Search Results for Security Measures. - Narrowed by: 2014SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity$002bMeasures.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092014$0025092014$0026te$003dILS$0026ps$003d300$0026isd$003dtrue?dt=list2024-12-23T12:30:27ZMeasures and metrics in corporate securityent://SD_ILS/0/SD_ILS:3559522024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Campbell, George, 1942- author.<br/>Preferred Shelf Number ONLINE(355952.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128006887">http://www.sciencedirect.com/science/book/9780128006887</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Securing VoIP : keeping your VoIP network safeent://SD_ILS/0/SD_ILS:3554172024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Bates, Regis J. author.<br/>Preferred Shelf Number ONLINE(355417.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170391">http://www.sciencedirect.com/science/book/9780124170391</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and privacy in smart gridsent://SD_ILS/0/SD_ILS:2863172024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Xiao, Yang, 1966-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439877845">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Conflict and cooperation in cyberspace : the challenge to national securityent://SD_ILS/0/SD_ILS:2863322024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Yannakogeorgos, Panayotis A., editor. Lowther, Adam, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466592025">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network and system securityent://SD_ILS/0/SD_ILS:3066902024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Vacca, John R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166899">http://www.sciencedirect.com/science/book/9780124166899</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Managing information securityent://SD_ILS/0/SD_ILS:3066922024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Vacca, John R.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166882">http://www.sciencedirect.com/science/book/9780124166882</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Total information risk management maximizing the value of data and information assetsent://SD_ILS/0/SD_ILS:3066932024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Borek, Alexander.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124055476">http://www.sciencedirect.com/science/book/9780124055476</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Business continuity and disaster recovery planning for IT professionalsent://SD_ILS/0/SD_ILS:3066952024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Snedaker, Susan. Rima, Chris.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124105263">http://www.sciencedirect.com/science/book/9780124105263</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking Interfaceent://SD_ILS/0/SD_ILS:3178472024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Elbahadır, Hamza.<br/>Preferred Shelf Number QA 76.9 A25 E43 2014<br/>Format: Books<br/>Availability Beytepe Library~2<br/>Resource optimization and security for cloud servicesent://SD_ILS/0/SD_ILS:3419792024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Xiong, Kaiqi, author.<br/>Preferred Shelf Number ONLINE(341979.1)<br/>Electronic Access MyiLibrary <a href="http://www.myilibrary.com?id=578586">http://www.myilibrary.com?id=578586</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118898598">http://dx.doi.org/10.1002/9781118898598</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybercrime and cyberwarfareent://SD_ILS/0/SD_ILS:3419802024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Bernik, Igor, author.<br/>Preferred Shelf Number ONLINE(341980.1)<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9781118898604">http://dx.doi.org/10.1002/9781118898604</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity for executives : a practical guideent://SD_ILS/0/SD_ILS:3419972024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Touhill, Gregory J., author. Touhill, C. J., 1938- author.<br/>Preferred Shelf Number ONLINE(341997.1)<br/>Electronic Access Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1707094">http://public.eblib.com/choice/publicfullrecord.aspx?p=1707094</a>
ebrary <a href="http://site.ebrary.com/id/10879737">http://site.ebrary.com/id/10879737</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118908785">http://dx.doi.org/10.1002/9781118908785</a>
MyiLibrary <a href="http://www.myilibrary.com?id=621896">http://www.myilibrary.com?id=621896</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/?fpi=9781118908808">http://proquest.safaribooksonline.com/?fpi=9781118908808</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber threat! : how to manage the growing risk of cyber attacksent://SD_ILS/0/SD_ILS:3420202024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Ulsch, N. MacDonnell, 1951-<br/>Preferred Shelf Number ONLINE(342020.1)<br/>Electronic Access ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a>
MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a>
Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Bank fraud : using technology to combat lossesent://SD_ILS/0/SD_ILS:3419422024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Subramanian, Revathi, author.<br/>Preferred Shelf Number ONLINE(341942.1)<br/>Electronic Access Bloomberg Law <a href="https://www.bloomberglaw.com/browser/105.491080">https://www.bloomberglaw.com/browser/105.491080</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=63460">http://www.books24x7.com/marc.asp?bookid=63460</a>
Cover image <a href="http://catalogimages.wiley.com/images/db/jimages/9780470494394.jpg">http://catalogimages.wiley.com/images/db/jimages/9780470494394.jpg</a>
Cover <a href="http://swbplus.bsz-bw.de/bsz405667086cov.htm">http://swbplus.bsz-bw.de/bsz405667086cov.htm</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=836562">http://public.eblib.com/choice/publicfullrecord.aspx?p=836562</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Chinese cybersecurity and cyberdefenseent://SD_ILS/0/SD_ILS:3421552024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Ventre, Daniel.<br/>Preferred Shelf Number ONLINE(342155.1)<br/>Electronic Access Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1765106">http://public.eblib.com/choice/publicfullrecord.aspx?p=1765106</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781119009009">http://dx.doi.org/10.1002/9781119009009</a>
MyiLibrary <a href="http://www.myilibrary.com?id=637332">http://www.myilibrary.com?id=637332</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network Securityent://SD_ILS/0/SD_ILS:3421682024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Perez, Andre.<br/>Preferred Shelf Number ONLINE(342168.1)<br/>Electronic Access ebrary <a href="http://site.ebrary.com/lib/alltitles/docDetail.action?docID=10945002">http://site.ebrary.com/lib/alltitles/docDetail.action?docID=10945002</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781119043942">http://dx.doi.org/10.1002/9781119043942</a>
MyiLibrary <a href="http://www.myilibrary.com?id=647917">http://www.myilibrary.com?id=647917</a>
Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{D8CDF404-6689-4759-9C8F-A065220E7032}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{D8CDF404-6689-4759-9C8F-A065220E7032}Img100.jpg</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Industrial espionage : developing a counterespionage programent://SD_ILS/0/SD_ILS:3425882024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Benny, Daniel J., author.<br/>Preferred Shelf Number ONLINE(342588.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466568150">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Developing and securing the cloudent://SD_ILS/0/SD_ILS:3426312024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Thuraisingham, Bhavani M., author.<br/>Preferred Shelf Number ONLINE(342631.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439862926">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security management a critical thinking approachent://SD_ILS/0/SD_ILS:3428452024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Land, Michael (Industrial engineer), author. Ricks, Truett A., author. Ricks, Bob, author.<br/>Preferred Shelf Number ONLINE(342845.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466561786">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Software test attacks to break mobile and embedded devicesent://SD_ILS/0/SD_ILS:3428682024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Hagar, Jon Duncan, author.<br/>Preferred Shelf Number ONLINE(342868.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466575318">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>What every engineer should know about cyber security and digital forensicsent://SD_ILS/0/SD_ILS:3428862024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor DeFranco, Joanna F., author.<br/>Preferred Shelf Number ONLINE(342886.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466564541">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Physical layer security in wireless communicationsent://SD_ILS/0/SD_ILS:3428872024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Zhou, Xiangyun Sean, editor. Song, Lingyang, editor. Zhang, Yan, 1977- editor.<br/>Preferred Shelf Number ONLINE(342887.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466567016">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network security essentials : applications and standardsent://SD_ILS/0/SD_ILS:3542322024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Stallings, William.<br/>Preferred Shelf Number TK5105.59 S725 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Data analysis for network cyber-securityent://SD_ILS/0/SD_ILS:3547572024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Adams, Niall M., 1968- Heard, Nicholas.<br/>Preferred Shelf Number TK5105.59 D375 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Secure Messaging on the Internetent://SD_ILS/0/SD_ILS:3549372024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Oppliger, Rolf.<br/>Preferred Shelf Number TK5105.73 O67 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA , and other industrial control systemsent://SD_ILS/0/SD_ILS:3553522024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Knapp, Eric D. Langill, Joel Thomas.<br/>Preferred Shelf Number ONLINE(355352.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124201149">http://www.sciencedirect.com/science/book/9780124201149</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber reconnaissance, surveillance, and defenseent://SD_ILS/0/SD_ILS:3554502024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Shimonski, Robert.<br/>Preferred Shelf Number ONLINE(355450.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128013083">http://www.sciencedirect.com/science/book/9780128013083</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The basics of digital privacy simple tools to protect your personal information and your identity onlineent://SD_ILS/0/SD_ILS:3561232024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Cherry, Denny. LaRock, Thomas.<br/>Preferred Shelf Number ONLINE(356123.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000113">http://www.sciencedirect.com/science/book/9780128000113</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Intrusion detection in wireless ad-hoc networksent://SD_ILS/0/SD_ILS:3564772024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Chaki, Nabendu, editor. Chaki, Rituparna, editor.<br/>Preferred Shelf Number ONLINE(356477.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466515673">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Anonymous communication networks : protecting privacy on the webent://SD_ILS/0/SD_ILS:3566572024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Peng, Kun, author.<br/>Preferred Shelf Number ONLINE(356657.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439881606">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security without obscurity : a guide to confidentiality, authentication, and integrityent://SD_ILS/0/SD_ILS:3566812024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Stapleton, Jeffrey James, author.<br/>Preferred Shelf Number ONLINE(356681.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466592155">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Data protection for photographers : a guide to storing and protecting your valuable digital assetsent://SD_ILS/0/SD_ILS:3642422024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Corrigan, Patrick H.<br/>Preferred Shelf Number TK7895.M4 C67 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>The deadly life of logistics mapping the violence of global tradeent://SD_ILS/0/SD_ILS:3236192024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Cowen, Deborah. Project Muse.<br/>Preferred Shelf Number ONLINE(323619.1)<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781452943183/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Unmaking the bomb a fissile material approach to nuclear disarmament and nonproliferationent://SD_ILS/0/SD_ILS:3237352024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Feiveson, Harold A. Von Hippel, Frank. Mian, Zia. Glaser, Alexander, 1969- Project Muse.<br/>Preferred Shelf Number ONLINE(323735.1)<br/>Electronic Access <a href="http://muse.jhu.edu/books/9780262319188/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security for multihop wireless networksent://SD_ILS/0/SD_ILS:3569162024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Khan, Shafiullah, editor. Lloret Mauri, Jaime, editor.<br/>Preferred Shelf Number ONLINE(356916.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466578043">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Online security for the business travelerent://SD_ILS/0/SD_ILS:3555752024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Gonzalez, Deborah, author.<br/>Preferred Shelf Number ONLINE(355575.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000694">http://www.sciencedirect.com/science/book/9780128000694</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The handbook for school safety and security : best practices and proceduresent://SD_ILS/0/SD_ILS:3555802024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Fennelly, Lawrence J., 1940- editor. Perry, Marianna A., editor.<br/>Preferred Shelf Number ONLINE(355580.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128005682">http://www.sciencedirect.com/science/book/9780128005682</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security for business professionals how to plan, implement, and manage your company's security programent://SD_ILS/0/SD_ILS:3556032024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Wayland, Bradley A., author.<br/>Preferred Shelf Number ONLINE(355603.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128005651">http://www.sciencedirect.com/science/book/9780128005651</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Building an information security awareness program defending against social engineering and technical threatsent://SD_ILS/0/SD_ILS:3556182024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Gardner, Bill (Bill G.) Thomas, Valerie (Information security consultant)<br/>Preferred Shelf Number ONLINE(355618.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124199675">http://www.sciencedirect.com/science/book/9780124199675</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Personnel protection : residential security, proven practicesent://SD_ILS/0/SD_ILS:3557162024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Miller, Jerome, author. Jones, Radford, author.<br/>Preferred Shelf Number ONLINE(355716.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128009284">http://www.sciencedirect.com/science/book/9780128009284</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Tourism security strategies for effectively managing travel risk and safetyent://SD_ILS/0/SD_ILS:3557362024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Tarlow, Peter E.<br/>Preferred Shelf Number ONLINE(355736.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124115705">http://www.sciencedirect.com/science/book/9780124115705</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:3557702024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Andress, Jason, author.<br/>Preferred Shelf Number ONLINE(355770.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128007440">http://www.sciencedirect.com/science/book/9780128007440</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Collaboration with cloud computing : security, social media, and unified communicationsent://SD_ILS/0/SD_ILS:3558292024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Messier, Ric, author.<br/>Preferred Shelf Number ONLINE(355829.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170407">http://www.sciencedirect.com/science/book/9780124170407</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Targeted cyber attacks : multi-staged attacks driven by exploits and malwareent://SD_ILS/0/SD_ILS:3558532024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Sood, Aditya K., author. Enbody, Richard J., author.<br/>Preferred Shelf Number ONLINE(355853.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128006047">http://www.sciencedirect.com/science/book/9780128006047</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Safeguarding cultural properties : security for museums, libraries, parks, and zoosent://SD_ILS/0/SD_ILS:3558642024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Layne, Stevan P., author.<br/>Preferred Shelf Number ONLINE(355864.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124201125">http://www.sciencedirect.com/science/book/9780124201125</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Workplace security essentials a guide for helping organizations create safe work environmentsent://SD_ILS/0/SD_ILS:3558972024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Smith, Eric N. (Eric Newell), 1967-<br/>Preferred Shelf Number ONLINE(355897.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124165571">http://www.sciencedirect.com/science/book/9780124165571</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The manager's handbook for business securityent://SD_ILS/0/SD_ILS:3559082024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Campbell, George, 1942-<br/>Preferred Shelf Number ONLINE(355908.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000625">http://www.sciencedirect.com/science/book/9780128000625</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Windows forensic analysis toolkit : advanced analysis techniques for Windows 8ent://SD_ILS/0/SD_ILS:3559092024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Carvey, Harlan A., author.<br/>Preferred Shelf Number ONLINE(355909.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124171572">http://www.sciencedirect.com/science/book/9780124171572</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security careers skills, compensation, and career pathsent://SD_ILS/0/SD_ILS:3560432024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Walker, Stephen W. Foushee, James E.<br/>Preferred Shelf Number ONLINE(356043.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128001042">http://www.sciencedirect.com/science/book/9780128001042</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The state of the art in intrusion prevention and detectionent://SD_ILS/0/SD_ILS:3563962024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Pathan, Al-Sakib Khan, editor.<br/>Preferred Shelf Number ONLINE(356396.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781482203523">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>PCI compliance : the definitive guideent://SD_ILS/0/SD_ILS:3564232024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Bhargav, Abhay, author.<br/>Preferred Shelf Number ONLINE(356423.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439887417">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Conducting network penetration and espionage in a global environmentent://SD_ILS/0/SD_ILS:3565162024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Middleton, Bruce, 1953- author.<br/>Preferred Shelf Number ONLINE(356516.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781482206487">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The frugal CISO : using innovation and smart approaches to maximize your security postureent://SD_ILS/0/SD_ILS:3566242024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Anderson, Kerry Ann, author.<br/>Preferred Shelf Number ONLINE(356624.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781482220087">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security for service oriented architecturesent://SD_ILS/0/SD_ILS:3565562024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Williams, Walter (Telecommunications engineer), author.<br/>Preferred Shelf Number ONLINE(356556.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466584044">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cryptography and network security : principles and practiceent://SD_ILS/0/SD_ILS:3712882024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Stallings, William.<br/>Preferred Shelf Number TK5105.59 S713 2014<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Distributed networks : intelligence, security, and applicationsent://SD_ILS/0/SD_ILS:2854082024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Memon, Qurban Ali, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466559585">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network anomaly detection : a machine learning perspectiveent://SD_ILS/0/SD_ILS:2854132024-12-23T12:30:27Z2024-12-23T12:30:27ZAuthor Bhattacharyya, Dhruba K., author. Kalita, Jugal Kumar, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466582095">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>