Search Results for - Narrowed by: Foster, James C. - Computer security.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dAUTHOR$002509Author$002509Foster$00252C$002bJames$002bC.$002509Foster$00252C$002bJames$002bC.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?2024-06-19T22:39:59ZSockets, Shellcode, Porting, and Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals.ent://SD_ILS/0/SD_ILS:11831102024-06-19T22:39:59Z2024-06-19T22:39:59Zby Foster, James C.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=226568">Click to View</a><br/>Format: Electronic Resources<br/>Buffer overflow attacks detect, exploit, preventent://SD_ILS/0/SD_ILS:655432024-06-19T22:39:59Z2024-06-19T22:39:59Zby Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266672">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionalsent://SD_ILS/0/SD_ILS:22826852024-06-19T22:39:59Z2024-06-19T22:39:59Zby Foster, James C.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490054/?ar">https://learning.oreilly.com/library/view/~/9781597490054/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490054/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490054/?ar</a><br/>Format: Electronic Resources<br/>InfoSec career hacking : sell your skillz, not your soulent://SD_ILS/0/SD_ILS:22826912024-06-19T22:39:59Z2024-06-19T22:39:59Zby Bayles, Aaron W.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597490115/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490115/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490115/?ar">https://learning.oreilly.com/library/view/~/9781597490115/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490115">https://learning.oreilly.com/library/view/~/9781597490115</a>
<a href="https://www.sciencedirect.com/science/book/9781597490115">https://www.sciencedirect.com/science/book/9781597490115</a><br/>Format: Electronic Resources<br/>Programmer's Ultimate Security DeskRef : Your Programming Security Encyclopedia.ent://SD_ILS/0/SD_ILS:11920972024-06-19T22:39:59Z2024-06-19T22:39:59Zby Foster, James C.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294328">Click to View</a><br/>Format: Electronic Resources<br/>Snort 2.0 intrusion detectionent://SD_ILS/0/SD_ILS:659192024-06-19T22:39:59Z2024-06-19T22:39:59Zby Beale, Jay.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836746">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Snort 2.0 intrusion detection.ent://SD_ILS/0/SD_ILS:146182024-06-19T22:39:59Z2024-06-19T22:39:59Zby Beale, Jay.<br/>Format: Books<br/>Snort Intrusion Detection 2.0.ent://SD_ILS/0/SD_ILS:11921112024-06-19T22:39:59Z2024-06-19T22:39:59Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294371">Click to View</a><br/>Format: Electronic Resources<br/>