Arama Sonuçları Alder, Raven.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dAlder$00252C$002bRaven.$0026ic$003dtrue$0026ps$003d300?dt=list2024-11-23T01:07:57ZHow to cheat at configuring Open Source security toolsent://SD_ILS/0/SD_ILS:1455782024-11-23T01:07:57Z2024-11-23T01:07:57ZYazar Alder, Raven.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491709">http://www.sciencedirect.com/science/book/9781597491709</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>How to cheat at configuring Open Source security toolsent://SD_ILS/0/SD_ILS:1121022024-11-23T01:07:57Z2024-11-23T01:07:57ZYazar Alder, Raven.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491709">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Stealing the network how to own an identityent://SD_ILS/0/SD_ILS:2536632024-11-23T01:07:57Z2024-11-23T01:07:57ZYazar Alder, Raven. Mullen, Timothy M. Long, Johnny.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490061">http://www.sciencedirect.com/science/book/9781597490061</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Snort 2.1 intrusion detectionent://SD_ILS/0/SD_ILS:2539892024-11-23T01:07:57Z2024-11-23T01:07:57ZYazar Beale, Jay. Alder, Raven.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836043">http://www.sciencedirect.com/science/book/9781931836043</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>