Search Results for - Narrowed by: Ebrary Collection - 2008 - Computer security.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AONLINEEBR$002509Ebrary$002bCollection$0026qf$003dPUBDATE$002509Publication$002bDate$0025092008$0025092008$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?2024-06-20T13:58:56ZTrust and Security in Collaborative Computing.ent://SD_ILS/0/SD_ILS:12706882024-06-20T13:58:56Z2024-06-20T13:58:56Zby Zou, Xukai.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1679354">Click to View</a><br/>Format: Electronic Resources<br/>Implementing Email and Security Tokens : Current Standards, Tools, and Practices.ent://SD_ILS/0/SD_ILS:11977622024-06-20T13:58:56Z2024-06-20T13:58:56Zby Turner, Sean.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=343700">Click to View</a><br/>Format: Electronic Resources<br/>Secure Computer and Network Systems : Modeling, Analysis and Design.ent://SD_ILS/0/SD_ILS:11986442024-06-20T13:58:56Z2024-06-20T13:58:56Zby Ye, Nong.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=351427">Click to View</a><br/>Format: Electronic Resources<br/>Information Security : Policy, Processes, and Practices.ent://SD_ILS/0/SD_ILS:12053592024-06-20T13:58:56Z2024-06-20T13:58:56Zby Goodman, Seymour.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=435197">Click to View</a><br/>Format: Electronic Resources<br/>Computer Forensics For Dummies.ent://SD_ILS/0/SD_ILS:11998622024-06-20T13:58:56Z2024-06-20T13:58:56Zby Volonino, Linda.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=380503">Click to View</a><br/>Format: Electronic Resources<br/>Securing Information and Communications Systems : Principles, Technologies, and Applications.ent://SD_ILS/0/SD_ILS:12077132024-06-20T13:58:56Z2024-06-20T13:58:56Zby Lopez, Javier.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=456881">Click to View</a><br/>Format: Electronic Resources<br/>A Comparison between Smart Cards and Trusted Platform Modules in Business Scenarios.ent://SD_ILS/0/SD_ILS:12204852024-06-20T13:58:56Z2024-06-20T13:58:56Zby Murhammer, Martin W.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=616678">Click to View</a><br/>Format: Electronic Resources<br/>Fuzzing for Software Security Testing and Quality Assurance.ent://SD_ILS/0/SD_ILS:12077162024-06-20T13:58:56Z2024-06-20T13:58:56Zby Takanen, Ari.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=456884">Click to View</a><br/>Format: Electronic Resources<br/>CompTIA Security+ 2008 In Depth.ent://SD_ILS/0/SD_ILS:13048582024-06-20T13:58:56Z2024-06-20T13:58:56Zby Ciampa, Mark.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3136117">Click to View</a><br/>Format: Electronic Resources<br/>ASP.NET 3.5 Security, Membership, and Role Management with C# and VB.ent://SD_ILS/0/SD_ILS:13008272024-06-20T13:58:56Z2024-06-20T13:58:56Zby Haidar, Bilal.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3057687">Click to View</a><br/>Format: Electronic Resources<br/>Hacking the art of exploitationent://SD_ILS/0/SD_ILS:20522822024-06-20T13:58:56Z2024-06-20T13:58:56Zby Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1137538">Click to View</a><br/>Format: Electronic Resources<br/>Information security a manager's guide to thwarting data thieves and hackersent://SD_ILS/0/SD_ILS:20480172024-06-20T13:58:56Z2024-06-20T13:58:56Zby Alexander, Philip, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=339307">Click to View</a><br/>Format: Electronic Resources<br/>