Logging in...
User ID
:
Password
:
Register
Forgot your PIN?
Forgot my PIN
Enter your username and a recovery link will be emailed to the email address on file at your library.
User ID
:
Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Rooms Restriction Values
All Fields
Title
Author
General Note
Keyword in Author headings
Subject
Keyword in Subject headings
ISBN
Preferred Shelf Number
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
To enable accessibility mode, return to the beginning of the page and use the link in the menu bar.
Advanced Search
Home Room
Book Collection
E-Book Collection
Multimedia Collection
Thesis Collection
Transportation Engineering Collection
Periodicals Collections
Green Campus
7 Results Found
Actions:
Add to My Lists
Email
Print
Place Hold(s)
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
Select All
1
0000000
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
1.
Intrusion detection with Snort
Intrusion detection with Snort
by
Koziol, Jack.
https://learning.oreilly.com/library/view/~/157870281X
https://learning.oreilly.com/library/view/~/157870281X/?ar
https://go.oreilly.com/library-access/library/view/-/157870281X/?ar
Format:
Electronic Resources
2.
Mac OS X security
Mac OS X security
by
Potter, Bruce.
https://go.oreilly.com/library-access/library/view/-/0735713480/?ar
https://learning.oreilly.com/library/view/~/0735713480
https://learning.oreilly.com/library/view/~/0735713480/?ar
Format:
Electronic Resources
View Other Search Results
3.
Mastering network security
Mastering network security
by
Brenton, Chris.
https://go.oreilly.com/library-access/library/view/-/9780782141429/?ar
https://learning.oreilly.com/library/view/~/9780782141429/?ar
https://learning.oreilly.com/library/view/~/9780782141429
Format:
Electronic Resources
4.
Cisco security professional's guide to secure intrusion detection systems
Cisco security professional's guide to secure intrusion detection systems
by
Burton, James D., author.
https://go.oreilly.com/library-access/library/view/-/9781932266696/?ar
https://learning.oreilly.com/library/view/~/9781932266696/?ar
Format:
Electronic Resources
5.
Designing Network Security Second Edition
Designing Network Security Second Edition
by
Kaeo, Merike, author.
https://learning.oreilly.com/library/view/~/1587051176/?ar
https://learning.oreilly.com/library/view/~/1587051176
https://go.oreilly.com/library-access/library/view/-/1587051176/?ar
Format:
Electronic Resources
6.
Malware : Fighting Malicious Code.
Malware : Fighting Malicious Code.
by
Skoudis, Ed, author.
https://learning.oreilly.com/library/view/~/0131014056
https://learning.oreilly.com/library/view/~/0131014056/?ar
https://go.oreilly.com/library-access/library/view/-/0131014056/?ar
Format:
Electronic Resources
7.
Biometrics for Network Security
Biometrics for Network Security
by
Reid, Paul, author.
https://learning.oreilly.com/library/view/~/0131015494
https://learning.oreilly.com/library/view/~/0131015494/?ar
https://go.oreilly.com/library-access/library/view/-/0131015494/?ar
Format:
Electronic Resources
Select All
1
7 Results Found
Actions:
Add to My Lists
Email
Print
Place Hold(s)
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
Limit Search Results
Narrowed by:
Included
Publication Date: 2003
Included
Subject: Computer security.
Included
Subject: Réseaux d'ordinateurs -- Sécurité -- Mesures.
Author
Include
Exclude
Baumrucker, C. Tate, author.
(1)
Brenton, Chris.
(1)
Burton, James D., author.
(1)
Dubrawsky, Ido, author.
(1)
Hunt, Cameron.
(1)
Kaeo, Merike, author.
(1)
Koziol, Jack.
(1)
Norvell, Preston.
(1)
O'Reilly for Higher Education (Firm), distributor.
(1)
Osipov, Vitaly, author.
(1)
Potter, Bruce.
(1)
Reid, Paul, author.
(1)
Safari, an O'Reilly Media Company.
(1)
Skoudis, Ed, author.
(1)
Sweeney, Michael, editor.
(1)
Wotring, Brian.
(1)
Zeltser, Lenny, author.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
E-Book
(7)
Language
Include
Exclude
English
(7)
Subject
Include
Exclude
Computer networks -- Security measures.
(7)
Sécurité informatique.
(7)
Computer Security
(5)
Electronic books.
(5)
COMPUTERS -- Internet -- Security.
(2)
COMPUTERS -- Networking -- Security.
(2)
COMPUTERS -- Security -- General.
(2)
Biometric identification.
(1)
Computer crimes.
(1)
Computers -- Access control.
(1)
Criminalité informatique.
(1)
Electrical & Computer Engineering.
(1)
Engineering & Applied Sciences.
(1)
Identification biométrique.
(1)
Internet -- Security measures.
(1)
Internet -- Sécurité -- Mesures.
(1)
Mac OS.
(1)
Macintosh (Computer) -- Security measures.
(1)
Macintosh (Ordinateur) -- Sécurité -- Mesures.
(1)
Operating systems (Computers)
(1)
Ordinateurs -- Accès -- Contrôle.
(1)
Systèmes d'exploitation (Ordinateurs)
(1)
Telecommunications.
(1)
operating systems.
(1)
More
View All
Fewer
Collapse All
Shelf Location
Include
Exclude
O'reilly E-Books
(7)
Library
Include
Exclude
IYTE Library
(7)
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}