Search Results for Ebook Library. - Narrowed by: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dEbook$002bLibrary.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?dt=list 2024-12-18T15:27:36Z Windows 8 kickstart ent://SD_ILS/0/SD_ILS:293408 2024-12-18T15:27:36Z 2024-12-18T15:27:36Z Author&#160;Russell, James Howard.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/windows-8-kickstart">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The healthy Mac preventive care, practical diagnostics, and proven remedies ent://SD_ILS/0/SD_ILS:293416 2024-12-18T15:27:36Z 2024-12-18T15:27:36Z Author&#160;Morris, Heather.&#160;Ballew, Joli.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/healthy-mac-preventive-care-practical-diagnostics-proven-remedies">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Windows 7 SP1 ent://SD_ILS/0/SD_ILS:293421 2024-12-18T15:27:36Z 2024-12-18T15:27:36Z Author&#160;Matthews, Martin S.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/windows-7-sp1-quicksteps">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Windows 7 for seniors ent://SD_ILS/0/SD_ILS:293424 2024-12-18T15:27:36Z 2024-12-18T15:27:36Z Author&#160;Matthews, Martin S.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/windows-7-for-seniors-quicksteps">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Windows 7 ent://SD_ILS/0/SD_ILS:293477 2024-12-18T15:27:36Z 2024-12-18T15:27:36Z Author&#160;Matthews, Martin S.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/windows-7-quicksteps">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The healthy PC preventive care, home remedies, and green computing ent://SD_ILS/0/SD_ILS:293464 2024-12-18T15:27:36Z 2024-12-18T15:27:36Z Author&#160;Hart-Davis, Guy.&#160;Holzman, Carey. Healthy PC.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/healthy-pc-preventive-care-home-remedies-green-computing-2nd-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Operating systems demystified ent://SD_ILS/0/SD_ILS:294101 2024-12-18T15:27:36Z 2024-12-18T15:27:36Z Author&#160;McHoes, Ann McIver, 1950-&#160;Ballew, Joli.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/operating-systems-demystified">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Web application security a beginner's guide ent://SD_ILS/0/SD_ILS:293241 2024-12-18T15:27:36Z 2024-12-18T15:27:36Z Author&#160;Sullivan, Bryan, 1974-&#160;Liu, Vincent.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/web-application-security-beginners-guide">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Oracle security developing secure database and middleware environments ent://SD_ILS/0/SD_ILS:293376 2024-12-18T15:27:36Z 2024-12-18T15:27:36Z Author&#160;Knox, David (David C.)&#160;Gaetjen, Scott.&#160;Jahangir, Hamza.&#160;Muth, Tyler.&#160;Sack, Patrick.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/applied-oracle-security-developing-secure-database-middleware-environments">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed malware &amp; rootkits malware &amp; rootkits security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:293397 2024-12-18T15:27:36Z 2024-12-18T15:27:36Z Author&#160;Davis, Michael A.&#160;Bodmer, Sean.&#160;LeMasters, Aaron.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-malware-rootkits">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Oracle Fusion middleware 11g architecture and management ent://SD_ILS/0/SD_ILS:293252 2024-12-18T15:27:36Z 2024-12-18T15:27:36Z Author&#160;Shafii, Reza.&#160;Lee, Stephen, 1975 June 8-&#160;Konduri, Gangadhar.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/oracle-fusion-middleware-11g-architecture-management">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Gray hat hacking the ethical hacker's handbook ent://SD_ILS/0/SD_ILS:293255 2024-12-18T15:27:36Z 2024-12-18T15:27:36Z Author&#160;Harris, Shon.&#160;Harper, Allen.&#160;Eagle, Chris.&#160;Ness, Jonathan.&#160;Lenkey, Gideon.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/gray-hat-hacking-ethical-hackers-handbook-3rd-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT auditing using controls to protect information assets ent://SD_ILS/0/SD_ILS:293262 2024-12-18T15:27:36Z 2024-12-18T15:27:36Z Author&#160;Davis, Chris (Christopher Michael)&#160;Schiller, Mike.&#160;Wheeler, Kevin.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/auditing-using-controls-to-protect-information-assets-2nd-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed web applications web application security secrets and solutions ent://SD_ILS/0/SD_ILS:293277 2024-12-18T15:27:36Z 2024-12-18T15:27:36Z Author&#160;Scambray, Joel.&#160;Liu, Vincent.&#160;Sima, Caleb.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-web-applications-3e">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security information and event management (SIEM) implementation ent://SD_ILS/0/SD_ILS:293279 2024-12-18T15:27:36Z 2024-12-18T15:27:36Z Author&#160;Miller, David, 1959 Nov. 5-&#160;Harris, Shon.&#160;Harper, Allen.&#160;VanDyke, Stephen.&#160;Blask, Chris.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/security-information-event-management-siem-implementation">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed wireless wireless security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:293300 2024-12-18T15:27:36Z 2024-12-18T15:27:36Z Author&#160;Cache, Johnny.&#160;Wright, Joshua.&#160;Liu, Vincent.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-wireless-second-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> 24 deadly sins of software security programming flaws and how to fix them ent://SD_ILS/0/SD_ILS:293319 2024-12-18T15:27:36Z 2024-12-18T15:27:36Z Author&#160;Howard, Michael, 1965-&#160;LeBlanc, David, 1960-&#160;Viega, John.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/24-deadly-sins-software-security-programming-flaws-how-to-fix-them">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed Linux Linux security secrets and solutions. ent://SD_ILS/0/SD_ILS:293324 2024-12-18T15:27:36Z 2024-12-18T15:27:36Z Author&#160;Hatch, Brian. Hacking Linux exposed.&#160;ISECOM (Organization)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-linux">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed Windows Windows security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:293341 2024-12-18T15:27:36Z 2024-12-18T15:27:36Z Author&#160;Scambray, Joel.&#160;McClure, Stuart.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-windows-microsoft-security-secrets-solutions-third-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed Web 2.0 Web 2.0 security secrets and solutions ent://SD_ILS/0/SD_ILS:293352 2024-12-18T15:27:36Z 2024-12-18T15:27:36Z Author&#160;Cannings, Rich.&#160;Dwivedi, Himanshu.&#160;Lackey, Zane.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-web-20-security-secrets-solutions">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber threat! : how to manage the growing risk of cyber attacks ent://SD_ILS/0/SD_ILS:342020 2024-12-18T15:27:36Z 2024-12-18T15:27:36Z Author&#160;Ulsch, N. MacDonnell, 1951-<br/>Preferred Shelf Number&#160;ONLINE(342020.1)<br/>Electronic Access&#160;ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a> Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a> MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a> Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security 2020 reduce security risks this decade ent://SD_ILS/0/SD_ILS:318966 2024-12-18T15:27:36Z 2024-12-18T15:27:36Z Author&#160;Howard, Doug.&#160;Prince, Kevin.<br/>Preferred Shelf Number&#160;ONLINE(318966.1)<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255803">An electronic book accessible through the World Wide Web; click for information</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40805">http://www.books24x7.com/marc.asp?bookid=40805</a> Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=694289">http://public.eblib.com/choice/publicfullrecord.aspx?p=694289</a> ebrary <a href="http://site.ebrary.com/id/10469690">http://site.ebrary.com/id/10469690</a> MyiLibrary <a href="http://www.myilibrary.com?id=294413">http://www.myilibrary.com?id=294413</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security principles and practice ent://SD_ILS/0/SD_ILS:298878 2024-12-18T15:27:36Z 2024-12-18T15:27:36Z Author&#160;Stamp, Mark.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118027974">An electronic book accessible through the World Wide Web; click for information</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=738753">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=738753</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10478419">http://site.ebrary.com/lib/alltitles/Doc?id=10478419</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=738753">http://swb.eblib.com/patron/FullRecord.aspx?p=738753</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT audit, control, and security ent://SD_ILS/0/SD_ILS:304008 2024-12-18T15:27:36Z 2024-12-18T15:27:36Z Author&#160;Moeller, Robert R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118269138">An electronic book accessible through the World Wide Web; click for information</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40717">http://www.books24x7.com/marc.asp?bookid=40717</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10469768">http://site.ebrary.com/lib/alltitles/Doc?id=10469768</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=624573">http://swb.eblib.com/patron/FullRecord.aspx?p=624573</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer security and cryptography ent://SD_ILS/0/SD_ILS:296865 2024-12-18T15:27:36Z 2024-12-18T15:27:36Z Author&#160;Konheim, Alan G., 1934-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.contentreserve.com/TitleInfo.asp?ID={24307C36-99BB-4A76-9317-7D1A7CC786FB}&Format=50">Click for information</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780471947837">Available by subscription from Safari Books Online</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170</a> John Wiley <a href="http://dx.doi.org/10.1002/0470083980">http://dx.doi.org/10.1002/0470083980</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9780471947837">http://proquest.tech.safaribooksonline.de/9780471947837</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security principles and practice ent://SD_ILS/0/SD_ILS:301803 2024-12-18T15:27:36Z 2024-12-18T15:27:36Z Author&#160;Stamp, Mark.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.contentreserve.com/TitleInfo.asp?ID={310C0D18-7395-435E-BA71-41A0448F3D13}&Format=50">Click for information</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=240929">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=240929</a> John Wiley <a href="http://dx.doi.org/10.1002/0471744190">http://dx.doi.org/10.1002/0471744190</a> <a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/109933408">http://www3.interscience.wiley.com/cgi-bin/bookhome/109933408</a> HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/57754240.html">http://catalog.hathitrust.org/api/volumes/oclc/57754240.html</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>