Arama Sonuçları Computers -- Access control.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputers$002b--$002bAccess$002bcontrol.$0026ic$003dtrue$0026ps$003d300?dt=list2024-11-22T11:01:51ZPenetration tester's open source toolkitent://SD_ILS/0/SD_ILS:4591142024-11-22T11:01:51Z2024-11-22T11:01:51ZYazar Faircloth, Jeremy, author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128021491">http://www.sciencedirect.com/science/book/9780128021491</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Practical deployment of Cisco Identity Services Engine (ISE) : real-world examples of AAA deploymentsent://SD_ILS/0/SD_ILS:4586992024-11-22T11:01:51Z2024-11-22T11:01:51ZYazar Richter, Andy, author. Wood, Jeremy, author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128044575">https://www.sciencedirect.com/science/book/9780128044575</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The state of the art in intrusion prevention and detectionent://SD_ILS/0/SD_ILS:3563962024-11-22T11:01:51Z2024-11-22T11:01:51ZYazar Pathan, Al-Sakib Khan, editor.<br/>Yer Numarası ONLINE(356396.1)<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781482203523">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The basics of digital privacy simple tools to protect your personal information and your identity onlineent://SD_ILS/0/SD_ILS:3561232024-11-22T11:01:51Z2024-11-22T11:01:51ZYazar Cherry, Denny. LaRock, Thomas.<br/>Yer Numarası ONLINE(356123.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128000113">http://www.sciencedirect.com/science/book/9780128000113</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Instant penetration testing setting up a test lab how-to : set up your own penetration testing lab using practical and precise recipesent://SD_ILS/0/SD_ILS:3130442024-11-22T11:01:51Z2024-11-22T11:01:51ZYazar Fadyushin, Vyacheslav.<br/>Yer Numarası ONLINE(313044.1)<br/>Elektronik Erişim Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpIPTSUTL3">http://app.knovel.com/web/toc.v/cid:kpIPTSUTL3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Federated identity primerent://SD_ILS/0/SD_ILS:3064612024-11-22T11:01:51Z2024-11-22T11:01:51ZYazar Rountree, Derrick.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124071896">http://www.sciencedirect.com/science/book/9780124071896</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Official (ISC)[superscript 2] guide to the CAP CBKent://SD_ILS/0/SD_ILS:2880562024-11-22T11:01:51Z2024-11-22T11:01:51ZYazar Howard, Patrick D.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439820766">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Access contested security, identity, and resistance in Asian cyberspace information revolution and global politicsent://SD_ILS/0/SD_ILS:2475422024-11-22T11:01:51Z2024-11-22T11:01:51ZYazar Deibert, Ronald. Project Muse.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://muse.jhu.edu/books/9780262298919/">Full text available: </a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:1482252024-11-22T11:01:51Z2024-11-22T11:01:51ZYazar Faircloth, Jeremy.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496278">http://www.sciencedirect.com/science/book/9781597496278</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Readings and cases in information security : law and ethicsent://SD_ILS/0/SD_ILS:2677432024-11-22T11:01:51Z2024-11-22T11:01:51ZYazar Whitman, Michael E. Mattord, Herbert J.<br/>Yer Numarası TK5105.878 W54 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Access control, authentication, and public key infrastructureent://SD_ILS/0/SD_ILS:2712432024-11-22T11:01:51Z2024-11-22T11:01:51ZYazar Ballad, Bill. Ballad, Tricia. Banks, Erin K.<br/>Yer Numarası TK5105.59 B353 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Security information and event management (SIEM) implementationent://SD_ILS/0/SD_ILS:2932792024-11-22T11:01:51Z2024-11-22T11:01:51ZYazar Miller, David, 1959 Nov. 5- Harris, Shon. Harper, Allen. VanDyke, Stephen. Blask, Chris.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/security-information-event-management-siem-implementation">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Applied Oracle security developing secure database and middleware environmentsent://SD_ILS/0/SD_ILS:2933762024-11-22T11:01:51Z2024-11-22T11:01:51ZYazar Knox, David (David C.) Gaetjen, Scott. Jahangir, Hamza. Muth, Tyler. Sack, Patrick.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/applied-oracle-security-developing-secure-database-middleware-environments">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Adaptive security management architectureent://SD_ILS/0/SD_ILS:2884512024-11-22T11:01:51Z2024-11-22T11:01:51ZYazar Tiller, James S.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420013375">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Designing an IAM framework with Oracle identity and access management suiteent://SD_ILS/0/SD_ILS:2932892024-11-22T11:01:51Z2024-11-22T11:01:51ZYazar Scheidel, Jeff.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/designing-iam-framework-oracle-identity-access-management-suite">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>24 deadly sins of software security programming flaws and how to fix thement://SD_ILS/0/SD_ILS:2933192024-11-22T11:01:51Z2024-11-22T11:01:51ZYazar Howard, Michael, 1965- LeBlanc, David, 1960- Viega, John.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/24-deadly-sins-software-security-programming-flaws-how-to-fix-them">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hacking exposed Linux Linux security secrets and solutions.ent://SD_ILS/0/SD_ILS:2933242024-11-22T11:01:51Z2024-11-22T11:01:51ZYazar Hatch, Brian. Hacking Linux exposed. ISECOM (Organization)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/hacking-exposed-linux">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hacking exposed malware & rootkits malware & rootkits security secrets & solutionsent://SD_ILS/0/SD_ILS:2933972024-11-22T11:01:51Z2024-11-22T11:01:51ZYazar Davis, Michael A. Bodmer, Sean. LeMasters, Aaron.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/hacking-exposed-malware-rootkits">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hacking exposed Windows Windows security secrets & solutionsent://SD_ILS/0/SD_ILS:2933412024-11-22T11:01:51Z2024-11-22T11:01:51ZYazar Scambray, Joel. McClure, Stuart.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/hacking-exposed-windows-microsoft-security-secrets-solutions-third-edition">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>MySQL database usage & administrationent://SD_ILS/0/SD_ILS:2933612024-11-22T11:01:51Z2024-11-22T11:01:51ZYazar Vaswani, Vikram.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/mysql-database-usage-administration">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Managed code rootkits hooking into runtime environmentsent://SD_ILS/0/SD_ILS:1478362024-11-22T11:01:51Z2024-11-22T11:01:51ZYazar Metula, Erez.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495745">http://www.sciencedirect.com/science/book/9781597495745</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Infosecurity 2008 threat analysisent://SD_ILS/0/SD_ILS:1455412024-11-22T11:01:51Z2024-11-22T11:01:51ZYazar Clark, Champ, III.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492249">http://www.sciencedirect.com/science/book/9781597492249</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Access denied the practice and policy of global Internet filteringent://SD_ILS/0/SD_ILS:2200202024-11-22T11:01:51Z2024-11-22T11:01:51ZYazar Deibert, Ronald.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6267246">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6267246</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Oracle identity management governance, risk, and compliance architectureent://SD_ILS/0/SD_ILS:2877942024-11-22T11:01:51Z2024-11-22T11:01:51ZYazar Pohlman, Marlin B.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420072488">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>802.1X port-based authenticationent://SD_ILS/0/SD_ILS:2913222024-11-22T11:01:51Z2024-11-22T11:01:51ZYazar Brown, Edwin Lyle.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420044652">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Integrated security systems design concepts, specifications, and implementationent://SD_ILS/0/SD_ILS:1455522024-11-22T11:01:51Z2024-11-22T11:01:51ZYazar Norman, Thomas L.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679091">http://www.sciencedirect.com/science/book/9780750679091</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Integrated security systems design concepts, specifications, and implementationent://SD_ILS/0/SD_ILS:1121752024-11-22T11:01:51Z2024-11-22T11:01:51ZYazar Norman, Thomas, CSC. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679091">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Mechanics of user identification and authentication fundamentals of identity managementent://SD_ILS/0/SD_ILS:2868302024-11-22T11:01:51Z2024-11-22T11:01:51ZYazar Todorov, Dobromir.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420052206">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Essential computer security everyone's guide to e-mail, Internet, and wireless securityent://SD_ILS/0/SD_ILS:1458402024-11-22T11:01:51Z2024-11-22T11:01:51ZYazar Bradley, Tony, 1969- Carvey, Harlan A.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491143">http://www.sciencedirect.com/science/book/9781597491143</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Perfect passwords selection, protection, authenticationent://SD_ILS/0/SD_ILS:2536602024-11-22T11:01:51Z2024-11-22T11:01:51ZYazar Burnett, Mark. Kleiman, Dave.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490412">http://www.sciencedirect.com/science/book/9781597490412</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:2536762024-11-22T11:01:51Z2024-11-22T11:01:51ZYazar Long, Johnny.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490214">http://www.sciencedirect.com/science/book/9781597490214</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Intrusion prevention and active response deploying network and host IPSent://SD_ILS/0/SD_ILS:2540172024-11-22T11:01:51Z2024-11-22T11:01:51ZYazar Rash, Michael (Michael Brandon)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266474">http://www.sciencedirect.com/science/book/9781932266474</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security assessment case studies for implementing the NSA IAMent://SD_ILS/0/SD_ILS:2540302024-11-22T11:01:51Z2024-11-22T11:01:51ZYazar Rogers, Russ.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266962">http://www.sciencedirect.com/science/book/9781932266962</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Proceedings of Sixth ACM Symposium on Access Control Models and Technologies : SACMAT 2001 : Litton-TASC, Westfields II Conference Facility, May 3-4, 2001, Chantilly, Virginia, USAent://SD_ILS/0/SD_ILS:724522024-11-22T11:01:51Z2024-11-22T11:01:51ZYazar ACM Symposium on Access Control Models and Technologies (6th : 2001 : Chantilly, V.A.) Association for Computing Machinery. Special Interest Group on Security, Audit, and Control.<br/>Yer Numarası QA 76.9.A25 A292 2001<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Handbook of applied cryptographyent://SD_ILS/0/SD_ILS:2878892024-11-22T11:01:51Z2024-11-22T11:01:51ZYazar Menezes, A. J. (Alfred J.), 1965- Van Oorschot, Paul C. Vanstone, Scott A.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/ISBN/9781439821916">book distributed by CRC Press. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Handbook of applied cryptographyent://SD_ILS/0/SD_ILS:1095472024-11-22T11:01:51Z2024-11-22T11:01:51ZYazar Menezes, Alfred J. Van Oorschot, Paul C., ort. yaz. Vanstone, Scott A., ort. yaz.<br/>Yer Numarası QA76.9.A25 M46 1997<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>