124171572</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security careers skills, compensation, and career paths ent://SD_ILS/0/SD_ILS:356043 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Walker, Stephen W.&#160;Foushee, James E.<br/>Preferred Shelf Number&#160;ONLINE(356043.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128001042">http://www.sciencedirect.com/science/book/9780128001042</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Anonymous communication networks : protecting privacy on the web ent://SD_ILS/0/SD_ILS:356657 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Peng, Kun, author.<br/>Preferred Shelf Number&#160;ONLINE(356657.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439881606">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security without obscurity : a guide to confidentiality, authentication, and integrity ent://SD_ILS/0/SD_ILS:356681 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Stapleton, Jeffrey James, author.<br/>Preferred Shelf Number&#160;ONLINE(356681.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466592155">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for multihop wireless networks ent://SD_ILS/0/SD_ILS:356916 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Khan, Shafiullah, editor.&#160;Lloret Mauri, Jaime, editor.<br/>Preferred Shelf Number&#160;ONLINE(356916.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466578043">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> UTM security with Fortinet Mastering FortiOS ent://SD_ILS/0/SD_ILS:146934 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Tam, Kenneth.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497473">http://www.sciencedirect.com/science/book/9781597497473</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> FISMA and the risk management framework the new practice of federal cyber security ent://SD_ILS/0/SD_ILS:145936 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Gantz, Stephen D.&#160;Philpott, Daniel R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496414">http://www.sciencedirect.com/science/book/9781597496414</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in cyber security technology, operations, and experiences ent://SD_ILS/0/SD_ILS:239591 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Hsu, D. Frank (Derbiau Frank), 1948-&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780823250325/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information protection playbook ent://SD_ILS/0/SD_ILS:306649 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Kane, Greg, editor of compilation.&#160;Koppel, Lorna, editor of compilation.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124172326">http://www.sciencedirect.com/science/book/9780124172326</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The basics of web hacking tools and techniques to attack the Web ent://SD_ILS/0/SD_ILS:306699 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Pauli, Joshua J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166004">http://www.sciencedirect.com/science/book/9780124166004</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Instant penetration testing setting up a test lab how-to : set up your own penetration testing lab using practical and precise recipes ent://SD_ILS/0/SD_ILS:313044 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Fadyushin, Vyacheslav.<br/>Preferred Shelf Number&#160;ONLINE(313044.1)<br/>Electronic Access&#160;Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpIPTSUTL3">http://app.knovel.com/web/toc.v/cid:kpIPTSUTL3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Official (ISC)[superscript 2] guide to the CAP CBK ent://SD_ILS/0/SD_ILS:288056 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Howard, Patrick D.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439820766">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Automatic defense against zero-day polymorphic worms in communication networks ent://SD_ILS/0/SD_ILS:286307 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Mohammed, Mohssen, 1982-&#160;Pathan, Al-Sakib Khan.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466557284">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of SCADA/control systems security ent://SD_ILS/0/SD_ILS:288155 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Radvanovsky, Robert.&#160;Brodsky, Jacob.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466502277">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Iris biometric model for secured network access ent://SD_ILS/0/SD_ILS:288160 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Khoury, Franjieh El.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466502147">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security policy development for compliance ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0 ent://SD_ILS/0/SD_ILS:288173 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Williams, Barry L.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466580596">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> PRAGMATIC security metrics applying metametrics to information security ent://SD_ILS/0/SD_ILS:289974 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Brotby, W. Krag.&#160;Hinson, Gary.&#160;Kabay, Michel E.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439881538">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied network security monitoring collection, detection, and analysis ent://SD_ILS/0/SD_ILS:356122 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Sanders, Chris.&#160;Smith, Jason.<br/>Preferred Shelf Number&#160;ONLINE(356122.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124172081">http://www.sciencedirect.com/science/book/9780124172081</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security for managers ent://SD_ILS/0/SD_ILS:516570 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Workman, Michael D., 1957-.&#160;Phelps, Daniel C.&#160;Gathegi, John N.<br/>Preferred Shelf Number&#160;HF5548.37 W67 2013<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Handbook on securing cyber-physical critical infrastructure ent://SD_ILS/0/SD_ILS:145579 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Das, Sajal K.&#160;Kant, Krishna.&#160;Zhang, Nan, 1982-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124158153">http://www.sciencedirect.com/science/book/9780124158153</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network intrusion analysis methodologies, tools, and techniques for incident analysis and response ent://SD_ILS/0/SD_ILS:146274 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Fichera, Joe, 1966-&#160;Bolt, Steven.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499620">http://www.sciencedirect.com/science/book/9781597499620</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> PCI compliance understand and implement effective PCI data security standard compliance ent://SD_ILS/0/SD_ILS:148429 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Chuvakin, Anton.&#160;Williams, Branden R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499484">http://www.sciencedirect.com/science/book/9781597499484</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CISSP study guide ent://SD_ILS/0/SD_ILS:148769 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Conrad, Eric, 1967-&#160;Misenar, Seth.&#160;Feldman, Joshua.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499613">http://www.sciencedirect.com/science/book/9781597499613</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced persistent threat understanding the danger and how to protect your organization ent://SD_ILS/0/SD_ILS:146056 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Cole, Eric.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499491">http://www.sciencedirect.com/science/book/9781597499491</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice ent://SD_ILS/0/SD_ILS:145254 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Winterfeld, Steve.&#160;Andress, Jason.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124047372">http://www.sciencedirect.com/science/book/9780124047372</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security risk assessment toolkit practical assessments through data collection and data analysis ent://SD_ILS/0/SD_ILS:145470 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Talabis, Mark.&#160;Martin, Jason.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497350">http://www.sciencedirect.com/science/book/9781597497350</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Windows forensic analysis toolkit advanced analysis techniques for Windows 7 ent://SD_ILS/0/SD_ILS:145689 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Carvey, Harlan A.&#160;Kolde, Jennifer.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497275">http://www.sciencedirect.com/science/book/9781597497275</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> SQL injection attacks and defense ent://SD_ILS/0/SD_ILS:148516 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Clarke, Justin.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499637">http://www.sciencedirect.com/science/book/9781597499637</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Client-side attacks and defense ent://SD_ILS/0/SD_ILS:148731 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Oriyano, Sean-Philip.&#160;Shimonski, Robert.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495905">http://www.sciencedirect.com/science/book/9781597495905</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wiki at war conflict in a socially networked world ent://SD_ILS/0/SD_ILS:276700 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Carafano, James Jay, 1955-&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9781603446587/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Robust control system networks how to achieve reliable control after Stuxnet ent://SD_ILS/0/SD_ILS:280181 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Langner, Ralph.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=501116">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=501116</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wiki at war conflict in a socially networked world ent://SD_ILS/0/SD_ILS:241837 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Carafano, James Jay, 1955-&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9781603446570/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Asset protection through security awareness ent://SD_ILS/0/SD_ILS:286136 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Speed, Tyler Justin.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439809839">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Operating systems demystified ent://SD_ILS/0/SD_ILS:294101 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;McHoes, Ann McIver, 1950-&#160;Ballew, Joli.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/operating-systems-demystified">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Defense against the black arts how hackers do what they do and how to protect against it ent://SD_ILS/0/SD_ILS:291581 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Varsalone, Jesse.&#160;McFadden, Matthew.&#160;Morrissey, Sean.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439821220">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security metrics a beginner's guide ent://SD_ILS/0/SD_ILS:293238 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Wong, Caroline.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/security-metrics-beginners-guide">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing the clicks network security in the age of social media ent://SD_ILS/0/SD_ILS:293240 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Bahadur, Gary.&#160;Inasi, Jason.&#160;Carvalho, Alex de.&#160;Powell, Juliette, 1976-&#160;Valencia, Connie.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/securing-clicks-network-security-in-age-social-media">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Web application security a beginner's guide ent://SD_ILS/0/SD_ILS:293241 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Sullivan, Bryan, 1974-&#160;Liu, Vincent.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/web-application-security-beginners-guide">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Oracle WebLogic server 11g administration handbook ent://SD_ILS/0/SD_ILS:293243 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Alapati, Sam R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/oracle-weblogic-server-11g-administration-handbook">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed 7 : network security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:270033 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;McClure, Stuart.&#160;Scambray, Joel.&#160;Kurtz, George.<br/>Preferred Shelf Number&#160;TK5105.59 M48 2012<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Cybersecurity public sector threats and responses ent://SD_ILS/0/SD_ILS:286202 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Andreasson, Kim J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439846643">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network and application security fundamentals and practices ent://SD_ILS/0/SD_ILS:288993 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Ganguly, Debashis.&#160;Lahiri, Shibamouli.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466502451">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CISO's guide to penetration testing a framework to plan, manage, and maximize benefits ent://SD_ILS/0/SD_ILS:287105 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Tiller, James S.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439880289">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data mining tools for malware detection ent://SD_ILS/0/SD_ILS:287102 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Masud, Mehedy.&#160;Khan, Latifur.&#160;Thuraisingham, Bhavani M.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439854556">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ninja hacking unconventional penetration testing tactics and techniques ent://SD_ILS/0/SD_ILS:146263 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Wilhelm, Thomas.&#160;Andress, Jason.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495882">http://www.sciencedirect.com/science/book/9781597495882</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber warfare techniques, tactics and tools for security practitioners ent://SD_ILS/0/SD_ILS:147479 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Andress, Jason.&#160;Winterfeld, Steve.&#160;Rogers, Russ.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496377">http://www.sciencedirect.com/science/book/9781597496377</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:148225 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Faircloth, Jeremy.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496278">http://www.sciencedirect.com/science/book/9781597496278</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Coding for penetration testers building better tools ent://SD_ILS/0/SD_ILS:148785 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Andress, Jason.&#160;Linn, Ryan.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497299">http://www.sciencedirect.com/science/book/9781597497299</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The basics of information security understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:145371 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Andress, Jason.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing the cloud cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:148980 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Winkler, J. R. (Joachim R.)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Windows Registry Forensics Advanced Digital Forensic Analysis of the Windows Registry. ent://SD_ILS/0/SD_ILS:145659 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Carvey, Harlan.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495806">http://www.sciencedirect.com/science/book/9781597495806</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Eleventh hour CISSP study guide ent://SD_ILS/0/SD_ILS:146597 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Conrad, Eric, 1967-&#160;Misenar, Seth.&#160;Feldman, Joshua.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495660">http://www.sciencedirect.com/science/book/9781597495660</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wars of disruption and resilience cybered conflict, power, and national security ent://SD_ILS/0/SD_ILS:244312 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Demchak, Chris C.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780820341378/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Implementing SSL/TLS using cryptography and PKI ent://SD_ILS/0/SD_ILS:303838 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Davies, Joshua A. (Joshua Aaron)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255797">An electronic book accessible through the World Wide Web; click for information</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780470920411">Available by subscription from Safari Books Online</a> <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=706899">Click here to view book</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40694">http://www.books24x7.com/marc.asp?bookid=40694</a> Volltext <a href="http://proquest.safaribooksonline.com/9780470920411">http://proquest.safaribooksonline.com/9780470920411</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Official (ISC)2 guide to the SSCP CBK ent://SD_ILS/0/SD_ILS:286975 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Tipton, Harold F.&#160;International Information Systems Security Certification Consortium.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439804841">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Adaptive security management architecture ent://SD_ILS/0/SD_ILS:288451 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Tiller, James S.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420013375">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Designing an IAM framework with Oracle identity and access management suite ent://SD_ILS/0/SD_ILS:293289 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Scheidel, Jeff.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/designing-iam-framework-oracle-identity-access-management-suite">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mac OS X system administration ent://SD_ILS/0/SD_ILS:293298 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Hart-Davis, Guy.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/mac-os-x-system-administration">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile application security ent://SD_ILS/0/SD_ILS:293312 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Dwivedi, Himanshu.&#160;Clark, Chris, 1980-&#160;Thiel, David V.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/mobile-application-security">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Networking a beginner's guide ent://SD_ILS/0/SD_ILS:293314 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Hallberg, Bruce A., 1964-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/networking-beginners-guide-fifth-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> 24 deadly sins of software security programming flaws and how to fix them ent://SD_ILS/0/SD_ILS:293319 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Howard, Michael, 1965-&#160;LeBlanc, David, 1960-&#160;Viega, John.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/24-deadly-sins-software-security-programming-flaws-how-to-fix-them">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cisco ASA configuration ent://SD_ILS/0/SD_ILS:293322 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Deal, Richard A.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/cisco-asa-configuration">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed Linux Linux security secrets and solutions. ent://SD_ILS/0/SD_ILS:293324 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Hatch, Brian. Hacking Linux exposed.&#160;ISECOM (Organization)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-linux">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fedora 7 &amp; Red Hat Enterprise Linux the complete reference ent://SD_ILS/0/SD_ILS:293328 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Petersen, Richard, 1949-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/fedora-core-7-red-hat-enterprise-linux-complete-reference">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed Web 2.0 Web 2.0 security secrets and solutions ent://SD_ILS/0/SD_ILS:293352 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Cannings, Rich.&#160;Dwivedi, Himanshu.&#160;Lackey, Zane.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-web-20-security-secrets-solutions">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed malware &amp; rootkits malware &amp; rootkits security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:293397 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Davis, Michael A.&#160;Bodmer, Sean.&#160;LeMasters, Aaron.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-malware-rootkits">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CNET do-it-yourself home networking projects 24 cool things you didn't know you could do! ent://SD_ILS/0/SD_ILS:293687 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Aspinwall, Jim.&#160;CNET (Firm)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/cnet-doityourself-home-networking-projects">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and policy driven computing ent://SD_ILS/0/SD_ILS:288879 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Liu, Lei, 1968-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439825808">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical risk management for the CIO ent://SD_ILS/0/SD_ILS:291571 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Scherling, Mark.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439856543">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Gray hat hacking the ethical hacker's handbook ent://SD_ILS/0/SD_ILS:293255 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Harris, Shon.&#160;Harper, Allen.&#160;Eagle, Chris.&#160;Ness, Jonathan.&#160;Lenkey, Gideon.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/gray-hat-hacking-ethical-hackers-handbook-3rd-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT auditing using controls to protect information assets ent://SD_ILS/0/SD_ILS:293262 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Davis, Chris (Christopher Michael)&#160;Schiller, Mike.&#160;Wheeler, Kevin.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/auditing-using-controls-to-protect-information-assets-2nd-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Microsoft Windows server 2008 the complete reference ent://SD_ILS/0/SD_ILS:293367 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Ruest, Danielle.&#160;Ruest, Nelson.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/microsoft-windows-server-2008-complete-reference">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Microsoft Windows server 2008 a beginner's guide ent://SD_ILS/0/SD_ILS:293368 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Matthews, Martin S.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/microsoft-windows-server-2008-beginners-guide">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Citrix Access Suite 4 advanced concepts the official guide ent://SD_ILS/0/SD_ILS:293372 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Kaplan, Steve, 1955-&#160;Jones, Andy.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/citrix-access-suite-4-advanced-concepts-official-guide-second-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Home networking demystified a self-teaching guide ent://SD_ILS/0/SD_ILS:294143 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Long, Larry E.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/home-networking-demystified">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Auditing cloud computing a security and privacy guide ent://SD_ILS/0/SD_ILS:299263 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Halpert, Ben, 1986-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=44303">http://www.books24x7.com/marc.asp?bookid=44303</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118269091">http://dx.doi.org/10.1002/9781118269091</a> OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50</a> OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Readings and cases in information security : law and ethics ent://SD_ILS/0/SD_ILS:267743 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Whitman, Michael E.&#160;Mattord, Herbert J.<br/>Preferred Shelf Number&#160;TK5105.878 W54 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Secure semantic service-oriented systems ent://SD_ILS/0/SD_ILS:285105 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Thuraisingham, Bhavani M.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420073324">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security de-engineering solving the problems in information risk management ent://SD_ILS/0/SD_ILS:286209 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Tibble, Ian.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439868355">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Honeypot a new paradigm to information security ent://SD_ILS/0/SD_ILS:288961 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Joshi, R. C.&#160;Sardana, Anjali.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439869994">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security of self-organizing networks MANET, WSN, WMN, VANET ent://SD_ILS/0/SD_ILS:290708 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Pathan, Al-Sakib Khan.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439819203">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Auditing IT infrastructures for compliance ent://SD_ILS/0/SD_ILS:271151 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Weiss, Martin M.&#160;Solomon, Michael G.<br/>Preferred Shelf Number&#160;QA76.9.A25 W428 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Hacker techniques, tools, and incident handling ent://SD_ILS/0/SD_ILS:271438 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Oriyano, Sean-Philip.&#160;Gregg, Michael (Michael C.)<br/>Preferred Shelf Number&#160;TK5105.59 O786 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Network security essentials : applications and standards ent://SD_ILS/0/SD_ILS:271446 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Stallings, William.<br/>Preferred Shelf Number&#160;TK5105.59 S782 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Network security firewalls and VPNs ent://SD_ILS/0/SD_ILS:271452 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Stewart, James Michael.<br/>Preferred Shelf Number&#160;TK5105.59 S758 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Hacking exposed web applications web application security secrets and solutions ent://SD_ILS/0/SD_ILS:293277 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Scambray, Joel.&#160;Liu, Vincent.&#160;Sima, Caleb.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-web-applications-3e">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security information and event management (SIEM) implementation ent://SD_ILS/0/SD_ILS:293279 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Miller, David, 1959 Nov. 5-&#160;Harris, Shon.&#160;Harper, Allen.&#160;VanDyke, Stephen.&#160;Blask, Chris.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/security-information-event-management-siem-implementation">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:386241 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Kahate, Atul.<br/>Preferred Shelf Number&#160;TK5105.59 K12 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Engineering information security the application of systems engineering concepts to achieve information assurance ent://SD_ILS/0/SD_ILS:249916 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Jacobs, Stuart.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Eleventh hour network+ exam N10-004 study guide ent://SD_ILS/0/SD_ILS:146455 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Alpern, Naomi J.&#160;Shimonski, Robert.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494281">http://www.sciencedirect.com/science/book/9781597494281</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital forensics for network, Internet, and cloud computing a forensic evidence guide for moving targets and data ent://SD_ILS/0/SD_ILS:146482 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Lillard, Terrence.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495370">http://www.sciencedirect.com/science/book/9781597495370</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Dissecting the hack the forb1dd3n network ent://SD_ILS/0/SD_ILS:146585 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Street, Jayson E.&#160;Street, Jayson E. Dissecting the hack.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495684">http://www.sciencedirect.com/science/book/9781597495684</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> PCI compliance understand and implement effective PCI data security standard compliance. ent://SD_ILS/0/SD_ILS:148342 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Chuvakin, Anton.&#160;Williams, Branden R.&#160;Spangenberg, Ward.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494991">http://www.sciencedirect.com/science/book/9781597494991</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seven deadliest web application attacks ent://SD_ILS/0/SD_ILS:149103 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Shema, Mike.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495431">http://www.sciencedirect.com/science/book/9781597495431</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seven deadliest social network attacks ent://SD_ILS/0/SD_ILS:149145 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Timm, Carl.&#160;Perez, Richard, 1969 Oct. 17-&#160;Ely, Adam.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495455">http://www.sciencedirect.com/science/book/9781597495455</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seven deadliest network attacks ent://SD_ILS/0/SD_ILS:149185 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Prowell, Stacy J.&#160;Kraus, Rob.&#160;Borkin, Mike.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495493">http://www.sciencedirect.com/science/book/9781597495493</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seven deadliest USB attacks ent://SD_ILS/0/SD_ILS:148953 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Anderson, Brian (Brian James)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495530">http://www.sciencedirect.com/science/book/9781597495530</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seven deadliest wireless technologies attacks ent://SD_ILS/0/SD_ILS:149033 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Haines, Brad.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495417">http://www.sciencedirect.com/science/book/9781597495417</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Security A Decision and Game-Theoretic Approach ent://SD_ILS/0/SD_ILS:237887 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Alpcan, Tansu.&#160;Ba&#351;ar, Tamer.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511760778">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cognitive Radio Networking and Security A Game-Theoretic View ent://SD_ILS/0/SD_ILS:238948 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Liu, K. J. Ray.&#160;Wang, Beibei.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511778773">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security 2020 reduce security risks this decade ent://SD_ILS/0/SD_ILS:303839 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Howard, Doug.&#160;Prince, Kevin.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255803">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT audit, control, and security ent://SD_ILS/0/SD_ILS:304008 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Moeller, Robert R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118269138">An electronic book accessible through the World Wide Web; click for information</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40717">http://www.books24x7.com/marc.asp?bookid=40717</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10469768">http://site.ebrary.com/lib/alltitles/Doc?id=10469768</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=624573">http://swb.eblib.com/patron/FullRecord.aspx?p=624573</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seven deadliest USB attacks ent://SD_ILS/0/SD_ILS:306328 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Anderson, Brian (Brian James)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495530">http://www.sciencedirect.com/science/book/9781597495530</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mac security bible ent://SD_ILS/0/SD_ILS:303881 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Kissell, Joe.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118257739">An electronic book accessible through the World Wide Web; click for information</a> Safari Books Online <a href="http://proquest.safaribooksonline.com/640">http://proquest.safaribooksonline.com/640</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780470474198">http://proquest.safaribooksonline.com/?fpi=9780470474198</a> Safari Books Online <a href="http://proquest.safaribooksonline.com/9780470474198">http://proquest.safaribooksonline.com/9780470474198</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40737">http://www.books24x7.com/marc.asp?bookid=40737</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10358774">http://site.ebrary.com/lib/alltitles/Doc?id=10358774</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security risk analysis ent://SD_ILS/0/SD_ILS:288856 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Peltier, Thomas R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439839577">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams ent://SD_ILS/0/SD_ILS:297862 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Kouns, Jake.&#160;Minoli, Daniel, 1952-&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> China's cyberwarfare capability ent://SD_ILS/0/SD_ILS:281481 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Marvel, Elisabette M.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=581824">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=581824</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of financial cryptography and security ent://SD_ILS/0/SD_ILS:287829 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Rosenberg, Burton.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420059823">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Next generation SSH2 implementation securing data in motion ent://SD_ILS/0/SD_ILS:146275 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Liu, Dale.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492836">http://www.sciencedirect.com/science/book/9781597492836</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Disappearing cryptography information hiding : steganography &amp; watermarking ent://SD_ILS/0/SD_ILS:146450 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Wayner, Peter, 1964-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123744791">http://www.sciencedirect.com/science/book/9780123744791</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> GFI network security and PCI compliance power tools ent://SD_ILS/0/SD_ILS:148143 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Posey, Brien.&#160;Thompson, Troy.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492850">http://www.sciencedirect.com/science/book/9781597492850</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:148884 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Vacca, John R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123743541">http://www.sciencedirect.com/science/book/9780123743541</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> SAP security configuration and deployment the IT administrator's guide to best practices ent://SD_ILS/0/SD_ILS:148994 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Wun-Young, Leslie.&#160;Hirao, Joey.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492843">http://www.sciencedirect.com/science/book/9781597492843</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud security and privacy ent://SD_ILS/0/SD_ILS:144722 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Mather, Tim.&#160;Kumaraswamy, Subra.&#160;Latif, Shahed.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=414816">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=414816</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Eleventh hour security+ exam SYO-201 study guide ent://SD_ILS/0/SD_ILS:146534 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Dubrawsky, Ido.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494274">http://www.sciencedirect.com/science/book/9781597494274</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cisco router and switch forensics investigating and analyzing malicious network activity ent://SD_ILS/0/SD_ILS:148703 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Liu, Dale.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494182">http://www.sciencedirect.com/science/book/9781597494182</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in an IPv6 environment ent://SD_ILS/0/SD_ILS:291504 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Minoli, Daniel, 1952-&#160;Kouns, Jake.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420092301">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management metrics a definitive guide to effective security monitoring and measurement ent://SD_ILS/0/SD_ILS:291373 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Brotby, W. Krag.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420052862">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> SIP security ent://SD_ILS/0/SD_ILS:297791 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Sisalem, Dorgham.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://onlinelibrary.wiley.com/book/10.1002/9780470516997">http://onlinelibrary.wiley.com/book/10.1002/9780470516997</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470516997">http://dx.doi.org/10.1002/9780470516997</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10298102">http://site.ebrary.com/lib/alltitles/Doc?id=10298102</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> How to cheat at securing Linux ent://SD_ILS/0/SD_ILS:145540 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Krishnamurthy Madwachar, Mohan.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492072">http://www.sciencedirect.com/science/book/9781597492072</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information assurance dependability and security in networked systems ent://SD_ILS/0/SD_ILS:145553 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Qian, Yi, 1962-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123735669">http://www.sciencedirect.com/science/book/9780123735669</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Netcat power tools ent://SD_ILS/0/SD_ILS:146277 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Kanclirz, Jan.&#160;Baskin, Brian.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492577">http://www.sciencedirect.com/science/book/9781597492577</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Nmap in the enterprise your guide to network scanning ent://SD_ILS/0/SD_ILS:146442 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Orebaugh, Angela.&#160;Pinkard, Becky.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492416">http://www.sciencedirect.com/science/book/9781597492416</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Kismet hacking ent://SD_ILS/0/SD_ILS:147861 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Haines, Brad.&#160;Schearer, Michael J.&#160;Thornton, Frank (Thorn)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491174">http://www.sciencedirect.com/science/book/9781597491174</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Google hacking for penetration testers. Volume 2 ent://SD_ILS/0/SD_ILS:148029 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Long, Johnny.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491761">http://www.sciencedirect.com/science/book/9781597491761</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> OSSEC host-based intrusion detection guide ent://SD_ILS/0/SD_ILS:148333 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Hay, Andrew.&#160;Cid, Daniel.&#160;Bray, Rory.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492409">http://www.sciencedirect.com/science/book/9781597492409</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Microsoft forefront security administration guide ent://SD_ILS/0/SD_ILS:146369 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Varsalone, Jesse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492447">http://www.sciencedirect.com/science/book/9781597492447</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network security know it all ent://SD_ILS/0/SD_ILS:146401 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Joshi, James B. D.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123744630">http://www.sciencedirect.com/science/book/9780123744630</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical embedded security building secure resource-constrained systems ent://SD_ILS/0/SD_ILS:147416 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Stapko, Timothy John.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750682152">http://www.sciencedirect.com/science/book/9780750682152</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Scene of the cybercrime ent://SD_ILS/0/SD_ILS:148955 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Cross, Michael, 1965-&#160;Shinder, Debra Littlejohn. Scene of the cybercrime.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492768">http://www.sciencedirect.com/science/book/9781597492768</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Integrating ISA Server 2006 with Microsoft Exchange 2007 ent://SD_ILS/0/SD_ILS:145628 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Strachan, Fergus.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492751">http://www.sciencedirect.com/science/book/9781597492751</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Quality of Service in Ad Hoc Wireless Networks ent://SD_ILS/0/SD_ILS:237801 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Mishra, Amitabh.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511619755">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security software development assessing and managing security risks ent://SD_ILS/0/SD_ILS:286016 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Ashbaugh, Douglas A.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420063813">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital privacy theory, technologies, and practices ent://SD_ILS/0/SD_ILS:286824 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Acquisti, Alessandro.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420052183">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ICT futures delivering pervasive, real-time and secure services ent://SD_ILS/0/SD_ILS:302768 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Warren, Paul (Paul W.)&#160;Davies, J. (N. John)&#160;Brown, David, 1954-&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470758656">http://dx.doi.org/10.1002/9780470758656</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information assurance architecture ent://SD_ILS/0/SD_ILS:291123 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Willett, Keith D.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780849380686">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure computer and network systems modeling, analysis and design ent://SD_ILS/0/SD_ILS:296665 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Ye, Nong.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0833/2007037133-b.html">http://catdir.loc.gov/catdir/enhancements/fy0833/2007037133-b.html</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470023273">http://dx.doi.org/10.1002/9780470023273</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in wireless ad hoc and sensor networks ent://SD_ILS/0/SD_ILS:297789 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;&Ccedil;ayirci, E. (Erdal)&#160;Levi, Albert, 1969-&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470516782">http://dx.doi.org/10.1002/9780470516782</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building an effective information security policy architecture ent://SD_ILS/0/SD_ILS:290577 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Bacik, Sandy.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420059069">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Architecting secure software systems ent://SD_ILS/0/SD_ILS:288749 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Talukder, Asoke K.&#160;Chaitanya, Manish.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420087857">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security : contemporary cases ent://SD_ILS/0/SD_ILS:111021 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Wright, Marie A.&#160;Kakalik, John S.<br/>Preferred Shelf Number&#160;QA76.9.A25 W75 2007<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> How to cheat at configuring Open Source security tools ent://SD_ILS/0/SD_ILS:112102 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Alder, Raven.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491709">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> PCI compliance implementing effective PCI data security standards ent://SD_ILS/0/SD_ILS:112189 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Bradley, Tony, 1969-&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491655">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Techno Security's guide to managing risks for IT managers, auditors, and investigators ent://SD_ILS/0/SD_ILS:112203 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Wiles, Jack.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Integrated security systems design concepts, specifications, and implementation ent://SD_ILS/0/SD_ILS:145552 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Norman, Thomas L.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679091">http://www.sciencedirect.com/science/book/9780750679091</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> How to cheat at configuring Open Source security tools ent://SD_ILS/0/SD_ILS:145578 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Alder, Raven.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491709">http://www.sciencedirect.com/science/book/9781597491709</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network security assessment from vulnerability to patch ent://SD_ILS/0/SD_ILS:146334 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Manzuik, Steve.&#160;Gold, Andr&eacute;.&#160;Gatford, Chris.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491013">http://www.sciencedirect.com/science/book/9781597491013</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Developer's guide to web application security ent://SD_ILS/0/SD_ILS:147664 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Cross, Michael, 1965-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> PCI compliance implementing effective PCI data security standards ent://SD_ILS/0/SD_ILS:148195 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Bradley, Tony, 1969-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491655">http://www.sciencedirect.com/science/book/9781597491655</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Optimizing and testing WLANs proven techniques for maximum performance ent://SD_ILS/0/SD_ILS:148270 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Alexander, Tom.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679862">http://www.sciencedirect.com/science/book/9780750679862</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Snort IDS and IPS toolkit ent://SD_ILS/0/SD_ILS:148444 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Beale, Jay.&#160;Baker, Andrew R.&#160;Esler, Joel.&#160;Northcutt, Stephen.&#160;Kohlenberg, Toby.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490993">http://www.sciencedirect.com/science/book/9781597490993</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Techno security's guide to e-discovery and digital forensics ent://SD_ILS/0/SD_ILS:148564 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Wiles, Jack.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492232">http://www.sciencedirect.com/science/book/9781597492232</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Techno Security's guide to managing risks for IT managers, auditors, and investigators ent://SD_ILS/0/SD_ILS:148641 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Wiles, Jack.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">http://www.sciencedirect.com/science/book/9781597491389</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Configuring Juniper Networks NetScreen &amp; SSG firewalls ent://SD_ILS/0/SD_ILS:148803 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Cameron, Rob.&#160;Juniper Networks, Inc.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491181">http://www.sciencedirect.com/science/book/9781597491181</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> AVIEN malware defense guide for the Enterprise ent://SD_ILS/0/SD_ILS:145183 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Harley, David.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491648">http://www.sciencedirect.com/science/book/9781597491648</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Asterisk hacking ent://SD_ILS/0/SD_ILS:145355 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Brashars, Joshua.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491518">http://www.sciencedirect.com/science/book/9781597491518</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security+ study guide &amp; DVD training system ent://SD_ILS/0/SD_ILS:149089 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Cross, Michael, 1965-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491532">http://www.sciencedirect.com/science/book/9781597491532</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> How to cheat at Voip security ent://SD_ILS/0/SD_ILS:112106 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Porter, Thomas, PhD.&#160;Gough, Michael.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491693">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Snort IDS and IPS toolkit ent://SD_ILS/0/SD_ILS:112112 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Beale, Jay&#160;Baker, Andrew R.&#160;Esler, Joel.&#160;Northcutt, Stephen.&#160;Kohlenberg, Toby.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490993">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security+ study guide &amp; DVD training system ent://SD_ILS/0/SD_ILS:112140 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Cross, Michael, 1965-&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491532">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Configuring Juniper Networks NetScreen &amp; SSG firewalls ent://SD_ILS/0/SD_ILS:112154 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Cameron, Rob.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491181">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Integrated security systems design concepts, specifications, and implementation ent://SD_ILS/0/SD_ILS:112175 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Norman, Thomas, CSC.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679091">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network security assessment from vulnerability to patch ent://SD_ILS/0/SD_ILS:112186 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Manzuik, Steve.&#160;Gold, Andr&eacute;.&#160;Gatford, Chris.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491013">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Botnets the killer web app ent://SD_ILS/0/SD_ILS:145283 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Schiller, Craig A.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491358">http://www.sciencedirect.com/science/book/9781597491358</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> How to cheat at Voip security ent://SD_ILS/0/SD_ILS:145486 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Porter, Thomas, PhD.&#160;Gough, Michael, 1963-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491693">http://www.sciencedirect.com/science/book/9781597491693</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> How to cheat at securing your network ent://SD_ILS/0/SD_ILS:145654 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Dubrawsky, Ido.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492317">http://www.sciencedirect.com/science/book/9781597492317</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security of e-Systems and Computer Networks ent://SD_ILS/0/SD_ILS:236023 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Obaidat, Mohammad.&#160;Boudriga, Noureddine.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511536700">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network security current status and future directions ent://SD_ILS/0/SD_ILS:249506 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Douligeris, C. (Christos)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5237765">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5237765</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mechanics of user identification and authentication fundamentals of identity management ent://SD_ILS/0/SD_ILS:286830 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Todorov, Dobromir.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420052206">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Official (ISC)2 guide to the SSCP CBK ent://SD_ILS/0/SD_ILS:290078 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Contesti, Diana-Lynn.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203331576">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Developer's guide to web application security ent://SD_ILS/0/SD_ILS:306464 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Cross, Michael, 1965-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> How to cheat at securing your network ent://SD_ILS/0/SD_ILS:306503 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Dubrawsky, Ido.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492317">http://www.sciencedirect.com/science/book/9781597492317</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> 802.1X port-based authentication ent://SD_ILS/0/SD_ILS:291322 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Brown, Edwin Lyle.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420044652">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security design, implementation, measurement, and compliance ent://SD_ILS/0/SD_ILS:288490 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Layton, Timothy P.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420013412">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer security fundamentals ent://SD_ILS/0/SD_ILS:108620 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Easttom, Chuck.<br/>Preferred Shelf Number&#160;QA76.9.A25 E325 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Handbook of information security ent://SD_ILS/0/SD_ILS:108909 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Bidgoli, Hossein, ed.<br/>Preferred Shelf Number&#160;TK5105.59 H35 2006 V.1<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~3<br/> Syngress force emerging threat analysis from mischief to malicious ent://SD_ILS/0/SD_ILS:112202 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Maynor, David.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasures ent://SD_ILS/0/SD_ILS:146475 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Contos, Brian T.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491297">http://www.sciencedirect.com/science/book/9781597491297</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Designing and building enterprise DMZs ent://SD_ILS/0/SD_ILS:147464 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Dubrawsky, Ido.&#160;Baumrucker, C. Tate.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491006">http://www.sciencedirect.com/science/book/9781597491006</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure your network for free using NMAP, wireshark, snort, nessus, and MRTG ent://SD_ILS/0/SD_ILS:148969 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Seagren, Eric.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491235">http://www.sciencedirect.com/science/book/9781597491235</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> How to cheat at Windows System Administration using command line scripts ent://SD_ILS/0/SD_ILS:112107 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Bhardwaj, Pawan K.&#160;Andreou, Kimon.&#160;Barber, Brian.&#160;Kleiman, Dave.&#160;Satyanarayana, Mahesh.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491051">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Designing and building enterprise DMZs ent://SD_ILS/0/SD_ILS:112159 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Dubrawsky, Ido.&#160;Baumrucker, C. Tate.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491006">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure your network for free using NMAP, wireshark, snort, nessus, and MRTG ent://SD_ILS/0/SD_ILS:112197 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Seagren, Eric.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491235">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> How to cheat at Windows System Administration using command line scripts ent://SD_ILS/0/SD_ILS:145623 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Bhardwaj, Pawan K.&#160;Andreou, Kimon.&#160;Barber, Brian.&#160;Kleiman, Dave.&#160;Satyanarayana, Mahesh.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491051">http://www.sciencedirect.com/science/book/9781597491051</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hack the stack using snort and ethereal to master the 8 layers of an insecure network ent://SD_ILS/0/SD_ILS:147954 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Gregg, Michael (Michael C.)&#160;Watkins, Stephen.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">http://www.sciencedirect.com/science/book/9781597491099</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Syngress force emerging threat analysis from mischief to malicious ent://SD_ILS/0/SD_ILS:148488 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Maynor, David.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">http://www.sciencedirect.com/science/book/9781597490566</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Firewall policies and VPN configurations ent://SD_ILS/0/SD_ILS:254076 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Henmi, Anne.&#160;Lucas, Mark.&#160;Singh, Abhishek.&#160;Cantrell, Chris.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490887">http://www.sciencedirect.com/science/book/9781597490887</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Audit and trace log management consolidation and analysis ent://SD_ILS/0/SD_ILS:284590 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Maier, Phillip Q.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203491768">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Enhancing computer security with smart technology ent://SD_ILS/0/SD_ILS:284793 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Vemuri, V. Rao.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031225">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust and reputation for service-oriented environments technologies for building business intelligence and consumer confidence ent://SD_ILS/0/SD_ILS:296679 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Chang, Elizabeth.&#160;Dillon, Tharam S., 1943-&#160;Hussain, Farookh K.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www3.interscience.wiley.com/cgi-bin/homepage/?isbn=9780470028261">Find on the Web</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470028261">http://dx.doi.org/10.1002/9780470028261</a> <a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/113488845">http://www3.interscience.wiley.com/cgi-bin/bookhome/113488845</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical infrastructure protection in homeland security defending a networked nation ent://SD_ILS/0/SD_ILS:303065 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Lewis, T. G. (Theodore Gyle), 1941-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.contentreserve.com/TitleInfo.asp?ID={B7674963-A0F9-4349-AB2D-7F1D59FE8883}&Format=50">Click for information</a> John Wiley <a href="http://dx.doi.org/10.1002/0471789542">http://dx.doi.org/10.1002/0471789542</a> <a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/112100959">http://www3.interscience.wiley.com/cgi-bin/bookhome/112100959</a> MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=41147&ref=toc">http://www.myilibrary.com?id=41147&ref=toc</a> HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/61651657.html">http://catalog.hathitrust.org/api/volumes/oclc/61651657.html</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Insider threat protecting the enterprise from sabotage, spying, and theft ent://SD_ILS/0/SD_ILS:253661 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Cole, Eric.&#160;Ring, Sandra.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Volltext <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical VoIP security ent://SD_ILS/0/SD_ILS:253669 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Porter, Thomas.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490603">http://www.sciencedirect.com/science/book/9781597490603</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> How to cheat at designing security for a Windows Server 2003 network ent://SD_ILS/0/SD_ILS:253670 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Amini, Rob.&#160;Hunter, Laura E.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492430">http://www.sciencedirect.com/science/book/9781597492430</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:253676 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Long, Johnny.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490214">http://www.sciencedirect.com/science/book/9781597490214</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security log management identifying patterns in the chaos ent://SD_ILS/0/SD_ILS:253947 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Babbin, Jacob.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490429">http://www.sciencedirect.com/science/book/9781597490429</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> How to cheat at configuring ISA server 2004 ent://SD_ILS/0/SD_ILS:253948 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Shinder, Thomas W.&#160;Shinder, Debra Littlejohn.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490573">http://www.sciencedirect.com/science/book/9781597490573</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Syngress IT security project management handbook ent://SD_ILS/0/SD_ILS:253949 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Snedaker, Susan.&#160;Rogers, Russ.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490764">http://www.sciencedirect.com/science/book/9781597490764</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Configuring SonicWALL firewalls ent://SD_ILS/0/SD_ILS:253952 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Bendell, Dan.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492508">http://www.sciencedirect.com/science/book/9781597492508</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> TCP / IP ve a&#287; g&uuml;venli&#287;i : teori ve uygulamalar ile ent://SD_ILS/0/SD_ILS:112813 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Dirican, Can Okan.<br/>Preferred Shelf Number&#160;TK 5105.55 D5753 2005<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Intrusion prevention and active response deploying network and host IPS ent://SD_ILS/0/SD_ILS:254017 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Rash, Michael (Michael Brandon)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266474">http://www.sciencedirect.com/science/book/9781932266474</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Black Hat physical device security exploiting hardware and software ent://SD_ILS/0/SD_ILS:254025 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Miller, Drew, 1978-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266818">http://www.sciencedirect.com/science/book/9781932266818</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Error correcting coding and security for data networks analysis of the superchannel concept ent://SD_ILS/0/SD_ILS:301147 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Kabatiansky, G.&#160;Krouk, E.&#160;Semenov, S.&#160;John Wiley &amp; Sons.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/0470867574">http://dx.doi.org/10.1002/0470867574</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Scalable and secure internet services and architecture ent://SD_ILS/0/SD_ILS:285796 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Xu, Chengzhong.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420035209">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A practical guide to security assessments ent://SD_ILS/0/SD_ILS:288306 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Kairab, Sudhanshu.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203507230">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The ethical hack a framework for business value penetration testing ent://SD_ILS/0/SD_ILS:288310 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Tiller, James S.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203495414">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network security technologies ent://SD_ILS/0/SD_ILS:290077 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Fung, K. T. (Kwok T.)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203330708">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Disruptive security technologies with mobile code and peer-to-peer networks ent://SD_ILS/0/SD_ILS:291305 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Brooks, R. R. (Richard R.)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420038880">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Acing the security+ certification exam ent://SD_ILS/0/SD_ILS:313492 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Regan, Patrick E.<br/>Preferred Shelf Number&#160;QA76.3 R455 2005<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Information security risk analysis ent://SD_ILS/0/SD_ILS:284764 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Peltier, Thomas R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031195">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cisco PIX firewalls configure, manage, &amp; troubleshoot ent://SD_ILS/0/SD_ILS:253667 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Behrens, Thorsten.&#160;Riley, Charles.&#160;Khan, Umer.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490047">http://www.sciencedirect.com/science/book/9781597490047</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network security a practical approach ent://SD_ILS/0/SD_ILS:253707 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Harrington, Jan L.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123116338">http://www.sciencedirect.com/science/book/9780123116338</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Physical security for IT ent://SD_ILS/0/SD_ILS:253855 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Erbschloe, Michael, 1951-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583279">http://www.sciencedirect.com/science/book/9781555583279</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Business continuity and disaster recovery for infosec managers ent://SD_ILS/0/SD_ILS:253862 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Rittinghouse, John W.&#160;Ransome, James F.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583392">http://www.sciencedirect.com/science/book/9781555583392</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Host integrity monitoring using Osiris and Samhain ent://SD_ILS/0/SD_ILS:253940 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Wotring, Brian.&#160;Potter, Bruce.&#160;Ranum, Marcus J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490184">http://www.sciencedirect.com/science/book/9781597490184</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Nessus, Snort, &amp; Ethereal power tools customizing open source security applications ent://SD_ILS/0/SD_ILS:253942 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Archibald, Neil.&#160;Ramirez, Gilbert, 1972-&#160;Rathaus, Noam.&#160;Syngress Media, Inc.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490207">http://www.sciencedirect.com/science/book/9781597490207</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Configuring Check Point NGX VPN-1/fire wall- ent://SD_ILS/0/SD_ILS:253943 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Stephens, Robert.&#160;Stiefel, Barry J.&#160;Watkins, Stephen (Information security professional)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490313">http://www.sciencedirect.com/science/book/9781597490313</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network security evaluation using the NSA IEM ent://SD_ILS/0/SD_ILS:253945 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Rogers, Russ.&#160;Cunningham, Bryan.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490351">http://www.sciencedirect.com/science/book/9781597490351</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking the code ASP.NET web application security ent://SD_ILS/0/SD_ILS:254022 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Burnett, Mark M.&#160;Foster, James C.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266658">http://www.sciencedirect.com/science/book/9781932266658</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ethereal packet sniffing ent://SD_ILS/0/SD_ILS:254026 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Orebaugh, Angela.&#160;Morris, Greg.&#160;Warnicke, Ed.&#160;Ramirez, Gilbert.&#160;Syngress Media, Inc.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266825">http://www.sciencedirect.com/science/book/9781932266825</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Check Point Next Generation with application intelligence security administration ent://SD_ILS/0/SD_ILS:254029 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Tobkin, Chris.&#160;Kligerman, Daniel.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266894">http://www.sciencedirect.com/science/book/9781932266894</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless operational security ent://SD_ILS/0/SD_ILS:254059 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Rittinghouse, John W.&#160;Ransome, James F.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583170">http://www.sciencedirect.com/science/book/9781555583170</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Strategic information security ent://SD_ILS/0/SD_ILS:284578 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Wylder, John.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203497081">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Protocols for secure electronic commerce ent://SD_ILS/0/SD_ILS:289495 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Sherif, Mostafa Hashem.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420040012">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public key infrastructure building trusted applications and Web services ent://SD_ILS/0/SD_ILS:290108 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Vacca, John R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203498156">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network perimeter security building defense in-depth ent://SD_ILS/0/SD_ILS:291068 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Riggs, Cliff.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203508046">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Malware : fighting malicious code ent://SD_ILS/0/SD_ILS:267737 2024-11-23T21:18:22Z 2024-11-23T21:18:22Z Author&#160;Skoudis, Ed.&#160;Zeltser, Lenny.<br/>Preferred Shelf Number&#160;QA76.9.A25 S58 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/>