Search Results for Security Measures. - Narrowed by: 2011 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity$002bMeasures.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092011$0025092011$0026ps$003d300$0026isd$003dtrue? 2024-09-18T03:11:46Z Our biometric future facial recognition technology and the culture of surveillance ent://SD_ILS/0/SD_ILS:243822 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Gates, Kelly.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780814732793/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Engineering information security the application of systems engineering concepts to achieve information assurance ent://SD_ILS/0/SD_ILS:249916 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Jacobs, Stuart.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Nuclear energy and global governance ensuring safety, security, and non-proliferation ent://SD_ILS/0/SD_ILS:262536 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Findlay, Trevor, 1951-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203834503">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Terrorism and the Olympics major event security and lessons for the future ent://SD_ILS/0/SD_ILS:265369 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Richards, Anthony.&#160;Fussey, Peter.&#160;Silke, Andrew.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203835227">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Auditing IT infrastructures for compliance ent://SD_ILS/0/SD_ILS:271151 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Weiss, Martin M.&#160;Solomon, Michael G.<br/>Preferred Shelf Number&#160;QA76.9.A25 W428 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Guide to physical security planning &amp; response for hospitals, medical, long term care facilities ent://SD_ILS/0/SD_ILS:278636 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Russell, Mary, 1953-&#160;Kendig, Jim.&#160;Philpott, Don, 1946-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=398780">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=398780</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Guidelines for the physical security of water utilities, ANSI/ASCE/EWRI 56-10 Guidelines for the physical security of wastewater/stormwater utilities, ANSI/ASCE/EWRI 57-10 ent://SD_ILS/0/SD_ILS:279319 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;American Society of Civil Engineers.&#160;Environmental and Water Resources Institute (U.S.)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=442510">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=442510</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Blast protection of buildings ent://SD_ILS/0/SD_ILS:279920 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;American Society of Civil Engineers.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=466935">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=466935</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure semantic service-oriented systems ent://SD_ILS/0/SD_ILS:285105 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Thuraisingham, Bhavani M.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420073324">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Java for web application development ent://SD_ILS/0/SD_ILS:285166 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Bhargav, Abhay.&#160;Kumar, B. V. (Balepur Venkatanna), 1959-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439823569">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Retail security and loss prevention solutions ent://SD_ILS/0/SD_ILS:286096 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Greggo, Alan.&#160;Kresevich, Millie.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420090086">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security of self-organizing networks MANET, WSN, WMN, VANET ent://SD_ILS/0/SD_ILS:290708 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Pathan, Al-Sakib Khan.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439819203">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tips and traps for new home owners ent://SD_ILS/0/SD_ILS:293022 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Irwin, Robert, 1941-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/tips-traps-for-new-home-owners">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CNET do-it-yourself home networking projects 24 cool things you didn't know you could do! ent://SD_ILS/0/SD_ILS:293687 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Aspinwall, Jim.&#160;CNET (Firm)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/cnet-doityourself-home-networking-projects">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security strategies in Web applications and social networking ent://SD_ILS/0/SD_ILS:271538 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Harwood, Mike.<br/>Preferred Shelf Number&#160;HM742 H38 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Guide to security considerations and practices for rare book, manuscript, and special collection libraries ent://SD_ILS/0/SD_ILS:280094 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Wilkie, Everett C.&#160;Association of College and Research Libraries.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=480845">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=480845</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security de-engineering solving the problems in information risk management ent://SD_ILS/0/SD_ILS:286209 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Tibble, Ian.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439868355">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Official (ISC)2 guide to the SSCP CBK ent://SD_ILS/0/SD_ILS:286975 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Tipton, Harold F.&#160;International Information Systems Security Certification Consortium.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439804841">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Staying safe at school ent://SD_ILS/0/SD_ILS:287084 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Quarles, Chester L.&#160;Quarles, Tammy.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439858295">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Adaptive security management architecture ent://SD_ILS/0/SD_ILS:288451 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Tiller, James S.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420013375">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security strategy from requirements to reality ent://SD_ILS/0/SD_ILS:288851 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Stackpole, Bill.&#160;Oksendahl, Eric.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439827345">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and policy driven computing ent://SD_ILS/0/SD_ILS:288879 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Liu, Lei, 1968-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439825808">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The security risk assessment handbook a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:288890 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Landoll, Douglas J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439821497">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Casino security and gaming surveillance ent://SD_ILS/0/SD_ILS:288895 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Boss, Derk J.&#160;Zajic, Alan W.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420087833">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Management strategies for the cloud revolution how cloud computing is transforming business and why you can't afford to be left behind ent://SD_ILS/0/SD_ILS:292969 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Babcock, Charles.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/management-strategies-for-cloud-revolution-how-computing-transforming-business-you-cant-afford-to-be-left-behind">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing global transportation networks a total security management approach ent://SD_ILS/0/SD_ILS:293169 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Ritter, Luke.&#160;Barrett, J. Michael.&#160;Wilson, Rosalyn A.&#160;Ridge, Thomas J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/securing-global-transportation-networks">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Architectural security codes and guidelines best practices for today's construction challenges ent://SD_ILS/0/SD_ILS:293173 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Wible, Robert C.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/architectural-security-codes-guidelines">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Construction site security ent://SD_ILS/0/SD_ILS:293203 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Arata, Michael J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/construction-site-security">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Property condition assessments ent://SD_ILS/0/SD_ILS:293206 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Kubba, Shamil A. A.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/property-condition-assessments">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Perimeter security ent://SD_ILS/0/SD_ILS:293213 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Arata, Michael J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/perimeter-security">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Oracle Fusion middleware 11g architecture and management ent://SD_ILS/0/SD_ILS:293252 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Shafii, Reza.&#160;Lee, Stephen, 1975 June 8-&#160;Konduri, Gangadhar.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/oracle-fusion-middleware-11g-architecture-management">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Gray hat hacking the ethical hacker's handbook ent://SD_ILS/0/SD_ILS:293255 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Harris, Shon.&#160;Harper, Allen.&#160;Eagle, Chris.&#160;Ness, Jonathan.&#160;Lenkey, Gideon.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/gray-hat-hacking-ethical-hackers-handbook-3rd-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Microsoft SQL server 2008 R2 master data services implementation &amp; administration ent://SD_ILS/0/SD_ILS:293261 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Graham, Tyler.&#160;Selhorn, Suzanne.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/microsoft-sql-server-2008-r2-master-data-services">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT auditing using controls to protect information assets ent://SD_ILS/0/SD_ILS:293262 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Davis, Chris (Christopher Michael)&#160;Schiller, Mike.&#160;Wheeler, Kevin.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/auditing-using-controls-to-protect-information-assets-2nd-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile application security ent://SD_ILS/0/SD_ILS:293312 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Dwivedi, Himanshu.&#160;Clark, Chris, 1980-&#160;Thiel, David V.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/mobile-application-security">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Networking a beginner's guide ent://SD_ILS/0/SD_ILS:293314 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Hallberg, Bruce A., 1964-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/networking-beginners-guide-fifth-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Oracle WebCenter 11g handbook build rich, customizable enterprise 2.0 applications ent://SD_ILS/0/SD_ILS:293316 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Desbiens, Fr&#65533;ed&#65533;eric.&#160;Moskovits, Peter.&#160;Weckerle, Philipp.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/oracle-webcenter-11g-handbook">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> 24 deadly sins of software security programming flaws and how to fix them ent://SD_ILS/0/SD_ILS:293319 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Howard, Michael, 1965-&#160;LeBlanc, David, 1960-&#160;Viega, John.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/24-deadly-sins-software-security-programming-flaws-how-to-fix-them">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cisco ASA configuration ent://SD_ILS/0/SD_ILS:293322 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Deal, Richard A.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/cisco-asa-configuration">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed Linux Linux security secrets and solutions. ent://SD_ILS/0/SD_ILS:293324 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Hatch, Brian. Hacking Linux exposed.&#160;ISECOM (Organization)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-linux">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fedora 7 &amp; Red Hat Enterprise Linux the complete reference ent://SD_ILS/0/SD_ILS:293328 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Petersen, Richard, 1949-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/fedora-core-7-red-hat-enterprise-linux-complete-reference">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ajax the complete reference ent://SD_ILS/0/SD_ILS:293344 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Powell, Thomas A., 1968-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/ajax-complete-reference">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed Web 2.0 Web 2.0 security secrets and solutions ent://SD_ILS/0/SD_ILS:293352 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Cannings, Rich.&#160;Dwivedi, Himanshu.&#160;Lackey, Zane.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-web-20-security-secrets-solutions">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Oracle Enterprise manager 10g grid control implementation guide ent://SD_ILS/0/SD_ILS:293355 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;New, Michael.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/oracle-enterprise-manager-10g-grid-control-implementation-guide">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Working positively with personality disorder in secure settings a practitioner's perspective ent://SD_ILS/0/SD_ILS:298579 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Willmot, Phil.&#160;Gordon, Neil, 1959-&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9780470973110">An electronic book accessible through the World Wide Web; click for information</a> Wiley InterScience - Full Text Online <a href="http://www.library.uiuc.edu/proxy/go.php?url=http://onlinelibrary.wiley.com/book/10.1002/9780470973110">http://www.library.uiuc.edu/proxy/go.php?url=http://onlinelibrary.wiley.com/book/10.1002/9780470973110</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Risk and Safety Analysis of Nuclear Systems ent://SD_ILS/0/SD_ILS:298891 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Lee, John C., 1941- author.&#160;McCormick, Norman J., 1938- author.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118043462">An electronic book accessible through the World Wide Web; click for information</a> MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=325614&ref=toc">http://www.myilibrary.com?id=325614&ref=toc</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=43276">http://www.books24x7.com/marc.asp?bookid=43276</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10494682">http://site.ebrary.com/lib/alltitles/Doc?id=10494682</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Auditing cloud computing a security and privacy guide ent://SD_ILS/0/SD_ILS:299263 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Halpert, Ben, 1986-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=44303">http://www.books24x7.com/marc.asp?bookid=44303</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118269091">http://dx.doi.org/10.1002/9781118269091</a> OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50</a> OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Implementing SSL/TLS using cryptography and PKI ent://SD_ILS/0/SD_ILS:303838 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Davies, Joshua A. (Joshua Aaron)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255797">An electronic book accessible through the World Wide Web; click for information</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780470920411">Available by subscription from Safari Books Online</a> <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=706899">Click here to view book</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40694">http://www.books24x7.com/marc.asp?bookid=40694</a> Volltext <a href="http://proquest.safaribooksonline.com/9780470920411">http://proquest.safaribooksonline.com/9780470920411</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Thor's Microsoft security bible a collection of practical security techniques ent://SD_ILS/0/SD_ILS:146808 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Mullen, Timothy M.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495721">http://www.sciencedirect.com/science/book/9781597495721</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:148225 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Faircloth, Jeremy.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496278">http://www.sciencedirect.com/science/book/9781597496278</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing the smart grid next generation power grid security ent://SD_ILS/0/SD_ILS:149144 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Flick, Tony.&#160;Morehouse, Justin.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495707">http://www.sciencedirect.com/science/book/9781597495707</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security risk management building an information security risk management program from the ground up ent://SD_ILS/0/SD_ILS:149172 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Wheeler, Evan.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496155">http://www.sciencedirect.com/science/book/9781597496155</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Maritime security and the law of the sea ent://SD_ILS/0/SD_ILS:231006 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Klein, Natalie (Natalie S.)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Oxford scholarship online <a href="http://dx.doi.org/10.1093/acprof:oso/9780199566532.001.0001">http://dx.doi.org/10.1093/acprof:oso/9780199566532.001.0001</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The securitization of migration a study of movement and order ent://SD_ILS/0/SD_ILS:265336 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Bourbeau, Philippe, 1972 Nov. 3-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203829349">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Readings and cases in information security : law and ethics ent://SD_ILS/0/SD_ILS:267743 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Whitman, Michael E.&#160;Mattord, Herbert J.<br/>Preferred Shelf Number&#160;TK5105.878 W54 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Effective security management ent://SD_ILS/0/SD_ILS:269968 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Sennewald, Charles A.<br/>Preferred Shelf Number&#160;HV8290 S46 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Hacker techniques, tools, and incident handling ent://SD_ILS/0/SD_ILS:271438 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Oriyano, Sean-Philip.&#160;Gregg, Michael (Michael C.)<br/>Preferred Shelf Number&#160;TK5105.59 O786 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Network security essentials : applications and standards ent://SD_ILS/0/SD_ILS:271446 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Stallings, William.<br/>Preferred Shelf Number&#160;TK5105.59 S782 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Network security firewalls and VPNs ent://SD_ILS/0/SD_ILS:271452 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Stewart, James Michael.<br/>Preferred Shelf Number&#160;TK5105.59 S758 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Android forensics investigation, analysis, and mobile security for Google Android ent://SD_ILS/0/SD_ILS:145253 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Hoog, Andrew.&#160;McCash, John.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496513">http://www.sciencedirect.com/science/book/9781597496513</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The basics of information security understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:145371 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Andress, Jason.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Windows Registry Forensics Advanced Digital Forensic Analysis of the Windows Registry. ent://SD_ILS/0/SD_ILS:145659 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Carvey, Harlan.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495806">http://www.sciencedirect.com/science/book/9781597495806</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber warfare techniques, tactics and tools for security practitioners ent://SD_ILS/0/SD_ILS:147479 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Andress, Jason.&#160;Winterfeld, Steve.&#160;Rogers, Russ.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496377">http://www.sciencedirect.com/science/book/9781597496377</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Industrial network security securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems ent://SD_ILS/0/SD_ILS:145457 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Knapp, Eric.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496452">http://www.sciencedirect.com/science/book/9781597496452</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ninja hacking unconventional penetration testing tactics and techniques ent://SD_ILS/0/SD_ILS:146263 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Wilhelm, Thomas.&#160;Andress, Jason.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495882">http://www.sciencedirect.com/science/book/9781597495882</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Effective security management ent://SD_ILS/0/SD_ILS:146471 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Sennewald, Charles A., 1931-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123820129">http://www.sciencedirect.com/science/book/9780123820129</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Eleventh hour CISSP study guide ent://SD_ILS/0/SD_ILS:146597 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Conrad, Eric, 1967-&#160;Misenar, Seth.&#160;Feldman, Joshua.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495660">http://www.sciencedirect.com/science/book/9781597495660</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Coding for penetration testers building better tools ent://SD_ILS/0/SD_ILS:148785 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Andress, Jason.&#160;Linn, Ryan.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497299">http://www.sciencedirect.com/science/book/9781597497299</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing the cloud cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:148980 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Winkler, J. R. (Joachim R.)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Essentials of online payment security and fraud prevention ent://SD_ILS/0/SD_ILS:304086 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Montague, David A., 1967-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118386750">An electronic book accessible through the World Wide Web; click for information</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624574">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=624574</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=624574">http://swb.eblib.com/patron/FullRecord.aspx?p=624574</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wars of disruption and resilience cybered conflict, power, and national security ent://SD_ILS/0/SD_ILS:244312 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Demchak, Chris C.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780820341378/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligence and U.S. Foreign Policy : Iraq, 9/11, and Misguided Reform. ent://SD_ILS/0/SD_ILS:375742 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.jstor.org/stable/10.7312/pill15792">http://www.jstor.org/stable/10.7312/pill15792</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Legal issues in information security ent://SD_ILS/0/SD_ILS:365418 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Grama, Joanna Lyn, author.<br/>Preferred Shelf Number&#160;KF1263.C65 G73 2011<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Proactive school security and emergency preparedness planning ent://SD_ILS/0/SD_ILS:369105 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Trump, Kenneth S.<br/>Preferred Shelf Number&#160;ONLINE(369105.1)<br/>Electronic Access&#160;SAGE knowledge <a href="http://sk.sagepub.com/books/proactive-school-security-and-emergency-preparedness-planning">http://sk.sagepub.com/books/proactive-school-security-and-emergency-preparedness-planning</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Next catastrophe : reducing our vulnerabilities to natural, industrial, and terrorist disasters ent://SD_ILS/0/SD_ILS:375287 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Perrow, Charles.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.jstor.org/stable/10.2307/j.ctt7t4c1">http://www.jstor.org/stable/10.2307/j.ctt7t4c1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Energy and security in South Asia : cooperation or conflict? ent://SD_ILS/0/SD_ILS:375731 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Ebinger, Charles K.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.jstor.org/stable/10.7864/j.ctt127x8w">http://www.jstor.org/stable/10.7864/j.ctt127x8w</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:386241 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Kahate, Atul.<br/>Preferred Shelf Number&#160;TK5105.59 K12 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Wireless security ent://SD_ILS/0/SD_ILS:288110 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Osterhage, Wolfgang.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439896266">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Honeypot a new paradigm to information security ent://SD_ILS/0/SD_ILS:288961 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Joshi, R. C.&#160;Sardana, Anjali.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439869994">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical risk management for the CIO ent://SD_ILS/0/SD_ILS:291571 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Scherling, Mark.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439856543">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Master data management and data governance ent://SD_ILS/0/SD_ILS:293267 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Berson, Alex.&#160;Dubov, Lawrence.&#160;Berson, Alex. Master data management and customer data integration for a global enterprise.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/master-data-management-governance-2e">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> iPad &amp; iPhone administrator's guide enterprise deployment strategies and security solutions ent://SD_ILS/0/SD_ILS:293268 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Hart-Davis, Guy.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/ipad-iphone-administrators-guide">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed web applications web application security secrets and solutions ent://SD_ILS/0/SD_ILS:293277 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Scambray, Joel.&#160;Liu, Vincent.&#160;Sima, Caleb.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-web-applications-3e">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security information and event management (SIEM) implementation ent://SD_ILS/0/SD_ILS:293279 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Miller, David, 1959 Nov. 5-&#160;Harris, Shon.&#160;Harper, Allen.&#160;VanDyke, Stephen.&#160;Blask, Chris.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/security-information-event-management-siem-implementation">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Designing an IAM framework with Oracle identity and access management suite ent://SD_ILS/0/SD_ILS:293289 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Scheidel, Jeff.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/designing-iam-framework-oracle-identity-access-management-suite">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT security metrics a practical framework for measuring security &amp; protecting data ent://SD_ILS/0/SD_ILS:293294 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Hayden, Lance.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/security-metrics-practical-framework-for-measuring-protecting-data">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mac OS X system administration ent://SD_ILS/0/SD_ILS:293298 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Hart-Davis, Guy.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/mac-os-x-system-administration">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed wireless wireless security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:293300 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Cache, Johnny.&#160;Wright, Joshua.&#160;Liu, Vincent.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-wireless-second-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless network administration a beginner's guide ent://SD_ILS/0/SD_ILS:293305 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Soyinka, Wale.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/wireless-network-administration-beginners-guide">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Microsoft Windows server 2008 the complete reference ent://SD_ILS/0/SD_ILS:293367 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Ruest, Danielle.&#160;Ruest, Nelson.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/microsoft-windows-server-2008-complete-reference">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Microsoft Windows server 2008 a beginner's guide ent://SD_ILS/0/SD_ILS:293368 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Matthews, Martin S.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/microsoft-windows-server-2008-beginners-guide">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Citrix Access Suite 4 advanced concepts the official guide ent://SD_ILS/0/SD_ILS:293372 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Kaplan, Steve, 1955-&#160;Jones, Andy.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/citrix-access-suite-4-advanced-concepts-official-guide-second-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed malware &amp; rootkits malware &amp; rootkits security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:293397 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Davis, Michael A.&#160;Bodmer, Sean.&#160;LeMasters, Aaron.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-malware-rootkits">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Home networking demystified a self-teaching guide ent://SD_ILS/0/SD_ILS:294143 2024-09-18T03:11:46Z 2024-09-18T03:11:46Z Author&#160;Long, Larry E.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/home-networking-demystified">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>