Search Results for Internet -- Security measures. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dInternet$002b--$002bSecurity$002bmeasures.$0026pe$003dd$00253A$0026ps$003d300$0026isd$003dtrue?dt=list 2024-12-30T22:17:39Z Cryptographic security solutions for the internet of things ent://SD_ILS/0/SD_ILS:481771 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Banday, Mohammad Tariq, 1969- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5742-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial intelligence and security challenges in emerging networks ent://SD_ILS/0/SD_ILS:481975 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Abassi, Ryma, 1980- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7353-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7353-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine learning and cognitive science applications in cyber security ent://SD_ILS/0/SD_ILS:482151 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Khan, Muhammad Salman, author.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8100-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8100-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The basics of cyber safety : computer and mobile device safety made easy ent://SD_ILS/0/SD_ILS:459044 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Sammons, John, author.&#160;Cross, Michael, 1965- author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166509">http://www.sciencedirect.com/science/book/9780124166509</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> RIoT control : understanding and managing risks and the internet of things ent://SD_ILS/0/SD_ILS:459100 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Macaulay, Tyson, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124199712">http://www.sciencedirect.com/science/book/9780124199712</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber guerilla ent://SD_ILS/0/SD_ILS:458953 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Haaster, Jelle van, author.&#160;Gevers, Rickey, author.&#160;Sprengers, Martijn, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128051979">http://www.sciencedirect.com/science/book/9780128051979</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managing online risk : apps, mobile, and social media security ent://SD_ILS/0/SD_ILS:355514 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Gonzalez, Deborah, author.<br/>Preferred Shelf Number&#160;ONLINE(355514.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124200555">http://www.sciencedirect.com/science/book/9780124200555</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Wiley handbook of psychology, technology and society ent://SD_ILS/0/SD_ILS:387129 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Cheever, Nancy A., editor.&#160;Rosen, Larry D., editor.&#160;Carrier, L. Mark, editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1002/9781118771952">Wiley Online Library</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing VoIP : keeping your VoIP network safe ent://SD_ILS/0/SD_ILS:355417 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Bates, Regis J. author.<br/>Preferred Shelf Number&#160;ONLINE(355417.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170391">http://www.sciencedirect.com/science/book/9780124170391</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Security ent://SD_ILS/0/SD_ILS:342168 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Perez, Andre.<br/>Preferred Shelf Number&#160;ONLINE(342168.1)<br/>Electronic Access&#160;ebrary <a href="http://site.ebrary.com/lib/alltitles/docDetail.action?docID=10945002">http://site.ebrary.com/lib/alltitles/docDetail.action?docID=10945002</a> John Wiley <a href="http://dx.doi.org/10.1002/9781119043942">http://dx.doi.org/10.1002/9781119043942</a> MyiLibrary <a href="http://www.myilibrary.com?id=647917">http://www.myilibrary.com?id=647917</a> Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{D8CDF404-6689-4759-9C8F-A065220E7032}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{D8CDF404-6689-4759-9C8F-A065220E7032}Img100.jpg</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber reconnaissance, surveillance, and defense ent://SD_ILS/0/SD_ILS:355450 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Shimonski, Robert.<br/>Preferred Shelf Number&#160;ONLINE(355450.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128013083">http://www.sciencedirect.com/science/book/9780128013083</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Anonymous communication networks : protecting privacy on the web ent://SD_ILS/0/SD_ILS:356657 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Peng, Kun, author.<br/>Preferred Shelf Number&#160;ONLINE(356657.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439881606">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Chinese cybersecurity and cyberdefense ent://SD_ILS/0/SD_ILS:342155 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Ventre, Daniel.<br/>Preferred Shelf Number&#160;ONLINE(342155.1)<br/>Electronic Access&#160;Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1765106">http://public.eblib.com/choice/publicfullrecord.aspx?p=1765106</a> John Wiley <a href="http://dx.doi.org/10.1002/9781119009009">http://dx.doi.org/10.1002/9781119009009</a> MyiLibrary <a href="http://www.myilibrary.com?id=637332">http://www.myilibrary.com?id=637332</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 ent://SD_ILS/0/SD_ILS:355909 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Carvey, Harlan A., author.<br/>Preferred Shelf Number&#160;ONLINE(355909.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124171572">http://www.sciencedirect.com/science/book/9780124171572</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security and IT infrastructure protection ent://SD_ILS/0/SD_ILS:306691 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Vacca, John R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166813">http://www.sciencedirect.com/science/book/9780124166813</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in cyber security technology, operations, and experiences ent://SD_ILS/0/SD_ILS:239591 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Hsu, D. Frank (Derbiau Frank), 1948-&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780823250325/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The death of the Internet ent://SD_ILS/0/SD_ILS:270436 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Jakobsson, Markus.<br/>Preferred Shelf Number&#160;TK5105.875.I57 D43 2012<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> The healthy PC preventive care, home remedies, and green computing ent://SD_ILS/0/SD_ILS:293464 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Hart-Davis, Guy.&#160;Holzman, Carey. Healthy PC.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/healthy-pc-preventive-care-home-remedies-green-computing-2nd-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Web application security a beginner's guide ent://SD_ILS/0/SD_ILS:293241 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Sullivan, Bryan, 1974-&#160;Liu, Vincent.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/web-application-security-beginners-guide">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> RC4 stream cipher and its variants ent://SD_ILS/0/SD_ILS:285249 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Paul, Goutam.&#160;Maitra, Subhamoy, 1970-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439831373">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced persistent threat understanding the danger and how to protect your organization ent://SD_ILS/0/SD_ILS:146056 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Cole, Eric.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499491">http://www.sciencedirect.com/science/book/9781597499491</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Windows forensic analysis toolkit advanced analysis techniques for Windows 7 ent://SD_ILS/0/SD_ILS:145689 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Carvey, Harlan A.&#160;Kolde, Jennifer.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497275">http://www.sciencedirect.com/science/book/9781597497275</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice ent://SD_ILS/0/SD_ILS:145254 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Winterfeld, Steve.&#160;Andress, Jason.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124047372">http://www.sciencedirect.com/science/book/9780124047372</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Oracle Fusion middleware 11g architecture and management ent://SD_ILS/0/SD_ILS:293252 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Shafii, Reza.&#160;Lee, Stephen, 1975 June 8-&#160;Konduri, Gangadhar.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/oracle-fusion-middleware-11g-architecture-management">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security strategies in Web applications and social networking ent://SD_ILS/0/SD_ILS:271538 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Harwood, Mike.<br/>Preferred Shelf Number&#160;HM742 H38 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Secure Java for web application development ent://SD_ILS/0/SD_ILS:285166 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Bhargav, Abhay.&#160;Kumar, B. V. (Balepur Venkatanna), 1959-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439823569">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of financial cryptography and security ent://SD_ILS/0/SD_ILS:287829 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Rosenberg, Burton.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420059823">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile malware attacks and defense ent://SD_ILS/0/SD_ILS:146413 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Dunham, Ken.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492980">http://www.sciencedirect.com/science/book/9781597492980</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Host Identity Protocol (HIP) towards the secure mobile Internet ent://SD_ILS/0/SD_ILS:302802 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Gurtov, Andrei.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9780470772898">http://dx.doi.org/10.1002/9780470772898</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Google hacking for penetration testers. Volume 2 ent://SD_ILS/0/SD_ILS:148029 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Long, Johnny.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491761">http://www.sciencedirect.com/science/book/9781597491761</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> &#304;nternet kullan&#305;m&#305; ve aile ent://SD_ILS/0/SD_ILS:139901 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Preferred Shelf Number&#160;TK5105.888 .I58 2008<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> ISA server 2006 ent://SD_ILS/0/SD_ILS:115080 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;&#304;nan, Y&uuml;ksel.&#160;Demirli, Nihat.<br/>Preferred Shelf Number&#160;TK5105.59 .I536 2008<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Wireless Internet Security Architecture and Protocols ent://SD_ILS/0/SD_ILS:236205 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Kempf, James.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511754739">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The future of the internet and how to stop it ent://SD_ILS/0/SD_ILS:134946 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Zittrain, Jonathan L.<br/>Preferred Shelf Number&#160;TK5105.875.I57 Z53 2008<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Asterisk hacking ent://SD_ILS/0/SD_ILS:145355 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Brashars, Joshua.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491518">http://www.sciencedirect.com/science/book/9781597491518</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> How to cheat at Voip security ent://SD_ILS/0/SD_ILS:145486 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Porter, Thomas, PhD.&#160;Gough, Michael, 1963-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491693">http://www.sciencedirect.com/science/book/9781597491693</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> How to cheat at Voip security ent://SD_ILS/0/SD_ILS:112106 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Porter, Thomas, PhD.&#160;Gough, Michael.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491693">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical VoIP security ent://SD_ILS/0/SD_ILS:253669 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Porter, Thomas.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490603">http://www.sciencedirect.com/science/book/9781597490603</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> How to cheat at configuring ISA server 2004 ent://SD_ILS/0/SD_ILS:253948 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Shinder, Thomas W.&#160;Shinder, Debra Littlejohn.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490573">http://www.sciencedirect.com/science/book/9781597490573</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Essential computer security everyone's guide to e-mail, Internet, and wireless security ent://SD_ILS/0/SD_ILS:145840 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Bradley, Tony, 1969-&#160;Carvey, Harlan A.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491143">http://www.sciencedirect.com/science/book/9781597491143</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> AAA and network security for mobile access radius, diameter, EAP, PKI, and IP mobility ent://SD_ILS/0/SD_ILS:295729 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Nakhjiri, Madjid.&#160;Nakhjiri, Mahsa.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/0470017465">http://dx.doi.org/10.1002/0470017465</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Aggressive network self-defense ent://SD_ILS/0/SD_ILS:253672 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Wyler, Neil R.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">http://www.sciencedirect.com/science/book/9781931836203</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> VoIP security ent://SD_ILS/0/SD_ILS:253715 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Ransome, James F.&#160;Rittinghouse, John W.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583323">http://www.sciencedirect.com/science/book/9781555583323</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking a terror network the silent threat of covert channels ent://SD_ILS/0/SD_ILS:253987 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Rogers, Russ.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994985">http://www.sciencedirect.com/science/book/9781928994985</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Implementing homeland security for enterprise IT ent://SD_ILS/0/SD_ILS:253656 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Erbschloe, Michael.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">http://www.sciencedirect.com/science/book/9781555583125</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Internet security a jumpstart for systems administrators and IT managers ent://SD_ILS/0/SD_ILS:253843 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Speed, Tim.&#160;Ellis, Juanita.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582982">http://www.sciencedirect.com/science/book/9781555582982</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Internet practices best practices for securing systems in the Internet and e-Business age ent://SD_ILS/0/SD_ILS:290427 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;McBride, Patrick.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031478">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hack proofing your e-commerce site the only way to stop a hacker is to think like one ent://SD_ILS/0/SD_ILS:253968 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Russell, Ryan.&#160;Syngress Media, Inc.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994275">http://www.sciencedirect.com/science/book/9781928994275</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hack proofing your Web applications ent://SD_ILS/0/SD_ILS:253969 2024-12-30T22:17:39Z 2024-12-30T22:17:39Z Author&#160;Traxler, Julie.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994312">http://www.sciencedirect.com/science/book/9781928994312</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>