Arama Sonuçları Security Measures - Daraltılmış: 2005SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dSecurity$002bMeasures$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092005$0025092005$0026ps$003d300?dt=list2024-11-29T05:25:33ZCisco PIX firewalls configure, manage, & troubleshootent://SD_ILS/0/SD_ILS:2536672024-11-29T05:25:33Z2024-11-29T05:25:33ZYazar Behrens, Thorsten. Riley, Charles. Khan, Umer.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490047">http://www.sciencedirect.com/science/book/9781597490047</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Aggressive network self-defenseent://SD_ILS/0/SD_ILS:2536722024-11-29T05:25:33Z2024-11-29T05:25:33ZYazar Wyler, Neil R.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">http://www.sciencedirect.com/science/book/9781931836203</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>IM, instant messaging, securityent://SD_ILS/0/SD_ILS:2537252024-11-29T05:25:33Z2024-11-29T05:25:33ZYazar Rittinghouse, John W. Ransome, James F.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583385">http://www.sciencedirect.com/science/book/9781555583385</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Host integrity monitoring using Osiris and Samhainent://SD_ILS/0/SD_ILS:2539402024-11-29T05:25:33Z2024-11-29T05:25:33ZYazar Wotring, Brian. Potter, Bruce. Ranum, Marcus J.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490184">http://www.sciencedirect.com/science/book/9781597490184</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Nessus, Snort, & Ethereal power tools customizing open source security applicationsent://SD_ILS/0/SD_ILS:2539422024-11-29T05:25:33Z2024-11-29T05:25:33ZYazar Archibald, Neil. Ramirez, Gilbert, 1972- Rathaus, Noam. Syngress Media, Inc.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490207">http://www.sciencedirect.com/science/book/9781597490207</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Configuring Check Point NGX VPN-1/fire wall-ent://SD_ILS/0/SD_ILS:2539432024-11-29T05:25:33Z2024-11-29T05:25:33ZYazar Stephens, Robert. Stiefel, Barry J. Watkins, Stephen (Information security professional)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490313">http://www.sciencedirect.com/science/book/9781597490313</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Network security evaluation using the NSA IEMent://SD_ILS/0/SD_ILS:2539452024-11-29T05:25:33Z2024-11-29T05:25:33ZYazar Rogers, Russ. Cunningham, Bryan.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490351">http://www.sciencedirect.com/science/book/9781597490351</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hacking a terror network the silent threat of covert channelsent://SD_ILS/0/SD_ILS:2539872024-11-29T05:25:33Z2024-11-29T05:25:33ZYazar Rogers, Russ.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994985">http://www.sciencedirect.com/science/book/9781928994985</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Network security a practical approachent://SD_ILS/0/SD_ILS:2537072024-11-29T05:25:33Z2024-11-29T05:25:33ZYazar Harrington, Jan L.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123116338">http://www.sciencedirect.com/science/book/9780123116338</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>VoIP securityent://SD_ILS/0/SD_ILS:2537152024-11-29T05:25:33Z2024-11-29T05:25:33ZYazar Ransome, James F. Rittinghouse, John W.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583323">http://www.sciencedirect.com/science/book/9781555583323</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Physical security for ITent://SD_ILS/0/SD_ILS:2538552024-11-29T05:25:33Z2024-11-29T05:25:33ZYazar Erbschloe, Michael, 1951-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583279">http://www.sciencedirect.com/science/book/9781555583279</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Business continuity and disaster recovery for infosec managersent://SD_ILS/0/SD_ILS:2538622024-11-29T05:25:33Z2024-11-29T05:25:33ZYazar Rittinghouse, John W. Ransome, James F.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583392">http://www.sciencedirect.com/science/book/9781555583392</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Intrusion prevention and active response deploying network and host IPSent://SD_ILS/0/SD_ILS:2540172024-11-29T05:25:33Z2024-11-29T05:25:33ZYazar Rash, Michael (Michael Brandon)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266474">http://www.sciencedirect.com/science/book/9781932266474</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Black Hat physical device security exploiting hardware and softwareent://SD_ILS/0/SD_ILS:2540252024-11-29T05:25:33Z2024-11-29T05:25:33ZYazar Miller, Drew, 1978-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266818">http://www.sciencedirect.com/science/book/9781932266818</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Bulletproof wireless security GSM, UMTS, 802.11 and ad hoc securityent://SD_ILS/0/SD_ILS:2547222024-11-29T05:25:33Z2024-11-29T05:25:33ZYazar Chandra, Praphul.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750677462">http://www.sciencedirect.com/science/book/9780750677462</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Multimedia security handbookent://SD_ILS/0/SD_ILS:2867602024-11-29T05:25:33Z2024-11-29T05:25:33ZYazar Furht, Borivoje. Kirovski, Darko.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420038262">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>A practical guide to security assessmentsent://SD_ILS/0/SD_ILS:2883062024-11-29T05:25:33Z2024-11-29T05:25:33ZYazar Kairab, Sudhanshu.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203507230">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The ethical hack a framework for business value penetration testingent://SD_ILS/0/SD_ILS:2883102024-11-29T05:25:33Z2024-11-29T05:25:33ZYazar Tiller, James S.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203495414">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>AAA and network security for mobile access radius, diameter, EAP, PKI, and IP mobilityent://SD_ILS/0/SD_ILS:2957292024-11-29T05:25:33Z2024-11-29T05:25:33ZYazar Nakhjiri, Madjid. Nakhjiri, Mahsa.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/0470017465">http://dx.doi.org/10.1002/0470017465</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Scalable and secure internet services and architectureent://SD_ILS/0/SD_ILS:2857962024-11-29T05:25:33Z2024-11-29T05:25:33ZYazar Xu, Chengzhong.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420035209">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security risk analysisent://SD_ILS/0/SD_ILS:2847642024-11-29T05:25:33Z2024-11-29T05:25:33ZYazar Peltier, Thomas R.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420031195">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Error correcting coding and security for data networks analysis of the superchannel conceptent://SD_ILS/0/SD_ILS:3011472024-11-29T05:25:33Z2024-11-29T05:25:33ZYazar Kabatiansky, G. Krouk, E. Semenov, S. John Wiley & Sons.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/0470867574">http://dx.doi.org/10.1002/0470867574</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Acing the security+ certification exament://SD_ILS/0/SD_ILS:3134922024-11-29T05:25:33Z2024-11-29T05:25:33ZYazar Regan, Patrick E.<br/>Yer Numarası QA76.3 R455 2005<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Network security technologiesent://SD_ILS/0/SD_ILS:2900772024-11-29T05:25:33Z2024-11-29T05:25:33ZYazar Fung, K. T. (Kwok T.)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203330708">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cryptography, information theory, and error-correction a handbook for the 21st centuryent://SD_ILS/0/SD_ILS:3018602024-11-29T05:25:33Z2024-11-29T05:25:33ZYazar Bruen, Aiden A., 1941- Forcinito, Mario, 1962- Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118033296">An electronic book accessible through the World Wide Web; click for information</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html">http://catdir.loc.gov/catdir/enhancements/fy0618/2004058044-b.html</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Disruptive security technologies with mobile code and peer-to-peer networksent://SD_ILS/0/SD_ILS:2913052024-11-29T05:25:33Z2024-11-29T05:25:33ZYazar Brooks, R. R. (Richard R.)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420038880">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>TCP / IP ve ağ güvenliği : teori ve uygulamalar ileent://SD_ILS/0/SD_ILS:1128132024-11-29T05:25:33Z2024-11-29T05:25:33ZYazar Dirican, Can Okan.<br/>Yer Numarası TK 5105.55 D5753 2005<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>