Search Results for Computer security. - Narrowed by: 2005 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092005$0025092005$0026te$003dILS$0026ps$003d300$0026isd$003dtrue?dt=list 2024-12-23T04:44:44Z Computer Network Security ent://SD_ILS/0/SD_ILS:165113 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Kizza, Joseph Migga. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b106962">http://dx.doi.org/10.1007/b106962</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Statistical methods in computer security ent://SD_ILS/0/SD_ILS:288611 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Chen, William W. S.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420030884">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security in the 21st Century ent://SD_ILS/0/SD_ILS:165001 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Lee, D. T. editor.&#160;Shieh, S. P. editor.&#160;Tygar, J. D. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b104203">http://dx.doi.org/10.1007/b104203</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transfer ent://SD_ILS/0/SD_ILS:62188 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Davies, Donald Watts, 1924-&#160;Price, W. L., ort.yaz.<br/>Preferred Shelf Number&#160;TK 5105 D43 1989<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems ent://SD_ILS/0/SD_ILS:164931 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Peja&#347;, Jerzy. editor.&#160;Piegat, Andrzej. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b101135">http://dx.doi.org/10.1007/b101135</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Formal Aspects in Security and Trust IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22&ndash;27, 2004, Toulouse, France ent://SD_ILS/0/SD_ILS:165011 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Dimitrakos, Theo. editor.&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b104303">http://dx.doi.org/10.1007/b104303</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2005 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183052 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Vimercati, Sabrina de Capitani. editor.&#160;Syverson, Paul. editor.&#160;Gollmann, Dieter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11555827">http://dx.doi.org/10.1007/11555827</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Network Security Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183066 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Gorodetsky, Vladimir. editor.&#160;Kotenko, Igor. editor.&#160;Skormin, Victor. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11560326">http://dx.doi.org/10.1007/11560326</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 24th International Conference, SAFECOMP 2005, Fredrikstad, Norway, September 28-30, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183068 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Winther, Rune. editor.&#160;Gran, Bj&oslash;rn Axel. editor.&#160;Dahll, Gustav. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11563228">http://dx.doi.org/10.1007/11563228</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Enhanced methods in computer security, biometric and artificial intelligence systems ent://SD_ILS/0/SD_ILS:109864 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Pejas, Jerzy, 1954-, ed.&#160;Piegat, Andrzej, 1947-, ed.<br/>Preferred Shelf Number&#160;QA76.9.A25 E545 2005<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:290320 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:289151 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Law and Economics of Cybersecurity ent://SD_ILS/0/SD_ILS:235518 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Grady, Mark F..&#160;Parisi, Francesco.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511511523">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Beginning cryptography with Java ent://SD_ILS/0/SD_ILS:144203 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Hook, David, 1962-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security and ethics social and organizational issues ent://SD_ILS/0/SD_ILS:152966 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Quigley, Marian.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=108396">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=108396</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Elliptic Curve Cryptography ent://SD_ILS/0/SD_ILS:236058 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Blake, Ian F..&#160;Seroussi, Gadiel.&#160;Smart, Nigel P..<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511546570">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Codes the guide to secrecy from ancient to modern times ent://SD_ILS/0/SD_ILS:284865 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Mollin, Richard A., 1947-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420035087">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Firewalls jumpstart for network and systems administrators ent://SD_ILS/0/SD_ILS:253842 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Vacca, John R.&#160;Ellis, Scott (Scott Raymond), 1968-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582975">http://www.sciencedirect.com/science/book/9781555582975</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Physical security for IT ent://SD_ILS/0/SD_ILS:253855 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Erbschloe, Michael, 1951-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583279">http://www.sciencedirect.com/science/book/9781555583279</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Software piracy exposed ent://SD_ILS/0/SD_ILS:253664 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Craig, Paul.&#160;Honick, Ron.&#160;Burnett, Mark (Mark M.)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266986">http://www.sciencedirect.com/science/book/9781932266986</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cisco PIX firewalls configure, manage, &amp; troubleshoot ent://SD_ILS/0/SD_ILS:253667 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Behrens, Thorsten.&#160;Riley, Charles.&#160;Khan, Umer.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490047">http://www.sciencedirect.com/science/book/9781597490047</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber spying tracking your family's (sometimes) secret online lives ent://SD_ILS/0/SD_ILS:253673 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Fair, Ted.&#160;Nordfelt, Michael.&#160;Ring, Sandra.&#160;Cole, Eric.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836418">http://www.sciencedirect.com/science/book/9781931836418</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> InfoSec career hacking sell your skillz, not your soul ent://SD_ILS/0/SD_ILS:253681 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Bayles, Aaron W.&#160;Brindley, Ed.&#160;Foster, James C.&#160;Hurley, Chris.&#160;Long, Johnny.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490115">http://www.sciencedirect.com/science/book/9781597490115</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sockets, shellcode, porting &amp; coding reverse engineering exploits and tool coding for security professionals ent://SD_ILS/0/SD_ILS:253938 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Foster, James C.&#160;Price, Mike (Mike Morgan)&#160;McClure, Stuart.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490054">http://www.sciencedirect.com/science/book/9781597490054</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Host integrity monitoring using Osiris and Samhain ent://SD_ILS/0/SD_ILS:253940 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Wotring, Brian.&#160;Potter, Bruce.&#160;Ranum, Marcus J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490184">http://www.sciencedirect.com/science/book/9781597490184</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Nessus, Snort, &amp; Ethereal power tools customizing open source security applications ent://SD_ILS/0/SD_ILS:253942 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Archibald, Neil.&#160;Ramirez, Gilbert, 1972-&#160;Rathaus, Noam.&#160;Syngress Media, Inc.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490207">http://www.sciencedirect.com/science/book/9781597490207</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Configuring Check Point NGX VPN-1/fire wall- ent://SD_ILS/0/SD_ILS:253943 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Stephens, Robert.&#160;Stiefel, Barry J.&#160;Watkins, Stephen (Information security professional)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490313">http://www.sciencedirect.com/science/book/9781597490313</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network security evaluation using the NSA IEM ent://SD_ILS/0/SD_ILS:253945 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Rogers, Russ.&#160;Cunningham, Bryan.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490351">http://www.sciencedirect.com/science/book/9781597490351</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Configuring NetScreen firewalls ent://SD_ILS/0/SD_ILS:254016 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Cameron, Rob.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266399">http://www.sciencedirect.com/science/book/9781932266399</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intrusion prevention and active response deploying network and host IPS ent://SD_ILS/0/SD_ILS:254017 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Rash, Michael (Michael Brandon)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266474">http://www.sciencedirect.com/science/book/9781932266474</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Buffer overflow attacks detect, exploit, prevent ent://SD_ILS/0/SD_ILS:254023 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Foster, James C.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266672">http://www.sciencedirect.com/science/book/9781932266672</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Black Hat physical device security exploiting hardware and software ent://SD_ILS/0/SD_ILS:254025 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Miller, Drew, 1978-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266818">http://www.sciencedirect.com/science/book/9781932266818</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Computing ent://SD_ILS/0/SD_ILS:247871 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Mitchell, Chris, ed.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1049/PBPC006E">http://dx.doi.org/10.1049/PBPC006E</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Acing the security+ certification exam ent://SD_ILS/0/SD_ILS:313492 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Regan, Patrick E.<br/>Preferred Shelf Number&#160;QA76.3 R455 2005<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Network security technologies ent://SD_ILS/0/SD_ILS:290077 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Fung, K. T. (Kwok T.)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203330708">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Error correcting coding and security for data networks analysis of the superchannel concept ent://SD_ILS/0/SD_ILS:301147 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Kabatiansky, G.&#160;Krouk, E.&#160;Semenov, S.&#160;John Wiley &amp; Sons.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/0470867574">http://dx.doi.org/10.1002/0470867574</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network security a practical approach ent://SD_ILS/0/SD_ILS:253707 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Harrington, Jan L.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123116338">http://www.sciencedirect.com/science/book/9780123116338</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IM, instant messaging, security ent://SD_ILS/0/SD_ILS:253725 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Rittinghouse, John W.&#160;Ransome, James F.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583385">http://www.sciencedirect.com/science/book/9781555583385</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography, information theory, and error-correction a handbook for the 21st century ent://SD_ILS/0/SD_ILS:301860 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Bruen, Aiden A., 1941-&#160;Forcinito, Mario, 1962-&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118033296">An electronic book accessible through the World Wide Web; click for information</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html">http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Implementing database security and auditing a guide for DBAs, information security administrators and auditors ent://SD_ILS/0/SD_ILS:253860 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Ben-Natan, Ron.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">http://www.sciencedirect.com/science/book/9781555583347</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Business continuity and disaster recovery for infosec managers ent://SD_ILS/0/SD_ILS:253862 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Rittinghouse, John W.&#160;Ransome, James F.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583392">http://www.sciencedirect.com/science/book/9781555583392</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Stealing the network how to own an identity ent://SD_ILS/0/SD_ILS:253663 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Alder, Raven.&#160;Mullen, Timothy M.&#160;Long, Johnny.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490061">http://www.sciencedirect.com/science/book/9781597490061</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Aggressive network self-defense ent://SD_ILS/0/SD_ILS:253672 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Wyler, Neil R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">http://www.sciencedirect.com/science/book/9781931836203</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> TCP / IP ve a&#287; g&uuml;venli&#287;i : teori ve uygulamalar ile ent://SD_ILS/0/SD_ILS:112813 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Dirican, Can Okan.<br/>Preferred Shelf Number&#160;TK 5105.55 D5753 2005<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Database and applications security integrating information security and data management ent://SD_ILS/0/SD_ILS:284552 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Thuraisingham, Bhavani M.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203486061">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security risk analysis ent://SD_ILS/0/SD_ILS:284764 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Peltier, Thomas R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031195">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Curing the patch management headache ent://SD_ILS/0/SD_ILS:284778 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Nicastro, Felicia M.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031294">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managing an information security and privacy awareness and training program ent://SD_ILS/0/SD_ILS:284780 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Herold, Rebecca.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031256">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook. Vol. 2 ent://SD_ILS/0/SD_ILS:285441 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203005552">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Assessing and managing security risk in IT systems a structured methodology ent://SD_ILS/0/SD_ILS:285488 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;McCumber, John, 1956-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203490426">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Scalable and secure internet services and architecture ent://SD_ILS/0/SD_ILS:285796 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Xu, Chengzhong.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420035209">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A practical guide to security assessments ent://SD_ILS/0/SD_ILS:288306 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Kairab, Sudhanshu.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203507230">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The ethical hack a framework for business value penetration testing ent://SD_ILS/0/SD_ILS:288310 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Tiller, James S.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203495414">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security fundamentals ent://SD_ILS/0/SD_ILS:289155 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Peltier, Thomas R.&#160;Peltier, Justin.&#160;Blackley, John A.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203488652">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Disruptive security technologies with mobile code and peer-to-peer networks ent://SD_ILS/0/SD_ILS:291305 2024-12-23T04:44:44Z 2024-12-23T04:44:44Z Author&#160;Brooks, R. R. (Richard R.)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420038880">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>