Search Results for Security Measures. - Narrowed by: 2003 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity$002bMeasures.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092003$0025092003$0026ps$003d300?dt=list 2024-11-23T15:53:46Z Protocols for secure electronic commerce ent://SD_ILS/0/SD_ILS:289495 2024-11-23T15:53:46Z 2024-11-23T15:53:46Z Author&#160;Sherif, Mostafa Hashem.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420040012">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building firewalls with OpenBSD and PF ent://SD_ILS/0/SD_ILS:113220 2024-11-23T15:53:46Z 2024-11-23T15:53:46Z Author&#160;Artymiak, Jacek.<br/>Preferred Shelf Number&#160;TK5105.59 .A77 2003<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Computer security sourcebook ent://SD_ILS/0/SD_ILS:94615 2024-11-23T15:53:46Z 2024-11-23T15:53:46Z Author&#160;Caldwell, Wilma, ed.<br/>Preferred Shelf Number&#160;QA 76.9.A25 C658 2003<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Telecommunications Quality of Service Management ent://SD_ILS/0/SD_ILS:247987 2024-11-23T15:53:46Z 2024-11-23T15:53:46Z Author&#160;Oodan, Antony P.&#160;Ward, Keith E.&#160;Savolaine, Catherine G.&#160;Daneshmand, Mahmoud&#160;Hoath, Peter<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1049/PBTE048E">http://dx.doi.org/10.1049/PBTE048E</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> SSCP study guide &amp; DVD training system ent://SD_ILS/0/SD_ILS:254006 2024-11-23T15:53:46Z 2024-11-23T15:53:46Z Author&#160;Jacobs, Josh.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836807">http://www.sciencedirect.com/science/book/9781931836807</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Configuring Symantec AntiVirus corporate edition ent://SD_ILS/0/SD_ILS:254007 2024-11-23T15:53:46Z 2024-11-23T15:53:46Z Author&#160;Hunter, Laura E.&#160;Shimonski, Robert.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836814">http://www.sciencedirect.com/science/book/9781931836814</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building DMZs for Enterprise networks ent://SD_ILS/0/SD_ILS:254009 2024-11-23T15:53:46Z 2024-11-23T15:53:46Z Author&#160;Shimonski, Robert.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836883">http://www.sciencedirect.com/science/book/9781931836883</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Check Point NG VPN-1/Firewall-1 advanced configuration and troubleshooting ent://SD_ILS/0/SD_ILS:254014 2024-11-23T15:53:46Z 2024-11-23T15:53:46Z Author&#160;Noble, Jim.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836975">http://www.sciencedirect.com/science/book/9781931836975</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cisco security professional's guide to secure intrusion detection systems ent://SD_ILS/0/SD_ILS:254024 2024-11-23T15:53:46Z 2024-11-23T15:53:46Z Author&#160;Burton, James.&#160;Dubrawsky, Ida.&#160;Osipov, Vitaly.&#160;Baumrucker, C. Tate.&#160;Sweeney, Michael<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266696">http://www.sciencedirect.com/science/book/9781932266696</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Special ops host and network security for Microsoft, UNIX, and Oracle ent://SD_ILS/0/SD_ILS:254054 2024-11-23T15:53:46Z 2024-11-23T15:53:46Z Author&#160;Birkholz, Erik Pace.&#160;McClure, Stuart.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836692">http://www.sciencedirect.com/science/book/9781931836692</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Complete book of remote access connectivity and security ent://SD_ILS/0/SD_ILS:291164 2024-11-23T15:53:46Z 2024-11-23T15:53:46Z Author&#160;Kasacavage, Victor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420000429">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Internet security a jumpstart for systems administrators and IT managers ent://SD_ILS/0/SD_ILS:253843 2024-11-23T15:53:46Z 2024-11-23T15:53:46Z Author&#160;Speed, Tim.&#160;Ellis, Juanita.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582982">http://www.sciencedirect.com/science/book/9781555582982</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity operations handbook ent://SD_ILS/0/SD_ILS:253847 2024-11-23T15:53:46Z 2024-11-23T15:53:46Z Author&#160;Rittinghouse, John W.&#160;Hancock, Bill, 1957-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583064">http://www.sciencedirect.com/science/book/9781555583064</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> UMTS security ent://SD_ILS/0/SD_ILS:295861 2024-11-23T15:53:46Z 2024-11-23T15:53:46Z Author&#160;Niemi, Valtteri.&#160;Nyberg, Kaisa, 1948-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.contentreserve.com/TitleInfo.asp?ID={465C10B2-1465-4D2B-AAAD-DED651D62D3D}&Format=50">Click for information</a> Wiley InterScience - Full text online <a href="http://onlinelibrary.wiley.com/book/10.1002/0470091584">http://onlinelibrary.wiley.com/book/10.1002/0470091584</a> John Wiley <a href="http://dx.doi.org/10.1002/0470091584">http://dx.doi.org/10.1002/0470091584</a> HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/53183293.html">http://catalog.hathitrust.org/api/volumes/oclc/53183293.html</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Official (ISC)2 guide to the CISSP exam ent://SD_ILS/0/SD_ILS:287353 2024-11-23T15:53:46Z 2024-11-23T15:53:46Z Author&#160;Hansche, Susan.&#160;Berti, John.&#160;Hare, Chris, 1962-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203507872">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Occupational crime deterrence, investigation, and reporting in compliance with federal guidelines ent://SD_ILS/0/SD_ILS:288614 2024-11-23T15:53:46Z 2024-11-23T15:53:46Z Author&#160;Blount, Ernest C.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420040265">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managing a network vulnerability assessment ent://SD_ILS/0/SD_ILS:289185 2024-11-23T15:53:46Z 2024-11-23T15:53:46Z Author&#160;Peltier, Thomas R.&#160;Peltier, Justin.&#160;Blackley, John A.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203503041">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in fixed and wireless networks an introduction to securing data communications ent://SD_ILS/0/SD_ILS:301122 2024-11-23T15:53:46Z 2024-11-23T15:53:46Z Author&#160;Sch&auml;fer, G&uuml;nter, Dr.-Ing.&#160;John Wiley &amp; Sons.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/0470863722">http://dx.doi.org/10.1002/0470863722</a> <a href="http://www3.interscience.wiley.com/cgi-bin/bookhome/112477198">http://www3.interscience.wiley.com/cgi-bin/bookhome/112477198</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/bios/wiley047/2004299184.html">http://catdir.loc.gov/catdir/bios/wiley047/2004299184.html</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing wireless LANs a practical guide for network managers, LAN administrators, and the home office user ent://SD_ILS/0/SD_ILS:301188 2024-11-23T15:53:46Z 2024-11-23T15:53:46Z Author&#160;Held, Gilbert, 1943-&#160;John Wiley &amp; Sons.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/0470869690">http://dx.doi.org/10.1002/0470869690</a> Contributor biographical information <a href="http://catdir.loc.gov/catdir/bios/wiley046/2003057592.html">http://catdir.loc.gov/catdir/bios/wiley046/2003057592.html</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Guidelines for analyzing and managing the security vulnerabilities of fixed chemical sites ent://SD_ILS/0/SD_ILS:301215 2024-11-23T15:53:46Z 2024-11-23T15:53:46Z Author&#160;American Institute of Chemical Engineers. Center for Chemical Process Safety.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://onlinelibrary.wiley.com/book/10.1002/9780470925003">Access restricted to McGill users</a> Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpGAMSVFC3">http://app.knovel.com/web/toc.v/cid:kpGAMSVFC3</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470925003">http://dx.doi.org/10.1002/9780470925003</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Asset protection and security management handbook ent://SD_ILS/0/SD_ILS:290420 2024-11-23T15:53:46Z 2024-11-23T15:53:46Z Author&#160;POA Publishing.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031386">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Using the common criteria for IT security evaluation ent://SD_ILS/0/SD_ILS:290442 2024-11-23T15:53:46Z 2024-11-23T15:53:46Z Author&#160;Herrmann, Debra S.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031423">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>