Search Results for Computer networks--Security measures. - Narrowed by: 2003SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bnetworks--Security$002bmeasures.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092003$0025092003$0026ps$003d300?2024-11-12T22:06:15ZProtocols for secure electronic commerceent://SD_ILS/0/SD_ILS:2894952024-11-12T22:06:15Z2024-11-12T22:06:15ZAuthor Sherif, Mostafa Hashem.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420040012">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Managing a network vulnerability assessmentent://SD_ILS/0/SD_ILS:2891852024-11-12T22:06:15Z2024-11-12T22:06:15ZAuthor Peltier, Thomas R. Peltier, Justin. Blackley, John A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203503041">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>UMTS securityent://SD_ILS/0/SD_ILS:2958612024-11-12T22:06:15Z2024-11-12T22:06:15ZAuthor Niemi, Valtteri. Nyberg, Kaisa, 1948-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.contentreserve.com/TitleInfo.asp?ID={465C10B2-1465-4D2B-AAAD-DED651D62D3D}&Format=50">Click for information</a>
Wiley InterScience - Full text online <a href="http://onlinelibrary.wiley.com/book/10.1002/0470091584">http://onlinelibrary.wiley.com/book/10.1002/0470091584</a>
John Wiley <a href="http://dx.doi.org/10.1002/0470091584">http://dx.doi.org/10.1002/0470091584</a>
HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/53183293.html">http://catalog.hathitrust.org/api/volumes/oclc/53183293.html</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security in fixed and wireless networks an introduction to securing data communicationsent://SD_ILS/0/SD_ILS:3011222024-11-12T22:06:15Z2024-11-12T22:06:15ZAuthor Schäfer, Günter, Dr.-Ing. John Wiley & Sons.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/0470863722">http://dx.doi.org/10.1002/0470863722</a>
<a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/112477198">http://www3.interscience.wiley.com/cgi-bin/bookhome/112477198</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/bios/wiley047/2004299184.html">http://catdir.loc.gov/catdir/bios/wiley047/2004299184.html</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Special ops host and network security for Microsoft, UNIX, and Oracleent://SD_ILS/0/SD_ILS:2540542024-11-12T22:06:15Z2024-11-12T22:06:15ZAuthor Birkholz, Erik Pace. McClure, Stuart.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836692">http://www.sciencedirect.com/science/book/9781931836692</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Official (ISC)2 guide to the CISSP exament://SD_ILS/0/SD_ILS:2873532024-11-12T22:06:15Z2024-11-12T22:06:15ZAuthor Hansche, Susan. Berti, John. Hare, Chris, 1962-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203507872">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Complete book of remote access connectivity and securityent://SD_ILS/0/SD_ILS:2911642024-11-12T22:06:15Z2024-11-12T22:06:15ZAuthor Kasacavage, Victor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420000429">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Internet security a jumpstart for systems administrators and IT managersent://SD_ILS/0/SD_ILS:2538432024-11-12T22:06:15Z2024-11-12T22:06:15ZAuthor Speed, Tim. Ellis, Juanita.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582982">http://www.sciencedirect.com/science/book/9781555582982</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity operations handbookent://SD_ILS/0/SD_ILS:2538472024-11-12T22:06:15Z2024-11-12T22:06:15ZAuthor Rittinghouse, John W. Hancock, Bill, 1957-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583064">http://www.sciencedirect.com/science/book/9781555583064</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Configuring Symantec AntiVirus corporate editionent://SD_ILS/0/SD_ILS:2540072024-11-12T22:06:15Z2024-11-12T22:06:15ZAuthor Hunter, Laura E. Shimonski, Robert.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836814">http://www.sciencedirect.com/science/book/9781931836814</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Building DMZs for Enterprise networksent://SD_ILS/0/SD_ILS:2540092024-11-12T22:06:15Z2024-11-12T22:06:15ZAuthor Shimonski, Robert.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836883">http://www.sciencedirect.com/science/book/9781931836883</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Check Point NG VPN-1/Firewall-1 advanced configuration and troubleshootingent://SD_ILS/0/SD_ILS:2540142024-11-12T22:06:15Z2024-11-12T22:06:15ZAuthor Noble, Jim.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836975">http://www.sciencedirect.com/science/book/9781931836975</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cisco security professional's guide to secure intrusion detection systemsent://SD_ILS/0/SD_ILS:2540242024-11-12T22:06:15Z2024-11-12T22:06:15ZAuthor Burton, James. Dubrawsky, Ida. Osipov, Vitaly. Baumrucker, C. Tate. Sweeney, Michael<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266696">http://www.sciencedirect.com/science/book/9781932266696</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>SSCP study guide & DVD training systement://SD_ILS/0/SD_ILS:2540062024-11-12T22:06:15Z2024-11-12T22:06:15ZAuthor Jacobs, Josh.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836807">http://www.sciencedirect.com/science/book/9781931836807</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer security sourcebookent://SD_ILS/0/SD_ILS:946152024-11-12T22:06:15Z2024-11-12T22:06:15ZAuthor Caldwell, Wilma, ed.<br/>Preferred Shelf Number QA 76.9.A25 C658 2003<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Building firewalls with OpenBSD and PFent://SD_ILS/0/SD_ILS:1132202024-11-12T22:06:15Z2024-11-12T22:06:15ZAuthor Artymiak, Jacek.<br/>Preferred Shelf Number TK5105.59 .A77 2003<br/>Format: Books<br/>Availability Beytepe Library~1<br/>