Search Results for - Narrowed by: E-Book - 2007 - Computer security. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dITYPE$002509Material$002bType$0025091$00253AE-BOOKS$002509E-Book$0026qf$003dPUBDATE$002509Publication$002bDate$0025092007$0025092007$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300? 2024-06-17T00:24:14Z Microsoft windows security fundamentals ent://SD_ILS/0/SD_ILS:64221 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Clercq, Jan de, 1968-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583408">An electronic book accessible through the World Wide Web; click for information</a> Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0707/2007270083-d.html">http://www.loc.gov/catdir/enhancements/fy0707/2007270083-d.html</a><br/>Format:&#160;Electronic Resources<br/> WarDriving &amp; wireless penetration testing ent://SD_ILS/0/SD_ILS:64317 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Hurley, Chris.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491112">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Metasploit Toolkit for Penetration Testing, Exploit Development, And Vulnerabiity Research ent://SD_ILS/0/SD_ILS:64176 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;ScienceDirect (Online service)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Security convergence managing enterprise security risk ent://SD_ILS/0/SD_ILS:64245 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Tyson, Dave.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750684255">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Windows forensic analysis DVD toolkit ent://SD_ILS/0/SD_ILS:64246 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Carvey, Harlan A.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491563">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at securing sql server 2005 ent://SD_ILS/0/SD_ILS:64282 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;ScienceDirect (Online service)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491969">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Vista for IT security professionals ent://SD_ILS/0/SD_ILS:64208 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Piltzecker, Tony, 1975-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491396">An electronic book accessible through the World Wide Web; click for information</a> Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0713/2007296500-d.html">http://www.loc.gov/catdir/enhancements/fy0713/2007296500-d.html</a><br/>Format:&#160;Electronic Resources<br/> Developer's guide to web application security ent://SD_ILS/0/SD_ILS:64238 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Zen and the art of information security ent://SD_ILS/0/SD_ILS:64336 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Winkler, Ira.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Techno Security's guide to managing risks for IT managers, auditors, and investigators ent://SD_ILS/0/SD_ILS:64259 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Wiles, Jack.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Botnets the killer web app ent://SD_ILS/0/SD_ILS:64257 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Schiller, Craig A.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491358">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> FISMA certification &amp; accreditation handbook ent://SD_ILS/0/SD_ILS:341700 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Taylor, Laura.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179012">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179012</a><br/>Format:&#160;Electronic Resources<br/> Techno security's guide to e-discovery and digital forensics ent://SD_ILS/0/SD_ILS:343201 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Wiles, Jack.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=239209">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=239209</a><br/>Format:&#160;Electronic Resources<br/> Toward a Safer and More Secure Cyberspace. ent://SD_ILS/0/SD_ILS:1320138 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Committee on Improving Cybersecurity Research in the United States, National Research Council.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3378311">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Misuse of Information Systems : The Impact of Security Countermeasures. ent://SD_ILS/0/SD_ILS:1291177 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;D'Arcy, John P.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3016826">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security Data Visualization : Graphical Techniques for Network Analysis. ent://SD_ILS/0/SD_ILS:1291613 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Conti, Greg.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3017625">Click to View</a><br/>Format:&#160;Electronic Resources<br/> FISMA certification &amp; accreditation handbook ent://SD_ILS/0/SD_ILS:64190 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Taylor, Laura.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> The official CHFI study guide (Exam 312-49) for computer hacking forensic investigator. ent://SD_ILS/0/SD_ILS:64300 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Kleiman, Dave.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491976">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Open source fuzzing tools ent://SD_ILS/0/SD_ILS:64307 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Rathaus, Noam<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491952">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Papers from the First European Workshop on Technological &amp; Security Issues in Digital Rights Management (EuDiRights&rsquo;06). ent://SD_ILS/0/SD_ILS:1191720 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Yague, Mariemma.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=291585">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Botnets the killer web app ent://SD_ILS/0/SD_ILS:340160 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Schiller, Craig A.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=184406">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=184406</a><br/>Format:&#160;Electronic Resources<br/> Process for Developing a Common Vocabulary in the Information Security Area. ent://SD_ILS/0/SD_ILS:1195949 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Von Knop, J.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=320313">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Role-Based Access Control. ent://SD_ILS/0/SD_ILS:1197533 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Ferraiolo, David F.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=338751">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Windows Forensic Analysis DVD Toolkit. ent://SD_ILS/0/SD_ILS:1196518 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Carvey, Harlan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=328624">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Papers from the HAISA 2007 Symposium : Papers from the HAISA 2007 Symposium. ent://SD_ILS/0/SD_ILS:1196565 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Furnell, Steven.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=328737">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Digital Watermarking and Steganography. ent://SD_ILS/0/SD_ILS:1196457 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Cox, Ingemar.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=328311">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking for dummies ent://SD_ILS/0/SD_ILS:2282490 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Beaver, Kevin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470052358/?ar">https://go.oreilly.com/library-access/library/view/-/9780470052358/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470052358/?ar">https://learning.oreilly.com/library/view/~/9780470052358/?ar</a><br/>Format:&#160;Electronic Resources<br/> Endpoint security ent://SD_ILS/0/SD_ILS:2283117 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Kadrich, Mark.<br/><a href="https://learning.oreilly.com/library/view/~/9780321436955/?ar">https://learning.oreilly.com/library/view/~/9780321436955/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321436955/?ar">https://go.oreilly.com/library-access/library/view/-/9780321436955/?ar</a><br/>Format:&#160;Electronic Resources<br/> Developer's guide to web application security ent://SD_ILS/0/SD_ILS:2282873 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Cross, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9781597490610">https://learning.oreilly.com/library/view/~/9781597490610</a> <a href="https://www.sciencedirect.com/science/book/9781597490610">https://www.sciencedirect.com/science/book/9781597490610</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597490610/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490610/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597490610/?ar">https://learning.oreilly.com/library/view/~/9781597490610/?ar</a><br/>Format:&#160;Electronic Resources<br/> The official CHFI study guide (Exam 312-49) : for computer hacking forensic investigator. ent://SD_ILS/0/SD_ILS:2283709 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Kleiman, Dave.<br/><a href="https://www.sciencedirect.com/science/book/9781597491976">https://www.sciencedirect.com/science/book/9781597491976</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491976/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491976/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597491976/?ar">https://learning.oreilly.com/library/view/~/9781597491976/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer security and cryptography ent://SD_ILS/0/SD_ILS:2283057 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Konheim, Alan G., 1934-<br/><a href="https://learning.oreilly.com/library/view/~/9780471947837">https://learning.oreilly.com/library/view/~/9780471947837</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780471947837/?ar">https://go.oreilly.com/library-access/library/view/-/9780471947837/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780471947837/?ar">https://learning.oreilly.com/library/view/~/9780471947837/?ar</a><br/>Format:&#160;Electronic Resources<br/> FISMA certification &amp; accreditation handbook ent://SD_ILS/0/SD_ILS:2283639 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Taylor, Laura.<br/><a href="https://www.sciencedirect.com/science/book/9781597491167">https://www.sciencedirect.com/science/book/9781597491167</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491167/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491167/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597491167/?ar">https://learning.oreilly.com/library/view/~/9781597491167/?ar</a><br/>Format:&#160;Electronic Resources<br/> Elsevier's dictionary of information security in English, German, French and Russian ent://SD_ILS/0/SD_ILS:2283476 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Manoilov, G.<br/><a href="https://learning.oreilly.com/library/view/~/9780080488806">https://learning.oreilly.com/library/view/~/9780080488806</a> <a href="https://learning.oreilly.com/library/view/~/9780080488806/?ar">https://learning.oreilly.com/library/view/~/9780080488806/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780080488806/?ar">https://go.oreilly.com/library-access/library/view/-/9780080488806/?ar</a><br/>Format:&#160;Electronic Resources<br/> Advances in enterprise information technology security ent://SD_ILS/0/SD_ILS:2261103 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Khadraoui, Djamel.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-090-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-090-5</a><br/>Format:&#160;Electronic Resources<br/> WarDriving &amp; wireless penetration testing ent://SD_ILS/0/SD_ILS:2282518 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Hurley, Chris.<br/><a href="https://www.sciencedirect.com/science/book/9781597491112">https://www.sciencedirect.com/science/book/9781597491112</a> <a href="https://learning.oreilly.com/library/view/~/9781597491112">https://learning.oreilly.com/library/view/~/9781597491112</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491112/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491112/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597491112/?ar">https://learning.oreilly.com/library/view/~/9781597491112/?ar</a><br/>Format:&#160;Electronic Resources<br/> Secure programming with static analysis ent://SD_ILS/0/SD_ILS:2283448 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Chess, Brian.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321424778/?ar">https://go.oreilly.com/library-access/library/view/-/9780321424778/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780321424778/?ar">https://learning.oreilly.com/library/view/~/9780321424778/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780321424778">https://learning.oreilly.com/library/view/~/9780321424778</a><br/>Format:&#160;Electronic Resources<br/> Fuzzing : brute force vulnerabilty discovery ent://SD_ILS/0/SD_ILS:2283451 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Sutton, Michael, 1973-<br/><a href="https://learning.oreilly.com/library/view/~/9780321446114">https://learning.oreilly.com/library/view/~/9780321446114</a> <a href="https://learning.oreilly.com/library/view/~/9780321446114/?ar">https://learning.oreilly.com/library/view/~/9780321446114/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321446114/?ar">https://go.oreilly.com/library-access/library/view/-/9780321446114/?ar</a><br/>Format:&#160;Electronic Resources<br/> Web application vulnerabilities : detect, exploit, prevent ent://SD_ILS/0/SD_ILS:2285642 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Cross, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9781597492096/?ar">https://learning.oreilly.com/library/view/~/9781597492096/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492096/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492096/?ar</a><br/>Format:&#160;Electronic Resources<br/> Botnets : the killer web app ent://SD_ILS/0/SD_ILS:2283565 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Schiller, Craig A.<br/><a href="https://www.sciencedirect.com/science/book/9781597491358">https://www.sciencedirect.com/science/book/9781597491358</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491358/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491358/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597491358/?ar">https://learning.oreilly.com/library/view/~/9781597491358/?ar</a><br/>Format:&#160;Electronic Resources<br/> Zen and the art of information security ent://SD_ILS/0/SD_ILS:2283974 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Winkler, Ira.<br/><a href="https://learning.oreilly.com/library/view/~/9780080554747">https://learning.oreilly.com/library/view/~/9780080554747</a> <a href="https://learning.oreilly.com/library/view/~/9780080554747/?ar">https://learning.oreilly.com/library/view/~/9780080554747/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780080554747/?ar">https://go.oreilly.com/library-access/library/view/-/9780080554747/?ar</a> <a href="https://www.sciencedirect.com/science/book/9781597491686">https://www.sciencedirect.com/science/book/9781597491686</a><br/>Format:&#160;Electronic Resources<br/> Security power tools ent://SD_ILS/0/SD_ILS:2283951 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Burns, Bryan.<br/><a href="https://learning.oreilly.com/library/view/~/9780596009632">https://learning.oreilly.com/library/view/~/9780596009632</a> <a href="https://learning.oreilly.com/library/view/~/9780596009632/?ar">https://learning.oreilly.com/library/view/~/9780596009632/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780596009632/?ar">https://go.oreilly.com/library-access/library/view/-/9780596009632/?ar</a><br/>Format:&#160;Electronic Resources<br/> Perl scripting for Windows security : live response, forensic analysis, and monitoring ent://SD_ILS/0/SD_ILS:2284953 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Carvey, Harlan A.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491730/?ar">https://learning.oreilly.com/library/view/~/9781597491730/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491730/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491730/?ar</a><br/>Format:&#160;Electronic Resources<br/> Techno security's guide to e-discovery and digital forensics ent://SD_ILS/0/SD_ILS:2284514 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Wiles, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492232">https://learning.oreilly.com/library/view/~/9781597492232</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492232/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492232/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492232/?ar">https://learning.oreilly.com/library/view/~/9781597492232/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows Vista security : securing Vista against malicious attacks ent://SD_ILS/0/SD_ILS:2284862 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Grimes, Roger A.<br/><a href="https://learning.oreilly.com/library/view/~/9780470101551">https://learning.oreilly.com/library/view/~/9780470101551</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470101551/?ar">https://go.oreilly.com/library-access/library/view/-/9780470101551/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470101551/?ar">https://learning.oreilly.com/library/view/~/9780470101551/?ar</a><br/>Format:&#160;Electronic Resources<br/> The shellcoder's handbook : discovering and exploiting security holes ent://SD_ILS/0/SD_ILS:2283852 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Anley, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/9780470080238">https://learning.oreilly.com/library/view/~/9780470080238</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470080238/?ar">https://go.oreilly.com/library-access/library/view/-/9780470080238/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470080238/?ar">https://learning.oreilly.com/library/view/~/9780470080238/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing the Vista environment ent://SD_ILS/0/SD_ILS:2283409 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Gregory, Peter H.<br/><a href="https://learning.oreilly.com/library/view/~/9780596514303/?ar">https://learning.oreilly.com/library/view/~/9780596514303/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780596514303">https://learning.oreilly.com/library/view/~/9780596514303</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780596514303/?ar">https://go.oreilly.com/library-access/library/view/-/9780596514303/?ar</a><br/>Format:&#160;Electronic Resources<br/> Virtual honeypots : from botnet tracking to intrusion detection ent://SD_ILS/0/SD_ILS:2283802 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Provos, Niels.<br/><a href="https://learning.oreilly.com/library/view/~/9780321336323/?ar">https://learning.oreilly.com/library/view/~/9780321336323/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321336323/?ar">https://go.oreilly.com/library-access/library/view/-/9780321336323/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780321336323">https://learning.oreilly.com/library/view/~/9780321336323</a><br/>Format:&#160;Electronic Resources<br/> Managing information assurance in financial services ent://SD_ILS/0/SD_ILS:2261738 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Rao, H. R. (H. Raghav)<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-171-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-171-1</a><br/>Format:&#160;Electronic Resources<br/> Integrating security and software engineering advances and future visions ent://SD_ILS/0/SD_ILS:2261641 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Mouratidis, Haralambos, 1977-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-147-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-147-6</a><br/>Format:&#160;Electronic Resources<br/> Encyclopedia of information ethics and security ent://SD_ILS/0/SD_ILS:2261400 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Quigley, Marian.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-987-8">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-987-8</a><br/>Format:&#160;Electronic Resources<br/> Web services security and e-business ent://SD_ILS/0/SD_ILS:2262045 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Radhamani, G., 1968-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-168-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-168-1</a><br/>Format:&#160;Electronic Resources<br/> Snort : IDS and IPS toolkit ent://SD_ILS/0/SD_ILS:2289130 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Beale, Jay.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597490993/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490993/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597490993/?ar">https://learning.oreilly.com/library/view/~/9781597490993/?ar</a> <a href="https://www.sciencedirect.com/science/book/9781597490993">https://www.sciencedirect.com/science/book/9781597490993</a><br/>Format:&#160;Electronic Resources<br/> Metasploit toolkit for penetration testing, exploit development, and vulnerability research ent://SD_ILS/0/SD_ILS:2284167 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Maynor, David.<br/><a href="https://www.sciencedirect.com/science/book/9781597490740">https://www.sciencedirect.com/science/book/9781597490740</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597490740/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490740/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597490740/?ar">https://learning.oreilly.com/library/view/~/9781597490740/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows vista security : praxisorientierte Sicherheit f&uuml;r Profis ent://SD_ILS/0/SD_ILS:2286308 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Nasarek, Marcus.<br/><a href="https://learning.oreilly.com/library/view/~/9783897214668">https://learning.oreilly.com/library/view/~/9783897214668</a> <a href="https://learning.oreilly.com/library/view/~/9783897214668/?ar">https://learning.oreilly.com/library/view/~/9783897214668/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783897214668/?ar">https://go.oreilly.com/library-access/library/view/-/9783897214668/?ar</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at securing your network ent://SD_ILS/0/SD_ILS:2284630 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Dubrawsky, Ido.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492317/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492317/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492317/?ar">https://learning.oreilly.com/library/view/~/9781597492317/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492317">https://learning.oreilly.com/library/view/~/9781597492317</a><br/>Format:&#160;Electronic Resources<br/> Securing DB2 and implementing MLS on z/OS ent://SD_ILS/0/SD_ILS:2295008 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Rayns, Chris.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738486116/?ar">https://go.oreilly.com/library-access/library/view/-/0738486116/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738486116/?ar">https://learning.oreilly.com/library/view/~/0738486116/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738486116">https://learning.oreilly.com/library/view/~/0738486116</a><br/>Format:&#160;Electronic Resources<br/> How to own a shadow : the chase for Knuth ent://SD_ILS/0/SD_ILS:2302939 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Long, Johnny.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490818/?ar">https://learning.oreilly.com/library/view/~/9781597490818/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597490818/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490818/?ar</a><br/>Format:&#160;Electronic Resources<br/> Encryption in a Windows Environment : EFS File, 802.1x wireless, IPSec transport, and S/MIME exchange ent://SD_ILS/0/SD_ILS:2310770 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Morimoto, Rand.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0768668298/?ar">https://go.oreilly.com/library-access/library/view/-/0768668298/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0768668298/?ar">https://learning.oreilly.com/library/view/~/0768668298/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0768668298">https://learning.oreilly.com/library/view/~/0768668298</a><br/>Format:&#160;Electronic Resources<br/> Encryption facility for z/OS version 1.10 ent://SD_ILS/0/SD_ILS:2335107 2024-06-17T00:24:14Z 2024-06-17T00:24:14Z by&#160;Kappeler, Patrick, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738489557/?ar">https://go.oreilly.com/library-access/library/view/-/0738489557/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738489557">https://learning.oreilly.com/library/view/~/0738489557</a> <a href="https://learning.oreilly.com/library/view/~/0738489557/?ar">https://learning.oreilly.com/library/view/~/0738489557/?ar</a><br/>Format:&#160;Electronic Resources<br/>