Search Results for Security Measures - Narrowed by: 2005SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity$002bMeasures$0026qf$003dPUBDATE$002509Publication$002bDate$0025092005$0025092005$0026pe$003dd$00253A$0026ps$003d300?2024-11-13T16:48:19ZBusiness continuity and disaster recovery for infosec managersent://SD_ILS/0/SD_ILS:2538622024-11-13T16:48:19Z2024-11-13T16:48:19ZAuthor Rittinghouse, John W. Ransome, James F.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583392">http://www.sciencedirect.com/science/book/9781555583392</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking a terror network the silent threat of covert channelsent://SD_ILS/0/SD_ILS:2539872024-11-13T16:48:19Z2024-11-13T16:48:19ZAuthor Rogers, Russ.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994985">http://www.sciencedirect.com/science/book/9781928994985</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Intrusion prevention and active response deploying network and host IPSent://SD_ILS/0/SD_ILS:2540172024-11-13T16:48:19Z2024-11-13T16:48:19ZAuthor Rash, Michael (Michael Brandon)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266474">http://www.sciencedirect.com/science/book/9781932266474</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Black Hat physical device security exploiting hardware and softwareent://SD_ILS/0/SD_ILS:2540252024-11-13T16:48:19Z2024-11-13T16:48:19ZAuthor Miller, Drew, 1978-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266818">http://www.sciencedirect.com/science/book/9781932266818</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Bulletproof wireless security GSM, UMTS, 802.11 and ad hoc securityent://SD_ILS/0/SD_ILS:2547222024-11-13T16:48:19Z2024-11-13T16:48:19ZAuthor Chandra, Praphul.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750677462">http://www.sciencedirect.com/science/book/9780750677462</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Scalable and secure internet services and architectureent://SD_ILS/0/SD_ILS:2857962024-11-13T16:48:19Z2024-11-13T16:48:19ZAuthor Xu, Chengzhong.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420035209">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Multimedia security handbookent://SD_ILS/0/SD_ILS:2867602024-11-13T16:48:19Z2024-11-13T16:48:19ZAuthor Furht, Borivoje. Kirovski, Darko.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420038262">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>A practical guide to security assessmentsent://SD_ILS/0/SD_ILS:2883062024-11-13T16:48:19Z2024-11-13T16:48:19ZAuthor Kairab, Sudhanshu.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203507230">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The ethical hack a framework for business value penetration testingent://SD_ILS/0/SD_ILS:2883102024-11-13T16:48:19Z2024-11-13T16:48:19ZAuthor Tiller, James S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203495414">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network security technologiesent://SD_ILS/0/SD_ILS:2900772024-11-13T16:48:19Z2024-11-13T16:48:19ZAuthor Fung, K. T. (Kwok T.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203330708">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Disruptive security technologies with mobile code and peer-to-peer networksent://SD_ILS/0/SD_ILS:2913052024-11-13T16:48:19Z2024-11-13T16:48:19ZAuthor Brooks, R. R. (Richard R.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420038880">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Error correcting coding and security for data networks analysis of the superchannel conceptent://SD_ILS/0/SD_ILS:3011472024-11-13T16:48:19Z2024-11-13T16:48:19ZAuthor Kabatiansky, G. Krouk, E. Semenov, S. John Wiley & Sons.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/0470867574">http://dx.doi.org/10.1002/0470867574</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cryptography, information theory, and error-correction a handbook for the 21st centuryent://SD_ILS/0/SD_ILS:3018602024-11-13T16:48:19Z2024-11-13T16:48:19ZAuthor Bruen, Aiden A., 1941- Forcinito, Mario, 1962- Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118033296">An electronic book accessible through the World Wide Web; click for information</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html">http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cisco PIX firewalls configure, manage, & troubleshootent://SD_ILS/0/SD_ILS:2536672024-11-13T16:48:19Z2024-11-13T16:48:19ZAuthor Behrens, Thorsten. Riley, Charles. Khan, Umer.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490047">http://www.sciencedirect.com/science/book/9781597490047</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Aggressive network self-defenseent://SD_ILS/0/SD_ILS:2536722024-11-13T16:48:19Z2024-11-13T16:48:19ZAuthor Wyler, Neil R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">http://www.sciencedirect.com/science/book/9781931836203</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Physical security for ITent://SD_ILS/0/SD_ILS:2538552024-11-13T16:48:19Z2024-11-13T16:48:19ZAuthor Erbschloe, Michael, 1951-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583279">http://www.sciencedirect.com/science/book/9781555583279</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Host integrity monitoring using Osiris and Samhainent://SD_ILS/0/SD_ILS:2539402024-11-13T16:48:19Z2024-11-13T16:48:19ZAuthor Wotring, Brian. Potter, Bruce. Ranum, Marcus J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490184">http://www.sciencedirect.com/science/book/9781597490184</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Nessus, Snort, & Ethereal power tools customizing open source security applicationsent://SD_ILS/0/SD_ILS:2539422024-11-13T16:48:19Z2024-11-13T16:48:19ZAuthor Archibald, Neil. Ramirez, Gilbert, 1972- Rathaus, Noam. Syngress Media, Inc.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490207">http://www.sciencedirect.com/science/book/9781597490207</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Configuring Check Point NGX VPN-1/fire wall-ent://SD_ILS/0/SD_ILS:2539432024-11-13T16:48:19Z2024-11-13T16:48:19ZAuthor Stephens, Robert. Stiefel, Barry J. Watkins, Stephen (Information security professional)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490313">http://www.sciencedirect.com/science/book/9781597490313</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network security evaluation using the NSA IEMent://SD_ILS/0/SD_ILS:2539452024-11-13T16:48:19Z2024-11-13T16:48:19ZAuthor Rogers, Russ. Cunningham, Bryan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490351">http://www.sciencedirect.com/science/book/9781597490351</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network security a practical approachent://SD_ILS/0/SD_ILS:2537072024-11-13T16:48:19Z2024-11-13T16:48:19ZAuthor Harrington, Jan L.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123116338">http://www.sciencedirect.com/science/book/9780123116338</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>VoIP securityent://SD_ILS/0/SD_ILS:2537152024-11-13T16:48:19Z2024-11-13T16:48:19ZAuthor Ransome, James F. Rittinghouse, John W.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583323">http://www.sciencedirect.com/science/book/9781555583323</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>IM, instant messaging, securityent://SD_ILS/0/SD_ILS:2537252024-11-13T16:48:19Z2024-11-13T16:48:19ZAuthor Rittinghouse, John W. Ransome, James F.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583385">http://www.sciencedirect.com/science/book/9781555583385</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security risk analysisent://SD_ILS/0/SD_ILS:2847642024-11-13T16:48:19Z2024-11-13T16:48:19ZAuthor Peltier, Thomas R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420031195">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>TCP / IP ve ağ güvenliği : teori ve uygulamalar ileent://SD_ILS/0/SD_ILS:1128132024-11-13T16:48:19Z2024-11-13T16:48:19ZAuthor Dirican, Can Okan.<br/>Preferred Shelf Number TK 5105.55 D5753 2005<br/>Format: Books<br/>Availability Beytepe Library~2<br/>Acing the security+ certification exament://SD_ILS/0/SD_ILS:3134922024-11-13T16:48:19Z2024-11-13T16:48:19ZAuthor Regan, Patrick E.<br/>Preferred Shelf Number QA76.3 R455 2005<br/>Format: Books<br/>Availability Beytepe Library~1<br/>AAA and network security for mobile access radius, diameter, EAP, PKI, and IP mobilityent://SD_ILS/0/SD_ILS:2957292024-11-13T16:48:19Z2024-11-13T16:48:19ZAuthor Nakhjiri, Madjid. Nakhjiri, Mahsa.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/0470017465">http://dx.doi.org/10.1002/0470017465</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>