Search Results for Security Systems. - Narrowed by: Computer hackers.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity$002bSystems.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bhackers.$002509Computer$002bhackers.$0026te$003dILS$0026ps$003d300?
2025-01-10T04:38:44Z
Hacker techniques, tools, and incident handling
ent://SD_ILS/0/SD_ILS:271438
2025-01-10T04:38:44Z
2025-01-10T04:38:44Z
Author Oriyano, Sean-Philip. Gregg, Michael (Michael C.)<br/>Preferred Shelf Number TK5105.59 O786 2011<br/>Format: Books<br/>Availability Beytepe Library~1<br/>
Honeypot a new paradigm to information security
ent://SD_ILS/0/SD_ILS:288961
2025-01-10T04:38:44Z
2025-01-10T04:38:44Z
Author Joshi, R. C. Sardana, Anjali.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439869994">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed wireless wireless security secrets & solutions
ent://SD_ILS/0/SD_ILS:293300
2025-01-10T04:38:44Z
2025-01-10T04:38:44Z
Author Cache, Johnny. Wright, Joshua. Liu, Vincent.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-wireless-second-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mobile malware attacks and defense
ent://SD_ILS/0/SD_ILS:146413
2025-01-10T04:38:44Z
2025-01-10T04:38:44Z
Author Dunham, Ken.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492980">http://www.sciencedirect.com/science/book/9781597492980</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>