Search Results for Security Measures. - Narrowed by: 2007SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity$002bMeasures.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092007$0025092007$0026ps$003d300?dt=list2024-11-27T08:05:30ZNetwork security assessment from vulnerability to patchent://SD_ILS/0/SD_ILS:1463342024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Manzuik, Steve. Gold, André. Gatford, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491013">http://www.sciencedirect.com/science/book/9781597491013</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>AVIEN malware defense guide for the Enterpriseent://SD_ILS/0/SD_ILS:1451832024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Harley, David.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491648">http://www.sciencedirect.com/science/book/9781597491648</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Botnets the killer web appent://SD_ILS/0/SD_ILS:1452832024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Schiller, Craig A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491358">http://www.sciencedirect.com/science/book/9781597491358</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>How to cheat at Voip securityent://SD_ILS/0/SD_ILS:1454862024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Porter, Thomas, PhD. Gough, Michael, 1963-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491693">http://www.sciencedirect.com/science/book/9781597491693</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Secure roaming in 802.11 networksent://SD_ILS/0/SD_ILS:1489702024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Goransson, Paul. Greenlaw, Raymond.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750682114">http://www.sciencedirect.com/science/book/9780750682114</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Asterisk hackingent://SD_ILS/0/SD_ILS:1453552024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Brashars, Joshua.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491518">http://www.sciencedirect.com/science/book/9781597491518</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Integrated security systems design concepts, specifications, and implementationent://SD_ILS/0/SD_ILS:1455522024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Norman, Thomas L.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679091">http://www.sciencedirect.com/science/book/9780750679091</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>How to cheat at configuring Open Source security toolsent://SD_ILS/0/SD_ILS:1455782024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Alder, Raven.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491709">http://www.sciencedirect.com/science/book/9781597491709</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>How to cheat at securing your networkent://SD_ILS/0/SD_ILS:1456542024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Dubrawsky, Ido.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492317">http://www.sciencedirect.com/science/book/9781597492317</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Developer's guide to web application securityent://SD_ILS/0/SD_ILS:1476642024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Cross, Michael, 1965-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>PCI compliance implementing effective PCI data security standardsent://SD_ILS/0/SD_ILS:1481952024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Bradley, Tony, 1969-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491655">http://www.sciencedirect.com/science/book/9781597491655</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Optimizing and testing WLANs proven techniques for maximum performanceent://SD_ILS/0/SD_ILS:1482702024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Alexander, Tom.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679862">http://www.sciencedirect.com/science/book/9780750679862</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Snort IDS and IPS toolkitent://SD_ILS/0/SD_ILS:1484442024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Beale, Jay. Baker, Andrew R. Esler, Joel. Northcutt, Stephen. Kohlenberg, Toby.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490993">http://www.sciencedirect.com/science/book/9781597490993</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Techno security's guide to e-discovery and digital forensicsent://SD_ILS/0/SD_ILS:1485642024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Wiles, Jack.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492232">http://www.sciencedirect.com/science/book/9781597492232</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Techno Security's guide to managing risks for IT managers, auditors, and investigatorsent://SD_ILS/0/SD_ILS:1486412024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Wiles, Jack.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">http://www.sciencedirect.com/science/book/9781597491389</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Strategic security management a risk assessment guide for decision makersent://SD_ILS/0/SD_ILS:1486612024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Vellani, Karim H., 1971-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123708977">http://www.sciencedirect.com/science/book/9780123708977</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security convergence managing enterprise security riskent://SD_ILS/0/SD_ILS:1490802024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Tyson, Dave.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Volltext <a href="http://www.sciencedirect.com/science/book/9780750684255">http://www.sciencedirect.com/science/book/9780750684255</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security+ study guide & DVD training systement://SD_ILS/0/SD_ILS:1490892024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Cross, Michael, 1965-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491532">http://www.sciencedirect.com/science/book/9781597491532</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Mechanics of user identification and authentication fundamentals of identity managementent://SD_ILS/0/SD_ILS:2868302024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Todorov, Dobromir.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420052206">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wireless security and cryptography specifications and implementationsent://SD_ILS/0/SD_ILS:2875042024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Sklavos, Nicolas. Zhang, Xinmiao.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780849387692">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Resource, mobility, and security management in wireless networks and mobile communicationsent://SD_ILS/0/SD_ILS:2875252024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Zhang, Yan, 1977- Hu, Honglin, 1975- Fujise, Masayuki, 1950-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420013610">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security design, implementation, measurement, and complianceent://SD_ILS/0/SD_ILS:2884902024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Layton, Timothy P.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420013412">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Official (ISC)2 guide to the SSCP CBKent://SD_ILS/0/SD_ILS:2900782024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Contesti, Diana-Lynn.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203331576">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wireless crime and forensic investigationent://SD_ILS/0/SD_ILS:2903282024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Kipper, Gregory.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420013016">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>802.1X port-based authenticationent://SD_ILS/0/SD_ILS:2913222024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Brown, Edwin Lyle.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420044652">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security of e-Systems and Computer Networksent://SD_ILS/0/SD_ILS:2360232024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Obaidat, Mohammad. Boudriga, Noureddine.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511536700">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security for wireless ad hoc networksent://SD_ILS/0/SD_ILS:2969292024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Anjum, Farooq. Mouchtaris, Petros.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.contentreserve.com/TitleInfo.asp?ID={0136EB05-68E2-4F6F-8BC3-AC26493326F8}&Format=50">Click for information</a>
<a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=287302">Click here to view book</a>
John Wiley <a href="http://dx.doi.org/10.1002/0470118474">http://dx.doi.org/10.1002/0470118474</a>
MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=82233&ref=toc">http://www.myilibrary.com?id=82233&ref=toc</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security risk assessment and management a professional practice guide for protecting buildings and infrastructuresent://SD_ILS/0/SD_ILS:2970172024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Biringer, Betty E., 1952- Matalucci, Rudolph V. O'Connor, Sharon L. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9780470168110">http://dx.doi.org/10.1002/9780470168110</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Strategies for protecting national critical infrastructure assets a focus on problem-solvingent://SD_ILS/0/SD_ILS:2971062024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Sullivant, John.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0740/2007026434-b.html">http://catdir.loc.gov/catdir/enhancements/fy0740/2007026434-b.html</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470228371">http://dx.doi.org/10.1002/9780470228371</a>
Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpSPNCIAA6">http://app.knovel.com/web/toc.v/cid:kpSPNCIAA6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network security current status and future directionsent://SD_ILS/0/SD_ILS:2495062024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Douligeris, C. (Christos)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5237765">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5237765</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Developer's guide to web application securityent://SD_ILS/0/SD_ILS:3064642024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Cross, Michael, 1965-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Electronic security systems a manager's guide to evaluating and selecting system solutionsent://SD_ILS/0/SD_ILS:3064672024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Pearson, Robert L.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679992">http://www.sciencedirect.com/science/book/9780750679992</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Strategic security management a risk assessment guide for decision makersent://SD_ILS/0/SD_ILS:3064712024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Vellani, Karim H., 1971-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123708977">http://www.sciencedirect.com/science/book/9780123708977</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>How to cheat at securing your networkent://SD_ILS/0/SD_ILS:3065032024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Dubrawsky, Ido.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492317">http://www.sciencedirect.com/science/book/9781597492317</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Electronic security systems a manager's guide to evaluating and selecting system solutionsent://SD_ILS/0/SD_ILS:1464662024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Pearson, Robert L.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679992">http://www.sciencedirect.com/science/book/9780750679992</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>WarDriving & wireless penetration testingent://SD_ILS/0/SD_ILS:1468052024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Hurley, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491112">http://www.sciencedirect.com/science/book/9781597491112</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Web application vulnerabilities detect, exploit, preventent://SD_ILS/0/SD_ILS:1469082024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Cross, Michael, 1965-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492096">http://www.sciencedirect.com/science/book/9781597492096</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>XSS attacks cross-site scripting exploits and defenseent://SD_ILS/0/SD_ILS:1475112024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Grossman, Jeremiah.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491549">http://www.sciencedirect.com/science/book/9781597491549</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Techno security's guide to securing SCADAent://SD_ILS/0/SD_ILS:1484922024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Wiles, Jack.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492829">http://www.sciencedirect.com/science/book/9781597492829</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Configuring Juniper Networks NetScreen & SSG firewallsent://SD_ILS/0/SD_ILS:1488032024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Cameron, Rob. Juniper Networks, Inc.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491181">http://www.sciencedirect.com/science/book/9781597491181</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Power analysis attacks : revealing the secrets of smart cardsent://SD_ILS/0/SD_ILS:1106872024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Mangard, Stefan. Oswald, Elisabeth. Popp, Thomas.<br/>Preferred Shelf Number TK7895.S62 M36 2007<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Integrated security systems design concepts, specifications, and implementationent://SD_ILS/0/SD_ILS:1121752024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Norman, Thomas, CSC. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679091">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network security assessment from vulnerability to patchent://SD_ILS/0/SD_ILS:1121862024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Manzuik, Steve. Gold, André. Gatford, Chris. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491013">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>WarDriving & wireless penetration testingent://SD_ILS/0/SD_ILS:1122102024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Hurley, Chris. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491112">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>How to cheat at configuring Open Source security toolsent://SD_ILS/0/SD_ILS:1121022024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Alder, Raven.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491709">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>How to cheat at Voip securityent://SD_ILS/0/SD_ILS:1121062024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Porter, Thomas, PhD. Gough, Michael. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491693">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Snort IDS and IPS toolkitent://SD_ILS/0/SD_ILS:1121122024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Beale, Jay Baker, Andrew R. Esler, Joel. Northcutt, Stephen. Kohlenberg, Toby.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490993">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security+ study guide & DVD training systement://SD_ILS/0/SD_ILS:1121402024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Cross, Michael, 1965- ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491532">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Configuring Juniper Networks NetScreen & SSG firewallsent://SD_ILS/0/SD_ILS:1121542024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Cameron, Rob. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491181">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>XSS attacks cross-site scripting exploits and defenseent://SD_ILS/0/SD_ILS:1121552024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Grossman, Jeremiah ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491549">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>PCI compliance implementing effective PCI data security standardsent://SD_ILS/0/SD_ILS:1121892024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Bradley, Tony, 1969- ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491655">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information security : contemporary casesent://SD_ILS/0/SD_ILS:1110212024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Wright, Marie A. Kakalik, John S.<br/>Preferred Shelf Number QA76.9.A25 W75 2007<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Secure roaming in 802.11 networksent://SD_ILS/0/SD_ILS:1121962024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Goransson, Paul. Greenlaw, Raymond. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750682114">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security convergence managing enterprise security riskent://SD_ILS/0/SD_ILS:1121982024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Tyson, Dave. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750684255">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Strategic security management a risk assessment guide for decision makersent://SD_ILS/0/SD_ILS:1122012024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Vellani, Karim H., 1971- ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123708977">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Techno Security's guide to managing risks for IT managers, auditors, and investigatorsent://SD_ILS/0/SD_ILS:1122032024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Wiles, Jack. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Complete guide to security and privacy metrics measuring regulatory compliance, operational resilience, and ROIent://SD_ILS/0/SD_ILS:2893602024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Herrmann, Debra S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420013283">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Assessment of the fate and effects of toxic agents on water resources : [proceedings of the NATO Advanced Study Institute on Advanced Modeling Techniques for Rapid Diagnosis and Assessment of CBRN Agents Effects on Water Resources, Istanbul, Turkey, 4-16 December 2005]ent://SD_ILS/0/SD_ILS:4240092024-11-27T08:05:30Z2024-11-27T08:05:30ZAuthor Gönenç, I. Ethem. NATO Advanced Study Institute on Advanced Modeling Techniques for Rapid Diagnosis and Assessment of CBRN Agents Effects on Water Resources (2005 : Istanbul, Turkey)<br/>Preferred Shelf Number TD353 A88 2007<br/>Format: Books<br/>Availability Beytepe Library~1<br/>