Search Results for Computer security -- Computer programs. - Narrowed by: 2008
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity$002b--$002bComputer$002bprograms.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092008$0025092008$0026ps$003d300?
2025-12-24T16:21:47Z
Nmap in the enterprise your guide to network scanning
ent://SD_ILS/0/SD_ILS:146442
2025-12-24T16:21:47Z
2025-12-24T16:21:47Z
Author Orebaugh, Angela. Pinkard, Becky.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492416">http://www.sciencedirect.com/science/book/9781597492416</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Reverse engineering code with IDA Pro
ent://SD_ILS/0/SD_ILS:149020
2025-12-24T16:21:47Z
2025-12-24T16:21:47Z
Author Ferguson, Justin. Kaminsky, Dan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492379">http://www.sciencedirect.com/science/book/9781597492379</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hardware-based computer security techniques to defeat hackers from biometrics to quantum cryptography
ent://SD_ILS/0/SD_ILS:297432
2025-12-24T16:21:47Z
2025-12-24T16:21:47Z
Author Dube, Roger. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://proquest.safaribooksonline.com/?fpi=9780470193396">Available by subscription from Safari Books Online</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470425497">http://dx.doi.org/10.1002/9780470425497</a>
MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=183706&ref=toc">http://www.myilibrary.com?id=183706&ref=toc</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9780470193396">http://proquest.tech.safaribooksonline.de/9780470193396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>