Search Results for Electronic books. - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dElectronic$002bbooks.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300?dt=list
2024-12-22T08:52:42Z
Cloud management and security
ent://SD_ILS/0/SD_ILS:341816
2024-12-22T08:52:42Z
2024-12-22T08:52:42Z
Author Abbadi, Imad M., author.<br/>Preferred Shelf Number ONLINE(341816.1)<br/>Electronic Access ebrary <a href="http://alltitles.ebrary.com/Doc?id=10881234">An electronic book accessible through the World Wide Web; click to view</a>
<a href="http://www.lib.uts.edu.au/sso/goto.php?url=http://www.UTS.eblib.com.AU/EBLWeb/patron/?target=patron&extendedid=P_1701403_0">Electronic version</a>
Cover image <a href="http://catalogimages.wiley.com/images/db/jimages/9781118817094.jpg">http://catalogimages.wiley.com/images/db/jimages/9781118817094.jpg</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118817087">http://dx.doi.org/10.1002/9781118817087</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber threat! : how to manage the growing risk of cyber attacks
ent://SD_ILS/0/SD_ILS:342020
2024-12-22T08:52:42Z
2024-12-22T08:52:42Z
Author Ulsch, N. MacDonnell, 1951-<br/>Preferred Shelf Number ONLINE(342020.1)<br/>Electronic Access ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a>
MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a>
Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Federated identity primer
ent://SD_ILS/0/SD_ILS:306461
2024-12-22T08:52:42Z
2024-12-22T08:52:42Z
Author Rountree, Derrick.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124071896">http://www.sciencedirect.com/science/book/9780124071896</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Reliability and availability of cloud computing
ent://SD_ILS/0/SD_ILS:249383
2024-12-22T08:52:42Z
2024-12-22T08:52:42Z
Author Bauer, Eric. Adams, Randee. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6266788">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6266788</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Engineering information security the application of systems engineering concepts to achieve information assurance
ent://SD_ILS/0/SD_ILS:249916
2024-12-22T08:52:42Z
2024-12-22T08:52:42Z
Author Jacobs, Stuart.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The basics of information security understanding the fundamentals of InfoSec in theory and practice
ent://SD_ILS/0/SD_ILS:145371
2024-12-22T08:52:42Z
2024-12-22T08:52:42Z
Author Andress, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security principles and practice
ent://SD_ILS/0/SD_ILS:298878
2024-12-22T08:52:42Z
2024-12-22T08:52:42Z
Author Stamp, Mark.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118027974">An electronic book accessible through the World Wide Web; click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=738753">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=738753</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10478419">http://site.ebrary.com/lib/alltitles/Doc?id=10478419</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=738753">http://swb.eblib.com/patron/FullRecord.aspx?p=738753</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hashing in computer science fifty years of slicing and dicing
ent://SD_ILS/0/SD_ILS:298025
2024-12-22T08:52:42Z
2024-12-22T08:52:42Z
Author Konheim, Alan G., 1934-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://proquest.safaribooksonline.com/?fpi=9781118031834">Available by subscription from Safari Books Online</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470630617">http://dx.doi.org/10.1002/9780470630617</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html">http://catdir.loc.gov/catdir/enhancements/fy1106/2009052123-b.html</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9781118031834">http://proquest.tech.safaribooksonline.de/9781118031834</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mac security bible
ent://SD_ILS/0/SD_ILS:303881
2024-12-22T08:52:42Z
2024-12-22T08:52:42Z
Author Kissell, Joe.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118257739">An electronic book accessible through the World Wide Web; click for information</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/640">http://proquest.safaribooksonline.com/640</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780470474198">http://proquest.safaribooksonline.com/?fpi=9780470474198</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/9780470474198">http://proquest.safaribooksonline.com/9780470474198</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40737">http://www.books24x7.com/marc.asp?bookid=40737</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10358774">http://site.ebrary.com/lib/alltitles/Doc?id=10358774</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IT audit, control, and security
ent://SD_ILS/0/SD_ILS:304008
2024-12-22T08:52:42Z
2024-12-22T08:52:42Z
Author Moeller, Robert R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118269138">An electronic book accessible through the World Wide Web; click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624573</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40717">http://www.books24x7.com/marc.asp?bookid=40717</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10469768">http://site.ebrary.com/lib/alltitles/Doc?id=10469768</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=624573">http://swb.eblib.com/patron/FullRecord.aspx?p=624573</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied cryptanalysis breaking ciphers in the real world
ent://SD_ILS/0/SD_ILS:249508
2024-12-22T08:52:42Z
2024-12-22T08:52:42Z
Author Stamp, Mark. Low, Richard M., 1967-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5201512</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer security and cryptography
ent://SD_ILS/0/SD_ILS:296865
2024-12-22T08:52:42Z
2024-12-22T08:52:42Z
Author Konheim, Alan G., 1934-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.contentreserve.com/TitleInfo.asp?ID={24307C36-99BB-4A76-9317-7D1A7CC786FB}&Format=50">Click for information</a>
<a href="http://proquest.safaribooksonline.com/?fpi=9780471947837">Available by subscription from Safari Books Online</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170</a>
John Wiley <a href="http://dx.doi.org/10.1002/0470083980">http://dx.doi.org/10.1002/0470083980</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9780471947837">http://proquest.tech.safaribooksonline.de/9780471947837</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Developer's guide to web application security
ent://SD_ILS/0/SD_ILS:306464
2024-12-22T08:52:42Z
2024-12-22T08:52:42Z
Author Cross, Michael, 1965-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Metasploit toolkit for penetration testing, exploit development, and vulnerability research
ent://SD_ILS/0/SD_ILS:306469
2024-12-22T08:52:42Z
2024-12-22T08:52:42Z
Author Maynor, David. Mookhey, K. K.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">http://www.sciencedirect.com/science/book/9781597490740</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
How to cheat at securing your network
ent://SD_ILS/0/SD_ILS:306503
2024-12-22T08:52:42Z
2024-12-22T08:52:42Z
Author Dubrawsky, Ido.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492317">http://www.sciencedirect.com/science/book/9781597492317</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Insider threat protecting the enterprise from sabotage, spying, and theft
ent://SD_ILS/0/SD_ILS:253661
2024-12-22T08:52:42Z
2024-12-22T08:52:42Z
Author Cole, Eric. Ring, Sandra.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Volltext <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Combating spyware in the enterprise
ent://SD_ILS/0/SD_ILS:254075
2024-12-22T08:52:42Z
2024-12-22T08:52:42Z
Author Baskin, Brian. Piltzecker, Tony, 1975-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490641">http://www.sciencedirect.com/science/book/9781597490641</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
How to cheat at designing security for a Windows Server 2003 network
ent://SD_ILS/0/SD_ILS:253670
2024-12-22T08:52:42Z
2024-12-22T08:52:42Z
Author Amini, Rob. Hunter, Laura E.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492430">http://www.sciencedirect.com/science/book/9781597492430</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing HP NonStop servers in an open systems world TCP/IP, OSS & SQL
ent://SD_ILS/0/SD_ILS:253863
2024-12-22T08:52:42Z
2024-12-22T08:52:42Z
Author XYPRO Technology Corporation.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583446">http://www.sciencedirect.com/science/book/9781555583446</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security principles and practice
ent://SD_ILS/0/SD_ILS:301803
2024-12-22T08:52:42Z
2024-12-22T08:52:42Z
Author Stamp, Mark.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.contentreserve.com/TitleInfo.asp?ID={310C0D18-7395-435E-BA71-41A0448F3D13}&Format=50">Click for information</a>
Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=240929">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=240929</a>
John Wiley <a href="http://dx.doi.org/10.1002/0471744190">http://dx.doi.org/10.1002/0471744190</a>
<a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/109933408">http://www3.interscience.wiley.com/cgi-bin/bookhome/109933408</a>
HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/57754240.html">http://catalog.hathitrust.org/api/volumes/oclc/57754240.html</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security and ethics social and organizational issues
ent://SD_ILS/0/SD_ILS:152966
2024-12-22T08:52:42Z
2024-12-22T08:52:42Z
Author Quigley, Marian.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=108396">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=108396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber spying tracking your family's (sometimes) secret online lives
ent://SD_ILS/0/SD_ILS:253673
2024-12-22T08:52:42Z
2024-12-22T08:52:42Z
Author Fair, Ted. Nordfelt, Michael. Ring, Sandra. Cole, Eric.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836418">http://www.sciencedirect.com/science/book/9781931836418</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
InfoSec career hacking sell your skillz, not your soul
ent://SD_ILS/0/SD_ILS:253681
2024-12-22T08:52:42Z
2024-12-22T08:52:42Z
Author Bayles, Aaron W. Brindley, Ed. Foster, James C. Hurley, Chris. Long, Johnny.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490115">http://www.sciencedirect.com/science/book/9781597490115</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Stealing the network how to own an identity
ent://SD_ILS/0/SD_ILS:253663
2024-12-22T08:52:42Z
2024-12-22T08:52:42Z
Author Alder, Raven. Mullen, Timothy M. Long, Johnny.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490061">http://www.sciencedirect.com/science/book/9781597490061</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Software piracy exposed
ent://SD_ILS/0/SD_ILS:253664
2024-12-22T08:52:42Z
2024-12-22T08:52:42Z
Author Craig, Paul. Honick, Ron. Burnett, Mark (Mark M.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266986">http://www.sciencedirect.com/science/book/9781932266986</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Aggressive network self-defense
ent://SD_ILS/0/SD_ILS:253672
2024-12-22T08:52:42Z
2024-12-22T08:52:42Z
Author Wyler, Neil R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">http://www.sciencedirect.com/science/book/9781931836203</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Snort 2.1 intrusion detection
ent://SD_ILS/0/SD_ILS:253989
2024-12-22T08:52:42Z
2024-12-22T08:52:42Z
Author Beale, Jay. Alder, Raven.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836043">http://www.sciencedirect.com/science/book/9781931836043</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cybersecurity operations handbook
ent://SD_ILS/0/SD_ILS:253847
2024-12-22T08:52:42Z
2024-12-22T08:52:42Z
Author Rittinghouse, John W. Hancock, Bill, 1957-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583064">http://www.sciencedirect.com/science/book/9781555583064</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hack proofing your network
ent://SD_ILS/0/SD_ILS:253618
2024-12-22T08:52:42Z
2024-12-22T08:52:42Z
Author Ahmad, David R. Mirza. Russell, Ryan, 1969-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994701">http://www.sciencedirect.com/science/book/9781928994701</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Contemporary cryptology the science of information integrity
ent://SD_ILS/0/SD_ILS:249661
2024-12-22T08:52:42Z
2024-12-22T08:52:42Z
Author Simmons, Gustavus J. Institute of Electrical and Electronics Engineers.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5265879</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>