Search Results for - Narrowed by: E-Book - 2007 - Computer security.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dITYPE$002509Material$002bType$0025091$00253AE-BOOKS$002509E-Book$0026qf$003dPUBDATE$002509Publication$002bDate$0025092007$0025092007$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?2024-06-17T00:24:14ZMicrosoft windows security fundamentalsent://SD_ILS/0/SD_ILS:642212024-06-17T00:24:14Z2024-06-17T00:24:14Zby Clercq, Jan de, 1968-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583408">An electronic book accessible through the World Wide Web; click for information</a>
Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0707/2007270083-d.html">http://www.loc.gov/catdir/enhancements/fy0707/2007270083-d.html</a><br/>Format: Electronic Resources<br/>WarDriving & wireless penetration testingent://SD_ILS/0/SD_ILS:643172024-06-17T00:24:14Z2024-06-17T00:24:14Zby Hurley, Chris.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491112">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Metasploit Toolkit for Penetration Testing, Exploit Development, And Vulnerabiity Researchent://SD_ILS/0/SD_ILS:641762024-06-17T00:24:14Z2024-06-17T00:24:14Zby ScienceDirect (Online service)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Security convergence managing enterprise security riskent://SD_ILS/0/SD_ILS:642452024-06-17T00:24:14Z2024-06-17T00:24:14Zby Tyson, Dave.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750684255">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Windows forensic analysis DVD toolkitent://SD_ILS/0/SD_ILS:642462024-06-17T00:24:14Z2024-06-17T00:24:14Zby Carvey, Harlan A.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491563">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>How to cheat at securing sql server 2005ent://SD_ILS/0/SD_ILS:642822024-06-17T00:24:14Z2024-06-17T00:24:14Zby ScienceDirect (Online service)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491969">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Microsoft Vista for IT security professionalsent://SD_ILS/0/SD_ILS:642082024-06-17T00:24:14Z2024-06-17T00:24:14Zby Piltzecker, Tony, 1975-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491396">An electronic book accessible through the World Wide Web; click for information</a>
Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0713/2007296500-d.html">http://www.loc.gov/catdir/enhancements/fy0713/2007296500-d.html</a><br/>Format: Electronic Resources<br/>Developer's guide to web application securityent://SD_ILS/0/SD_ILS:642382024-06-17T00:24:14Z2024-06-17T00:24:14Zby Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:643362024-06-17T00:24:14Z2024-06-17T00:24:14Zby Winkler, Ira.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Techno Security's guide to managing risks for IT managers, auditors, and investigatorsent://SD_ILS/0/SD_ILS:642592024-06-17T00:24:14Z2024-06-17T00:24:14Zby Wiles, Jack.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Botnets the killer web appent://SD_ILS/0/SD_ILS:642572024-06-17T00:24:14Z2024-06-17T00:24:14Zby Schiller, Craig A.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491358">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>FISMA certification & accreditation handbookent://SD_ILS/0/SD_ILS:3417002024-06-17T00:24:14Z2024-06-17T00:24:14Zby Taylor, Laura.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179012">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179012</a><br/>Format: Electronic Resources<br/>Techno security's guide to e-discovery and digital forensicsent://SD_ILS/0/SD_ILS:3432012024-06-17T00:24:14Z2024-06-17T00:24:14Zby Wiles, Jack.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=239209">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=239209</a><br/>Format: Electronic Resources<br/>Toward a Safer and More Secure Cyberspace.ent://SD_ILS/0/SD_ILS:13201382024-06-17T00:24:14Z2024-06-17T00:24:14Zby Committee on Improving Cybersecurity Research in the United States, National Research Council.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3378311">Click to View</a><br/>Format: Electronic Resources<br/>Misuse of Information Systems : The Impact of Security Countermeasures.ent://SD_ILS/0/SD_ILS:12911772024-06-17T00:24:14Z2024-06-17T00:24:14Zby D'Arcy, John P.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3016826">Click to View</a><br/>Format: Electronic Resources<br/>Security Data Visualization : Graphical Techniques for Network Analysis.ent://SD_ILS/0/SD_ILS:12916132024-06-17T00:24:14Z2024-06-17T00:24:14Zby Conti, Greg.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3017625">Click to View</a><br/>Format: Electronic Resources<br/>FISMA certification & accreditation handbookent://SD_ILS/0/SD_ILS:641902024-06-17T00:24:14Z2024-06-17T00:24:14Zby Taylor, Laura.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>The official CHFI study guide (Exam 312-49) for computer hacking forensic investigator.ent://SD_ILS/0/SD_ILS:643002024-06-17T00:24:14Z2024-06-17T00:24:14Zby Kleiman, Dave.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491976">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Open source fuzzing toolsent://SD_ILS/0/SD_ILS:643072024-06-17T00:24:14Z2024-06-17T00:24:14Zby Rathaus, Noam<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491952">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Papers from the First European Workshop on Technological & Security Issues in Digital Rights Management (EuDiRights’06).ent://SD_ILS/0/SD_ILS:11917202024-06-17T00:24:14Z2024-06-17T00:24:14Zby Yague, Mariemma.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=291585">Click to View</a><br/>Format: Electronic Resources<br/>Botnets the killer web appent://SD_ILS/0/SD_ILS:3401602024-06-17T00:24:14Z2024-06-17T00:24:14Zby Schiller, Craig A.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=184406">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=184406</a><br/>Format: Electronic Resources<br/>Process for Developing a Common Vocabulary in the Information Security Area.ent://SD_ILS/0/SD_ILS:11959492024-06-17T00:24:14Z2024-06-17T00:24:14Zby Von Knop, J.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=320313">Click to View</a><br/>Format: Electronic Resources<br/>Role-Based Access Control.ent://SD_ILS/0/SD_ILS:11975332024-06-17T00:24:14Z2024-06-17T00:24:14Zby Ferraiolo, David F.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=338751">Click to View</a><br/>Format: Electronic Resources<br/>Windows Forensic Analysis DVD Toolkit.ent://SD_ILS/0/SD_ILS:11965182024-06-17T00:24:14Z2024-06-17T00:24:14Zby Carvey, Harlan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=328624">Click to View</a><br/>Format: Electronic Resources<br/>Papers from the HAISA 2007 Symposium : Papers from the HAISA 2007 Symposium.ent://SD_ILS/0/SD_ILS:11965652024-06-17T00:24:14Z2024-06-17T00:24:14Zby Furnell, Steven.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=328737">Click to View</a><br/>Format: Electronic Resources<br/>Digital Watermarking and Steganography.ent://SD_ILS/0/SD_ILS:11964572024-06-17T00:24:14Z2024-06-17T00:24:14Zby Cox, Ingemar.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=328311">Click to View</a><br/>Format: Electronic Resources<br/>Hacking for dummiesent://SD_ILS/0/SD_ILS:22824902024-06-17T00:24:14Z2024-06-17T00:24:14Zby Beaver, Kevin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470052358/?ar">https://go.oreilly.com/library-access/library/view/-/9780470052358/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470052358/?ar">https://learning.oreilly.com/library/view/~/9780470052358/?ar</a><br/>Format: Electronic Resources<br/>Endpoint securityent://SD_ILS/0/SD_ILS:22831172024-06-17T00:24:14Z2024-06-17T00:24:14Zby Kadrich, Mark.<br/><a href="https://learning.oreilly.com/library/view/~/9780321436955/?ar">https://learning.oreilly.com/library/view/~/9780321436955/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321436955/?ar">https://go.oreilly.com/library-access/library/view/-/9780321436955/?ar</a><br/>Format: Electronic Resources<br/>Developer's guide to web application securityent://SD_ILS/0/SD_ILS:22828732024-06-17T00:24:14Z2024-06-17T00:24:14Zby Cross, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9781597490610">https://learning.oreilly.com/library/view/~/9781597490610</a>
<a href="https://www.sciencedirect.com/science/book/9781597490610">https://www.sciencedirect.com/science/book/9781597490610</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490610/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490610/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490610/?ar">https://learning.oreilly.com/library/view/~/9781597490610/?ar</a><br/>Format: Electronic Resources<br/>The official CHFI study guide (Exam 312-49) : for computer hacking forensic investigator.ent://SD_ILS/0/SD_ILS:22837092024-06-17T00:24:14Z2024-06-17T00:24:14Zby Kleiman, Dave.<br/><a href="https://www.sciencedirect.com/science/book/9781597491976">https://www.sciencedirect.com/science/book/9781597491976</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491976/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491976/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491976/?ar">https://learning.oreilly.com/library/view/~/9781597491976/?ar</a><br/>Format: Electronic Resources<br/>Computer security and cryptographyent://SD_ILS/0/SD_ILS:22830572024-06-17T00:24:14Z2024-06-17T00:24:14Zby Konheim, Alan G., 1934-<br/><a href="https://learning.oreilly.com/library/view/~/9780471947837">https://learning.oreilly.com/library/view/~/9780471947837</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780471947837/?ar">https://go.oreilly.com/library-access/library/view/-/9780471947837/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780471947837/?ar">https://learning.oreilly.com/library/view/~/9780471947837/?ar</a><br/>Format: Electronic Resources<br/>FISMA certification & accreditation handbookent://SD_ILS/0/SD_ILS:22836392024-06-17T00:24:14Z2024-06-17T00:24:14Zby Taylor, Laura.<br/><a href="https://www.sciencedirect.com/science/book/9781597491167">https://www.sciencedirect.com/science/book/9781597491167</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491167/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491167/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491167/?ar">https://learning.oreilly.com/library/view/~/9781597491167/?ar</a><br/>Format: Electronic Resources<br/>Elsevier's dictionary of information security in English, German, French and Russianent://SD_ILS/0/SD_ILS:22834762024-06-17T00:24:14Z2024-06-17T00:24:14Zby Manoilov, G.<br/><a href="https://learning.oreilly.com/library/view/~/9780080488806">https://learning.oreilly.com/library/view/~/9780080488806</a>
<a href="https://learning.oreilly.com/library/view/~/9780080488806/?ar">https://learning.oreilly.com/library/view/~/9780080488806/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780080488806/?ar">https://go.oreilly.com/library-access/library/view/-/9780080488806/?ar</a><br/>Format: Electronic Resources<br/>Advances in enterprise information technology securityent://SD_ILS/0/SD_ILS:22611032024-06-17T00:24:14Z2024-06-17T00:24:14Zby Khadraoui, Djamel.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-090-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-090-5</a><br/>Format: Electronic Resources<br/>WarDriving & wireless penetration testingent://SD_ILS/0/SD_ILS:22825182024-06-17T00:24:14Z2024-06-17T00:24:14Zby Hurley, Chris.<br/><a href="https://www.sciencedirect.com/science/book/9781597491112">https://www.sciencedirect.com/science/book/9781597491112</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491112">https://learning.oreilly.com/library/view/~/9781597491112</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491112/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491112/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491112/?ar">https://learning.oreilly.com/library/view/~/9781597491112/?ar</a><br/>Format: Electronic Resources<br/>Secure programming with static analysisent://SD_ILS/0/SD_ILS:22834482024-06-17T00:24:14Z2024-06-17T00:24:14Zby Chess, Brian.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321424778/?ar">https://go.oreilly.com/library-access/library/view/-/9780321424778/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321424778/?ar">https://learning.oreilly.com/library/view/~/9780321424778/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321424778">https://learning.oreilly.com/library/view/~/9780321424778</a><br/>Format: Electronic Resources<br/>Fuzzing : brute force vulnerabilty discoveryent://SD_ILS/0/SD_ILS:22834512024-06-17T00:24:14Z2024-06-17T00:24:14Zby Sutton, Michael, 1973-<br/><a href="https://learning.oreilly.com/library/view/~/9780321446114">https://learning.oreilly.com/library/view/~/9780321446114</a>
<a href="https://learning.oreilly.com/library/view/~/9780321446114/?ar">https://learning.oreilly.com/library/view/~/9780321446114/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321446114/?ar">https://go.oreilly.com/library-access/library/view/-/9780321446114/?ar</a><br/>Format: Electronic Resources<br/>Web application vulnerabilities : detect, exploit, preventent://SD_ILS/0/SD_ILS:22856422024-06-17T00:24:14Z2024-06-17T00:24:14Zby Cross, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9781597492096/?ar">https://learning.oreilly.com/library/view/~/9781597492096/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492096/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492096/?ar</a><br/>Format: Electronic Resources<br/>Botnets : the killer web appent://SD_ILS/0/SD_ILS:22835652024-06-17T00:24:14Z2024-06-17T00:24:14Zby Schiller, Craig A.<br/><a href="https://www.sciencedirect.com/science/book/9781597491358">https://www.sciencedirect.com/science/book/9781597491358</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491358/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491358/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491358/?ar">https://learning.oreilly.com/library/view/~/9781597491358/?ar</a><br/>Format: Electronic Resources<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:22839742024-06-17T00:24:14Z2024-06-17T00:24:14Zby Winkler, Ira.<br/><a href="https://learning.oreilly.com/library/view/~/9780080554747">https://learning.oreilly.com/library/view/~/9780080554747</a>
<a href="https://learning.oreilly.com/library/view/~/9780080554747/?ar">https://learning.oreilly.com/library/view/~/9780080554747/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780080554747/?ar">https://go.oreilly.com/library-access/library/view/-/9780080554747/?ar</a>
<a href="https://www.sciencedirect.com/science/book/9781597491686">https://www.sciencedirect.com/science/book/9781597491686</a><br/>Format: Electronic Resources<br/>Security power toolsent://SD_ILS/0/SD_ILS:22839512024-06-17T00:24:14Z2024-06-17T00:24:14Zby Burns, Bryan.<br/><a href="https://learning.oreilly.com/library/view/~/9780596009632">https://learning.oreilly.com/library/view/~/9780596009632</a>
<a href="https://learning.oreilly.com/library/view/~/9780596009632/?ar">https://learning.oreilly.com/library/view/~/9780596009632/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780596009632/?ar">https://go.oreilly.com/library-access/library/view/-/9780596009632/?ar</a><br/>Format: Electronic Resources<br/>Perl scripting for Windows security : live response, forensic analysis, and monitoringent://SD_ILS/0/SD_ILS:22849532024-06-17T00:24:14Z2024-06-17T00:24:14Zby Carvey, Harlan A.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491730/?ar">https://learning.oreilly.com/library/view/~/9781597491730/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491730/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491730/?ar</a><br/>Format: Electronic Resources<br/>Techno security's guide to e-discovery and digital forensicsent://SD_ILS/0/SD_ILS:22845142024-06-17T00:24:14Z2024-06-17T00:24:14Zby Wiles, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492232">https://learning.oreilly.com/library/view/~/9781597492232</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492232/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492232/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492232/?ar">https://learning.oreilly.com/library/view/~/9781597492232/?ar</a><br/>Format: Electronic Resources<br/>Windows Vista security : securing Vista against malicious attacksent://SD_ILS/0/SD_ILS:22848622024-06-17T00:24:14Z2024-06-17T00:24:14Zby Grimes, Roger A.<br/><a href="https://learning.oreilly.com/library/view/~/9780470101551">https://learning.oreilly.com/library/view/~/9780470101551</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470101551/?ar">https://go.oreilly.com/library-access/library/view/-/9780470101551/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470101551/?ar">https://learning.oreilly.com/library/view/~/9780470101551/?ar</a><br/>Format: Electronic Resources<br/>The shellcoder's handbook : discovering and exploiting security holesent://SD_ILS/0/SD_ILS:22838522024-06-17T00:24:14Z2024-06-17T00:24:14Zby Anley, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/9780470080238">https://learning.oreilly.com/library/view/~/9780470080238</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470080238/?ar">https://go.oreilly.com/library-access/library/view/-/9780470080238/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470080238/?ar">https://learning.oreilly.com/library/view/~/9780470080238/?ar</a><br/>Format: Electronic Resources<br/>Securing the Vista environmentent://SD_ILS/0/SD_ILS:22834092024-06-17T00:24:14Z2024-06-17T00:24:14Zby Gregory, Peter H.<br/><a href="https://learning.oreilly.com/library/view/~/9780596514303/?ar">https://learning.oreilly.com/library/view/~/9780596514303/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596514303">https://learning.oreilly.com/library/view/~/9780596514303</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780596514303/?ar">https://go.oreilly.com/library-access/library/view/-/9780596514303/?ar</a><br/>Format: Electronic Resources<br/>Virtual honeypots : from botnet tracking to intrusion detectionent://SD_ILS/0/SD_ILS:22838022024-06-17T00:24:14Z2024-06-17T00:24:14Zby Provos, Niels.<br/><a href="https://learning.oreilly.com/library/view/~/9780321336323/?ar">https://learning.oreilly.com/library/view/~/9780321336323/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321336323/?ar">https://go.oreilly.com/library-access/library/view/-/9780321336323/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321336323">https://learning.oreilly.com/library/view/~/9780321336323</a><br/>Format: Electronic Resources<br/>Managing information assurance in financial servicesent://SD_ILS/0/SD_ILS:22617382024-06-17T00:24:14Z2024-06-17T00:24:14Zby Rao, H. R. (H. Raghav)<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-171-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-171-1</a><br/>Format: Electronic Resources<br/>Integrating security and software engineering advances and future visionsent://SD_ILS/0/SD_ILS:22616412024-06-17T00:24:14Z2024-06-17T00:24:14Zby Mouratidis, Haralambos, 1977-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-147-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-147-6</a><br/>Format: Electronic Resources<br/>Encyclopedia of information ethics and securityent://SD_ILS/0/SD_ILS:22614002024-06-17T00:24:14Z2024-06-17T00:24:14Zby Quigley, Marian.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-987-8">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-987-8</a><br/>Format: Electronic Resources<br/>Web services security and e-businessent://SD_ILS/0/SD_ILS:22620452024-06-17T00:24:14Z2024-06-17T00:24:14Zby Radhamani, G., 1968-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-168-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-168-1</a><br/>Format: Electronic Resources<br/>Snort : IDS and IPS toolkitent://SD_ILS/0/SD_ILS:22891302024-06-17T00:24:14Z2024-06-17T00:24:14Zby Beale, Jay.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597490993/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490993/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490993/?ar">https://learning.oreilly.com/library/view/~/9781597490993/?ar</a>
<a href="https://www.sciencedirect.com/science/book/9781597490993">https://www.sciencedirect.com/science/book/9781597490993</a><br/>Format: Electronic Resources<br/>Metasploit toolkit for penetration testing, exploit development, and vulnerability researchent://SD_ILS/0/SD_ILS:22841672024-06-17T00:24:14Z2024-06-17T00:24:14Zby Maynor, David.<br/><a href="https://www.sciencedirect.com/science/book/9781597490740">https://www.sciencedirect.com/science/book/9781597490740</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490740/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490740/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490740/?ar">https://learning.oreilly.com/library/view/~/9781597490740/?ar</a><br/>Format: Electronic Resources<br/>Windows vista security : praxisorientierte Sicherheit für Profisent://SD_ILS/0/SD_ILS:22863082024-06-17T00:24:14Z2024-06-17T00:24:14Zby Nasarek, Marcus.<br/><a href="https://learning.oreilly.com/library/view/~/9783897214668">https://learning.oreilly.com/library/view/~/9783897214668</a>
<a href="https://learning.oreilly.com/library/view/~/9783897214668/?ar">https://learning.oreilly.com/library/view/~/9783897214668/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783897214668/?ar">https://go.oreilly.com/library-access/library/view/-/9783897214668/?ar</a><br/>Format: Electronic Resources<br/>How to cheat at securing your networkent://SD_ILS/0/SD_ILS:22846302024-06-17T00:24:14Z2024-06-17T00:24:14Zby Dubrawsky, Ido.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492317/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492317/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492317/?ar">https://learning.oreilly.com/library/view/~/9781597492317/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492317">https://learning.oreilly.com/library/view/~/9781597492317</a><br/>Format: Electronic Resources<br/>Securing DB2 and implementing MLS on z/OSent://SD_ILS/0/SD_ILS:22950082024-06-17T00:24:14Z2024-06-17T00:24:14Zby Rayns, Chris.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738486116/?ar">https://go.oreilly.com/library-access/library/view/-/0738486116/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738486116/?ar">https://learning.oreilly.com/library/view/~/0738486116/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738486116">https://learning.oreilly.com/library/view/~/0738486116</a><br/>Format: Electronic Resources<br/>How to own a shadow : the chase for Knuthent://SD_ILS/0/SD_ILS:23029392024-06-17T00:24:14Z2024-06-17T00:24:14Zby Long, Johnny.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490818/?ar">https://learning.oreilly.com/library/view/~/9781597490818/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490818/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490818/?ar</a><br/>Format: Electronic Resources<br/>Encryption in a Windows Environment : EFS File, 802.1x wireless, IPSec transport, and S/MIME exchangeent://SD_ILS/0/SD_ILS:23107702024-06-17T00:24:14Z2024-06-17T00:24:14Zby Morimoto, Rand.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0768668298/?ar">https://go.oreilly.com/library-access/library/view/-/0768668298/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0768668298/?ar">https://learning.oreilly.com/library/view/~/0768668298/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0768668298">https://learning.oreilly.com/library/view/~/0768668298</a><br/>Format: Electronic Resources<br/>Encryption facility for z/OS version 1.10ent://SD_ILS/0/SD_ILS:23351072024-06-17T00:24:14Z2024-06-17T00:24:14Zby Kappeler, Patrick, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738489557/?ar">https://go.oreilly.com/library-access/library/view/-/0738489557/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738489557">https://learning.oreilly.com/library/view/~/0738489557</a>
<a href="https://learning.oreilly.com/library/view/~/0738489557/?ar">https://learning.oreilly.com/library/view/~/0738489557/?ar</a><br/>Format: Electronic Resources<br/>