Search Results for Solutions. - Narrowed by: Computer networks -- Security measures.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSolutions.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list
2024-08-11T22:20:29Z
Nokia network security solutions handbook
ent://SD_ILS/0/SD_ILS:254004
2024-08-11T22:20:29Z
2024-08-11T22:20:29Z
Author Maxwell, Doug.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836708">http://www.sciencedirect.com/science/book/9781931836708</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed web applications web application security secrets and solutions
ent://SD_ILS/0/SD_ILS:293277
2024-08-11T22:20:29Z
2024-08-11T22:20:29Z
Author Scambray, Joel. Liu, Vincent. Sima, Caleb.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-web-applications-3e">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed malware & rootkits malware & rootkits security secrets & solutions
ent://SD_ILS/0/SD_ILS:293397
2024-08-11T22:20:29Z
2024-08-11T22:20:29Z
Author Davis, Michael A. Bodmer, Sean. LeMasters, Aaron.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-malware-rootkits">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed Web 2.0 Web 2.0 security secrets and solutions
ent://SD_ILS/0/SD_ILS:293352
2024-08-11T22:20:29Z
2024-08-11T22:20:29Z
Author Cannings, Rich. Dwivedi, Himanshu. Lackey, Zane.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-web-20-security-secrets-solutions">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed Linux Linux security secrets and solutions.
ent://SD_ILS/0/SD_ILS:293324
2024-08-11T22:20:29Z
2024-08-11T22:20:29Z
Author Hatch, Brian. Hacking Linux exposed. ISECOM (Organization)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-linux">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Innovations and Interdisciplinary Solutions for Underserved Areas Third EAI International Conference, InterSol 2019, Cairo, Egypt, February 14–15, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:484846
2024-08-11T22:20:29Z
2024-08-11T22:20:29Z
Author Bassioni, Ghada. editor. Kebe, Cheikh M.F. editor. Gueye, Assane. editor. (orcid)0000-0001-6469-4716 Ndiaye, Ababacar. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-34863-2">https://doi.org/10.1007/978-3-030-34863-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Policy-based network management solutions for the next generation
ent://SD_ILS/0/SD_ILS:253918
2024-08-11T22:20:29Z
2024-08-11T22:20:29Z
Author Strassner, John C.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558608597">http://www.sciencedirect.com/science/book/9781558608597</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
ISA server and beyond real world security solutions for Microsoft enterprise networks
ent://SD_ILS/0/SD_ILS:254053
2024-08-11T22:20:29Z
2024-08-11T22:20:29Z
Author Shinder, Thomas W. Grasdal, Martin. Shinder, Debra Littlejohn.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836661">http://www.sciencedirect.com/science/book/9781931836661</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber threat! : how to manage the growing risk of cyber attacks
ent://SD_ILS/0/SD_ILS:342020
2024-08-11T22:20:29Z
2024-08-11T22:20:29Z
Author Ulsch, N. MacDonnell, 1951-<br/>Preferred Shelf Number ONLINE(342020.1)<br/>Electronic Access ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a>
MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a>
Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>