Search Results for - Narrowed by: Ebrary Collection - 2008 - Computer security. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AONLINEEBR$002509Ebrary$002bCollection$0026qf$003dPUBDATE$002509Publication$002bDate$0025092008$0025092008$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300? 2024-06-20T13:58:56Z Trust and Security in Collaborative Computing. ent://SD_ILS/0/SD_ILS:1270688 2024-06-20T13:58:56Z 2024-06-20T13:58:56Z by&#160;Zou, Xukai.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1679354">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Implementing Email and Security Tokens : Current Standards, Tools, and Practices. ent://SD_ILS/0/SD_ILS:1197762 2024-06-20T13:58:56Z 2024-06-20T13:58:56Z by&#160;Turner, Sean.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=343700">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Secure Computer and Network Systems : Modeling, Analysis and Design. ent://SD_ILS/0/SD_ILS:1198644 2024-06-20T13:58:56Z 2024-06-20T13:58:56Z by&#160;Ye, Nong.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=351427">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information Security : Policy, Processes, and Practices. ent://SD_ILS/0/SD_ILS:1205359 2024-06-20T13:58:56Z 2024-06-20T13:58:56Z by&#160;Goodman, Seymour.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=435197">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer Forensics For Dummies. ent://SD_ILS/0/SD_ILS:1199862 2024-06-20T13:58:56Z 2024-06-20T13:58:56Z by&#160;Volonino, Linda.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=380503">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing Information and Communications Systems : Principles, Technologies, and Applications. ent://SD_ILS/0/SD_ILS:1207713 2024-06-20T13:58:56Z 2024-06-20T13:58:56Z by&#160;Lopez, Javier.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=456881">Click to View</a><br/>Format:&#160;Electronic Resources<br/> A Comparison between Smart Cards and Trusted Platform Modules in Business Scenarios. ent://SD_ILS/0/SD_ILS:1220485 2024-06-20T13:58:56Z 2024-06-20T13:58:56Z by&#160;Murhammer, Martin W.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=616678">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Fuzzing for Software Security Testing and Quality Assurance. ent://SD_ILS/0/SD_ILS:1207716 2024-06-20T13:58:56Z 2024-06-20T13:58:56Z by&#160;Takanen, Ari.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=456884">Click to View</a><br/>Format:&#160;Electronic Resources<br/> CompTIA Security+ 2008 In Depth. ent://SD_ILS/0/SD_ILS:1304858 2024-06-20T13:58:56Z 2024-06-20T13:58:56Z by&#160;Ciampa, Mark.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3136117">Click to View</a><br/>Format:&#160;Electronic Resources<br/> ASP.NET 3.5 Security, Membership, and Role Management with C# and VB. ent://SD_ILS/0/SD_ILS:1300827 2024-06-20T13:58:56Z 2024-06-20T13:58:56Z by&#160;Haidar, Bilal.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3057687">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking the art of exploitation ent://SD_ILS/0/SD_ILS:2052282 2024-06-20T13:58:56Z 2024-06-20T13:58:56Z by&#160;Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1137538">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information security a manager's guide to thwarting data thieves and hackers ent://SD_ILS/0/SD_ILS:2048017 2024-06-20T13:58:56Z 2024-06-20T13:58:56Z by&#160;Alexander, Philip, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=339307">Click to View</a><br/>Format:&#160;Electronic Resources<br/>