Search Results for Computers -- Access control. - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputers$002b--$002bAccess$002bcontrol.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?
2025-12-17T21:28:47Z
ORACLE IDENTITY MANAGEMENT : governance, risk, and compliance architecture, third edition.
ent://SD_ILS/0/SD_ILS:544833
2025-12-17T21:28:47Z
2025-12-17T21:28:47Z
Author POHLMAN, MARLIN B.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780429117688">Taylor & Francis eBooks</a>
Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780429117688">https://www.taylorfrancis.com/books/9780429117688</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The state of the art in intrusion prevention and detection
ent://SD_ILS/0/SD_ILS:543676
2025-12-17T21:28:47Z
2025-12-17T21:28:47Z
Author Pathan, Al-Sakib Khan, editor.<br/>Preferred Shelf Number QA76.9 .A25 S7354 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781482203523">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Federated identity primer
ent://SD_ILS/0/SD_ILS:306461
2025-12-17T21:28:47Z
2025-12-17T21:28:47Z
Author Rountree, Derrick.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124071896">http://www.sciencedirect.com/science/book/9780124071896</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security information and event management (SIEM) implementation
ent://SD_ILS/0/SD_ILS:293279
2025-12-17T21:28:47Z
2025-12-17T21:28:47Z
Author Miller, David, 1959 Nov. 5- Harris, Shon. Harper, Allen. VanDyke, Stephen. Blask, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/security-information-event-management-siem-implementation">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
24 deadly sins of software security programming flaws and how to fix them
ent://SD_ILS/0/SD_ILS:293319
2025-12-17T21:28:47Z
2025-12-17T21:28:47Z
Author Howard, Michael, 1965- LeBlanc, David, 1960- Viega, John.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/24-deadly-sins-software-security-programming-flaws-how-to-fix-them">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed Linux Linux security secrets and solutions.
ent://SD_ILS/0/SD_ILS:293324
2025-12-17T21:28:47Z
2025-12-17T21:28:47Z
Author Hatch, Brian. Hacking Linux exposed. ISECOM (Organization)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-linux">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed Windows Windows security secrets & solutions
ent://SD_ILS/0/SD_ILS:293341
2025-12-17T21:28:47Z
2025-12-17T21:28:47Z
Author Scambray, Joel. McClure, Stuart.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-windows-microsoft-security-secrets-solutions-third-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Oracle security developing secure database and middleware environments
ent://SD_ILS/0/SD_ILS:293376
2025-12-17T21:28:47Z
2025-12-17T21:28:47Z
Author Knox, David (David C.) Gaetjen, Scott. Jahangir, Hamza. Muth, Tyler. Sack, Patrick.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/applied-oracle-security-developing-secure-database-middleware-environments">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed malware & rootkits malware & rootkits security secrets & solutions
ent://SD_ILS/0/SD_ILS:293397
2025-12-17T21:28:47Z
2025-12-17T21:28:47Z
Author Davis, Michael A. Bodmer, Sean. LeMasters, Aaron.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-malware-rootkits">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Adaptive security management architecture
ent://SD_ILS/0/SD_ILS:541852
2025-12-17T21:28:47Z
2025-12-17T21:28:47Z
Author Tiller, James S., author.<br/>Preferred Shelf Number QA76.9 .A25 T55 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420013375">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Managed code rootkits hooking into runtime environments
ent://SD_ILS/0/SD_ILS:147836
2025-12-17T21:28:47Z
2025-12-17T21:28:47Z
Author Metula, Erez.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495745">http://www.sciencedirect.com/science/book/9781597495745</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Infosecurity 2008 threat analysis
ent://SD_ILS/0/SD_ILS:145541
2025-12-17T21:28:47Z
2025-12-17T21:28:47Z
Author Clark, Champ, III.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492249">http://www.sciencedirect.com/science/book/9781597492249</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mechanics of user identification and authentication : fundamentals of identity management
ent://SD_ILS/0/SD_ILS:539940
2025-12-17T21:28:47Z
2025-12-17T21:28:47Z
Author Todorov, Dobromir., author.<br/>Preferred Shelf Number TK5105.59 .T575 2007<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420052206">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Penetration tester's open source toolkit
ent://SD_ILS/0/SD_ILS:253676
2025-12-17T21:28:47Z
2025-12-17T21:28:47Z
Author Long, Johnny.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490214">http://www.sciencedirect.com/science/book/9781597490214</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Essential computer security everyone's guide to e-mail, Internet, and wireless security
ent://SD_ILS/0/SD_ILS:145840
2025-12-17T21:28:47Z
2025-12-17T21:28:47Z
Author Bradley, Tony, 1969- Carvey, Harlan A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491143">http://www.sciencedirect.com/science/book/9781597491143</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security assessment case studies for implementing the NSA IAM
ent://SD_ILS/0/SD_ILS:254030
2025-12-17T21:28:47Z
2025-12-17T21:28:47Z
Author Rogers, Russ.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266962">http://www.sciencedirect.com/science/book/9781932266962</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>