Arama Sonuçları Computer Security. - Daraltılmış: 2008SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bSecurity.$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092008$0025092008$0026te$003dILS$0026ps$003d300?dt=list2024-12-27T04:11:33ZSequrity for computer networks : an introduction to data security in teleprocessing and electronic funds transferent://SD_ILS/0/SD_ILS:621882024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Davies, Donald Watts, 1924- Price, W. L., ort.yaz.<br/>Yer Numarası TK 5105 D43 1989<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Proceedings of The Ifip Tc 11 23rd International Information Security Conference IFIP 20th World Computer Congress, IFIP SEC’08, September 7-10, 2008, Milano, Italyent://SD_ILS/0/SD_ILS:1647572024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Jajodia, Sushil. editor. Samarati, Pierangela. editor. Cimato, Stelvio. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-09699-5">http://dx.doi.org/10.1007/978-0-387-09699-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>VizSEC 2007 Proceedings of the Workshop on Visualization for Computer Securityent://SD_ILS/0/SD_ILS:1880612024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Goodall, John R. editor. Conti, Gregory. editor. Ma, Kwan-Liu. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-78243-8">http://dx.doi.org/10.1007/978-3-540-78243-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Visualization for Computer Security 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedingsent://SD_ILS/0/SD_ILS:1888152024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Goodall, John R. editor. Conti, Gregory. editor. Ma, Kwan-Liu. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-85933-8">http://dx.doi.org/10.1007/978-3-540-85933-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Security - ESORICS 2008 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedingsent://SD_ILS/0/SD_ILS:1890312024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Jajodia, Sushil. editor. Lopez, Javier. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-88313-5">http://dx.doi.org/10.1007/978-3-540-88313-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computer Safety, Reliability, and Security 27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:1888942024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Harrison, Michael D. editor. Sujan, Mark-Alexander. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-87698-4">http://dx.doi.org/10.1007/978-3-540-87698-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Information and Computer Security Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedingsent://SD_ILS/0/SD_ILS:1892942024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Matsuura, Kanta. editor. Fujisaki, Eiichiro. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-89598-5">http://dx.doi.org/10.1007/978-3-540-89598-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hardware-based computer security techniques to defeat hackers from biometrics to quantum cryptographyent://SD_ILS/0/SD_ILS:2974322024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Dube, Roger. Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://proquest.safaribooksonline.com/?fpi=9780470193396">Available by subscription from Safari Books Online</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470425497">http://dx.doi.org/10.1002/9780470425497</a>
MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=183706&ref=toc">http://www.myilibrary.com?id=183706&ref=toc</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9780470193396">http://proquest.tech.safaribooksonline.de/9780470193396</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information assurance dependability and security in networked systemsent://SD_ILS/0/SD_ILS:1455532024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Qian, Yi, 1962-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123735669">http://www.sciencedirect.com/science/book/9780123735669</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Digital watermarking and steganographyent://SD_ILS/0/SD_ILS:1464742024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Cox, I. J. (Ingemar J.)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123725851">http://www.sciencedirect.com/science/book/9780123725851</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2903202024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Tipton, Harold F. Krause, Micki.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2871232024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Tipton, Harold F. Nozaki, Micki Krause.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439893159">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2891512024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Tipton, Harold F. Krause, Micki.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2907632024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Tipton, Harold F. Nozaki, Micki Krause.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439853467">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Profiling hackers the science of criminal profiling as applied to the world of hackingent://SD_ILS/0/SD_ILS:2914122024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Chiesa, Raoul, 1973- Ducci, Stefania. Ciappi, Silvio, 1965-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420086942">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbookent://SD_ILS/0/SD_ILS:2897342024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Tipton, Harold F. Krause, Micki.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420090956">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>How to achieve 27001 certification an example of applied compliance managementent://SD_ILS/0/SD_ILS:2893962024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Arnason, Sigurjon Thor. Willett, Keith D.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420013139">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Secure computer and network systems modeling, analysis and designent://SD_ILS/0/SD_ILS:2966652024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Ye, Nong. Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0833/2007037133-b.html">http://catdir.loc.gov/catdir/enhancements/fy0833/2007037133-b.html</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470023273">http://dx.doi.org/10.1002/9780470023273</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Kismet hackingent://SD_ILS/0/SD_ILS:1478612024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Haines, Brad. Schearer, Michael J. Thornton, Frank (Thorn)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491174">http://www.sciencedirect.com/science/book/9781597491174</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Malware forensics investigating and analyzing malicious codeent://SD_ILS/0/SD_ILS:1479142024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Aquilina, James M. Casey, Eoghan. Malin, Cameron H.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492683">http://www.sciencedirect.com/science/book/9781597492683</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Google hacking for penetration testers. Volume 2ent://SD_ILS/0/SD_ILS:1480292024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Long, Johnny.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491761">http://www.sciencedirect.com/science/book/9781597491761</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>OS X exploits and defenseent://SD_ILS/0/SD_ILS:1482422024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Baccas, Paul. Finisterre, Kevin.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492546">http://www.sciencedirect.com/science/book/9781597492546</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>SonicWALL secure wireless network integrated solutions guideent://SD_ILS/0/SD_ILS:1485622024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Levy, Joe.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491938">http://www.sciencedirect.com/science/book/9781597491938</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Check Point NGX R65 security administrationent://SD_ILS/0/SD_ILS:1487462024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Bonnell, Ralph.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492454">http://www.sciencedirect.com/science/book/9781597492454</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security and Quality of Service in Ad Hoc Wireless Networksent://SD_ILS/0/SD_ILS:2378012024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Mishra, Amitabh.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1017/CBO9780511619755">Access by subscription</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security software development assessing and managing security risksent://SD_ILS/0/SD_ILS:2860162024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Ashbaugh, Douglas A.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420063813">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Effective leadership skills for the CISOent://SD_ILS/0/SD_ILS:2865552024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Fitzgerald, Todd. Krause, Micki.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780849379444">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management handbook. Vol. 2ent://SD_ILS/0/SD_ILS:2868162024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Tipton, Harold F. Krause, Micki.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420067101">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Digital privacy theory, technologies, and practicesent://SD_ILS/0/SD_ILS:2868242024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Acquisti, Alessandro.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420052183">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Oracle identity management governance, risk, and compliance architectureent://SD_ILS/0/SD_ILS:2877942024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Pohlman, Marlin B.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420072488">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Architecting secure software systemsent://SD_ILS/0/SD_ILS:2887492024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Talukder, Asoke K. Chaitanya, Manish.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420087857">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Building an effective information security policy architectureent://SD_ILS/0/SD_ILS:2905772024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Bacik, Sandy.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420059069">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information assurance architectureent://SD_ILS/0/SD_ILS:2911232024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Willett, Keith D.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780849380686">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Insider computer fraud an in-depth framework for detecting and defending against insider IT attacksent://SD_ILS/0/SD_ILS:2913492024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Brancik, Kenneth C.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420046601">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security in wireless ad hoc and sensor networksent://SD_ILS/0/SD_ILS:2977892024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Çayirci, E. (Erdal) Levi, Albert, 1969- Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9780470516782">http://dx.doi.org/10.1002/9780470516782</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>IPTV security protecting high-value digital contentsent://SD_ILS/0/SD_ILS:3026542024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Ramirez, David. Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9780470727201">http://dx.doi.org/10.1002/9780470727201</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>ICT futures delivering pervasive, real-time and secure servicesent://SD_ILS/0/SD_ILS:3027682024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Warren, Paul (Paul W.) Davies, J. (N. John) Brown, David, 1954- Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9780470758656">http://dx.doi.org/10.1002/9780470758656</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Practical embedded security building secure resource-constrained systemsent://SD_ILS/0/SD_ILS:1474162024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Stapko, Timothy John.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750682152">http://www.sciencedirect.com/science/book/9780750682152</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>OSSEC host-based intrusion detection guideent://SD_ILS/0/SD_ILS:1483332024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Hay, Andrew. Cid, Daniel. Bray, Rory.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492409">http://www.sciencedirect.com/science/book/9781597492409</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>ISA server 2006ent://SD_ILS/0/SD_ILS:1150802024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar İnan, Yüksel. Demirli, Nihat.<br/>Yer Numarası TK5105.59 .I536 2008<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>How to cheat at securing Linuxent://SD_ILS/0/SD_ILS:1455402024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Krishnamurthy Madwachar, Mohan.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492072">http://www.sciencedirect.com/science/book/9781597492072</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Infosecurity 2008 threat analysisent://SD_ILS/0/SD_ILS:1455412024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Clark, Champ, III.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492249">http://www.sciencedirect.com/science/book/9781597492249</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Integrating ISA Server 2006 with Microsoft Exchange 2007ent://SD_ILS/0/SD_ILS:1456282024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Strachan, Fergus.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492751">http://www.sciencedirect.com/science/book/9781597492751</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Netcat power toolsent://SD_ILS/0/SD_ILS:1462772024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Kanclirz, Jan. Baskin, Brian.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492577">http://www.sciencedirect.com/science/book/9781597492577</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>No tech hacking a guide to social engineering, dumpster diving, and shoulder surfingent://SD_ILS/0/SD_ILS:1463622024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Long, Johnny. Mitnick, Kevin D. (Kevin David), 1963-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492157">http://www.sciencedirect.com/science/book/9781597492157</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Microsoft forefront security administration guideent://SD_ILS/0/SD_ILS:1463692024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Varsalone, Jesse.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492447">http://www.sciencedirect.com/science/book/9781597492447</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Network security know it allent://SD_ILS/0/SD_ILS:1464012024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Joshi, James B. D.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123744630">http://www.sciencedirect.com/science/book/9780123744630</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Nmap in the enterprise your guide to network scanningent://SD_ILS/0/SD_ILS:1464422024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Orebaugh, Angela. Pinkard, Becky.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492416">http://www.sciencedirect.com/science/book/9781597492416</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Scene of the cybercrimeent://SD_ILS/0/SD_ILS:1489552024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Cross, Michael, 1965- Shinder, Debra Littlejohn. Scene of the cybercrime.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492768">http://www.sciencedirect.com/science/book/9781597492768</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Securing Windows server 2008 prevent attacks from outside and inside your organization.ent://SD_ILS/0/SD_ILS:1489822024-12-27T04:11:33Z2024-12-27T04:11:33ZYer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492805">http://www.sciencedirect.com/science/book/9781597492805</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Reverse engineering code with IDA Proent://SD_ILS/0/SD_ILS:1490202024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Ferguson, Justin. Kaminsky, Dan.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492379">http://www.sciencedirect.com/science/book/9781597492379</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Securing Citrix XenApp Server in the enterpriseent://SD_ILS/0/SD_ILS:1490502024-12-27T04:11:33Z2024-12-27T04:11:33ZYazar Bin Azad, Tariq. Wilson, Connie. Wright., Michael.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492812">http://www.sciencedirect.com/science/book/9781597492812</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>