Search Results for Computer security -- Handbooks, manuals, etc.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity$002b--$002bHandbooks$00252C$002bmanuals$00252C$002betc.$0026ic$003dtrue$0026ps$003d300?dt=list
2024-11-24T14:49:05Z
Information security management handbook
ent://SD_ILS/0/SD_ILS:290320
2024-11-24T14:49:05Z
2024-11-24T14:49:05Z
Author Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:289151
2024-11-24T14:49:05Z
2024-11-24T14:49:05Z
Author Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:287123
2024-11-24T14:49:05Z
2024-11-24T14:49:05Z
Author Tipton, Harold F. Nozaki, Micki Krause.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439893159">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook on securing cyber-physical critical infrastructure
ent://SD_ILS/0/SD_ILS:145579
2024-11-24T14:49:05Z
2024-11-24T14:49:05Z
Author Das, Sajal K. Kant, Krishna. Zhang, Nan, 1982-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124158153">http://www.sciencedirect.com/science/book/9780124158153</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computing for seniors
ent://SD_ILS/0/SD_ILS:293452
2024-11-24T14:49:05Z
2024-11-24T14:49:05Z
Author Matthews, Martin S. Matthews, Carole Boggs. Bouton, Gary David, 1953- Sandberg, Bobbi.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/computing-for-seniors-quicksteps">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:290763
2024-11-24T14:49:05Z
2024-11-24T14:49:05Z
Author Tipton, Harold F. Nozaki, Micki Krause.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439853467">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber warfare techniques, tactics and tools for security practitioners
ent://SD_ILS/0/SD_ILS:147479
2024-11-24T14:49:05Z
2024-11-24T14:49:05Z
Author Andress, Jason. Winterfeld, Steve. Rogers, Russ.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496377">http://www.sciencedirect.com/science/book/9781597496377</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Thor's Microsoft security bible a collection of practical security techniques
ent://SD_ILS/0/SD_ILS:146808
2024-11-24T14:49:05Z
2024-11-24T14:49:05Z
Author Mullen, Timothy M.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495721">http://www.sciencedirect.com/science/book/9781597495721</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security management handbook. Volume 4
ent://SD_ILS/0/SD_ILS:289735
2024-11-24T14:49:05Z
2024-11-24T14:49:05Z
Author Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439819036">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
GFI network security and PCI compliance power tools
ent://SD_ILS/0/SD_ILS:148143
2024-11-24T14:49:05Z
2024-11-24T14:49:05Z
Author Posey, Brien. Thompson, Troy.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492850">http://www.sciencedirect.com/science/book/9781597492850</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:289734
2024-11-24T14:49:05Z
2024-11-24T14:49:05Z
Author Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420090956">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security management handbook. Vol. 2
ent://SD_ILS/0/SD_ILS:286816
2024-11-24T14:49:05Z
2024-11-24T14:49:05Z
Author Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420067101">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security management handbook
ent://SD_ILS/0/SD_ILS:285161
2024-11-24T14:49:05Z
2024-11-24T14:49:05Z
Author Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439833032">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Syngress IT security project management handbook
ent://SD_ILS/0/SD_ILS:253949
2024-11-24T14:49:05Z
2024-11-24T14:49:05Z
Author Snedaker, Susan. Rogers, Russ.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490764">http://www.sciencedirect.com/science/book/9781597490764</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Writing security tools and exploits
ent://SD_ILS/0/SD_ILS:253954
2024-11-24T14:49:05Z
2024-11-24T14:49:05Z
Author Foster, James C. Liu, Vincent.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499972">http://www.sciencedirect.com/science/book/9781597499972</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Black Hat physical device security exploiting hardware and software
ent://SD_ILS/0/SD_ILS:254025
2024-11-24T14:49:05Z
2024-11-24T14:49:05Z
Author Miller, Drew, 1978-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266818">http://www.sciencedirect.com/science/book/9781932266818</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security management handbook. Vol. 2
ent://SD_ILS/0/SD_ILS:285441
2024-11-24T14:49:05Z
2024-11-24T14:49:05Z
Author Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203005552">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Sockets, shellcode, porting & coding reverse engineering exploits and tool coding for security professionals
ent://SD_ILS/0/SD_ILS:253938
2024-11-24T14:49:05Z
2024-11-24T14:49:05Z
Author Foster, James C. Price, Mike (Mike Morgan) McClure, Stuart.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490054">http://www.sciencedirect.com/science/book/9781597490054</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Programmer's ultimate security deskref
ent://SD_ILS/0/SD_ILS:253646
2024-11-24T14:49:05Z
2024-11-24T14:49:05Z
Author Foster, James C. Foster, Stephen C.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266726">http://www.sciencedirect.com/science/book/9781932266726</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security management handbook. Vol. 4
ent://SD_ILS/0/SD_ILS:287776
2024-11-24T14:49:05Z
2024-11-24T14:49:05Z
Author Tipton, Harold F. Krause, Micki.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420072419">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Nokia network security solutions handbook
ent://SD_ILS/0/SD_ILS:81149
2024-11-24T14:49:05Z
2024-11-24T14:49:05Z
Author Maxwell, Doug. Amon, Cherie, ort. yaz.<br/>Preferred Shelf Number TK 5105.59 M451 2002<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Scene of the cybercrime computer forensics handbook
ent://SD_ILS/0/SD_ILS:253615
2024-11-24T14:49:05Z
2024-11-24T14:49:05Z
Author Shinder, Debra Littlejohn. Tittel, Ed.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836654">http://www.sciencedirect.com/science/book/9781931836654</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>