Search Results for - Narrowed by: O'reilly E-Books - 2009 - COMPUTERS -- Networking -- Security.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AOREILLY$002509O$002527reilly$002bE-Books$0026qf$003dPUBDATE$002509Publication$002bDate$0025092009$0025092009$0026qf$003dSUBJECT$002509Subject$002509COMPUTERS$002b--$002bNetworking$002b--$002bSecurity.$002509COMPUTERS$002b--$002bNetworking$002b--$002bSecurity.$0026ps$003d300?2024-09-27T03:00:15ZCompTIA Security+ Deluxe study guideent://SD_ILS/0/SD_ILS:22863302024-09-27T03:00:15Z2024-09-27T03:00:15Zby Dulaney, Emmett A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470372968/?ar">https://go.oreilly.com/library-access/library/view/-/9780470372968/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470372968/?ar">https://learning.oreilly.com/library/view/~/9780470372968/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470372968">https://learning.oreilly.com/library/view/~/9780470372968</a><br/>Format: Electronic Resources<br/>GFI network security and PCI compliance power toolsent://SD_ILS/0/SD_ILS:22861592024-09-27T03:00:15Z2024-09-27T03:00:15Zby Posey, Brien.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492850/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492850/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492850/?ar">https://learning.oreilly.com/library/view/~/9781597492850/?ar</a><br/>Format: Electronic Resources<br/>The Mac hacker's handbookent://SD_ILS/0/SD_ILS:22863412024-09-27T03:00:15Z2024-09-27T03:00:15Zby Miller, Charles, 1951-<br/><a href="https://learning.oreilly.com/library/view/~/9781118080337/?ar">https://learning.oreilly.com/library/view/~/9781118080337/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118080337/?ar">https://go.oreilly.com/library-access/library/view/-/9781118080337/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118080337">https://learning.oreilly.com/library/view/~/9781118080337</a><br/>Format: Electronic Resources<br/>Cisco router and switch forensics : investigating and analyzing malicious network activityent://SD_ILS/0/SD_ILS:22871802024-09-27T03:00:15Z2024-09-27T03:00:15Zby Liu, Dale.<br/><a href="https://learning.oreilly.com/library/view/~/9781597494182">https://learning.oreilly.com/library/view/~/9781597494182</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494182/?ar">https://learning.oreilly.com/library/view/~/9781597494182/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597494182/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494182/?ar</a><br/>Format: Electronic Resources<br/>Cloud security and privacyent://SD_ILS/0/SD_ILS:22874512024-09-27T03:00:15Z2024-09-27T03:00:15Zby Mather, Tim.<br/><a href="https://learning.oreilly.com/library/view/~/9780596806453/?ar">https://learning.oreilly.com/library/view/~/9780596806453/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780596806453/?ar">https://go.oreilly.com/library-access/library/view/-/9780596806453/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596806453">https://learning.oreilly.com/library/view/~/9780596806453</a><br/>Format: Electronic Resources<br/>Gray hat Python : Python programming for hackers and reverse engineersent://SD_ILS/0/SD_ILS:22878622024-09-27T03:00:15Z2024-09-27T03:00:15Zby Seitz, Justin.<br/><a href="https://learning.oreilly.com/library/view/~/9781593271923">https://learning.oreilly.com/library/view/~/9781593271923</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781593271923/?ar">https://go.oreilly.com/library-access/library/view/-/9781593271923/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781593271923/?ar">https://learning.oreilly.com/library/view/~/9781593271923/?ar</a><br/>Format: Electronic Resources<br/>Apache : recepturyent://SD_ILS/0/SD_ILS:22968682024-09-27T03:00:15Z2024-09-27T03:00:15Zby Bowen, Richard Cooper, 1971-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457176425/?ar">https://go.oreilly.com/library-access/library/view/-/9781457176425/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457176425/?ar">https://learning.oreilly.com/library/view/~/9781457176425/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457176425">https://learning.oreilly.com/library/view/~/9781457176425</a><br/>Format: Electronic Resources<br/>The definitive guide to the C & A transformation : the first publication of a comprehensive view Of the C & A transformationent://SD_ILS/0/SD_ILS:22903062024-09-27T03:00:15Z2024-09-27T03:00:15Zby Mehan, Julie E.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281294/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281294/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281294/?ar">https://learning.oreilly.com/library/view/~/9781849281294/?ar</a><br/>Format: Electronic Resources<br/>How to survive a data breach : a pocket guideent://SD_ILS/0/SD_ILS:22900792024-09-27T03:00:15Z2024-09-27T03:00:15Zby Mitchell, Stewart.<br/><a href="https://learning.oreilly.com/library/view/~/9781905356966">https://learning.oreilly.com/library/view/~/9781905356966</a>
<a href="https://learning.oreilly.com/library/view/~/9781905356966/?ar">https://learning.oreilly.com/library/view/~/9781905356966/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781905356966/?ar">https://go.oreilly.com/library-access/library/view/-/9781905356966/?ar</a><br/>Format: Electronic Resources<br/>Mobile malware attacks and defenseent://SD_ILS/0/SD_ILS:22944762024-09-27T03:00:15Z2024-09-27T03:00:15Zby Dunham, Ken.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492980/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492980/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492980/?ar">https://learning.oreilly.com/library/view/~/9781597492980/?ar</a><br/>Format: Electronic Resources<br/>E-discovery : creating and managing an enterprisewide program : a technical guide to digital investigation and litigation supportent://SD_ILS/0/SD_ILS:22865292024-09-27T03:00:15Z2024-09-27T03:00:15Zby Schuler, Karen.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492966/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492966/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492966/?ar">https://learning.oreilly.com/library/view/~/9781597492966/?ar</a><br/>Format: Electronic Resources<br/>Virtualization for security : including sandboxing, disaster recovery, high availability, forensic analysis, and honeypottingent://SD_ILS/0/SD_ILS:22865302024-09-27T03:00:15Z2024-09-27T03:00:15Zby Hoopes, John.<br/><a href="https://learning.oreilly.com/library/view/~/9781597493055">https://learning.oreilly.com/library/view/~/9781597493055</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597493055/?ar">https://go.oreilly.com/library-access/library/view/-/9781597493055/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597493055/?ar">https://learning.oreilly.com/library/view/~/9781597493055/?ar</a><br/>Format: Electronic Resources<br/>Mobile Security : a Pocket Guide.ent://SD_ILS/0/SD_ILS:22886252024-09-27T03:00:15Z2024-09-27T03:00:15Zby Furnell, Steven.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281225/?ar">https://learning.oreilly.com/library/view/~/9781849281225/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849281225/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281225/?ar</a><br/>Format: Electronic Resources<br/>SAP security configuration and deployment : the IT administrator's guide to best practicesent://SD_ILS/0/SD_ILS:22859852024-09-27T03:00:15Z2024-09-27T03:00:15Zby Wun-Young, Leslie.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492843">https://learning.oreilly.com/library/view/~/9781597492843</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492843/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492843/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492843/?ar">https://learning.oreilly.com/library/view/~/9781597492843/?ar</a><br/>Format: Electronic Resources<br/>Next generation SSH2 implementation : securing data in motionent://SD_ILS/0/SD_ILS:22859862024-09-27T03:00:15Z2024-09-27T03:00:15Zby Liu, Dale.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492836/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492836/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492836/?ar">https://learning.oreilly.com/library/view/~/9781597492836/?ar</a><br/>Format: Electronic Resources<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:22868042024-09-27T03:00:15Z2024-09-27T03:00:15Zby Vacca, John R.<br/><a href="https://learning.oreilly.com/library/view/~/9780080921945">https://learning.oreilly.com/library/view/~/9780080921945</a>
<a href="https://learning.oreilly.com/library/view/~/9780080921945/?ar">https://learning.oreilly.com/library/view/~/9780080921945/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780080921945/?ar">https://go.oreilly.com/library-access/library/view/-/9780080921945/?ar</a><br/>Format: Electronic Resources<br/>Security in a Web 2.0+ world : a standards based approachent://SD_ILS/0/SD_ILS:22884642024-09-27T03:00:15Z2024-09-27T03:00:15Zby Solari, C. (Carlos)<br/><a href="https://learning.oreilly.com/library/view/~/9780470745755/?ar">https://learning.oreilly.com/library/view/~/9780470745755/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470745755">https://learning.oreilly.com/library/view/~/9780470745755</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470745755/?ar">https://go.oreilly.com/library-access/library/view/-/9780470745755/?ar</a><br/>Format: Electronic Resources<br/>ModSecurity 2.5 : securing your Apache installation and web applications : prevent web application hacking with this easy-to-use guideent://SD_ILS/0/SD_ILS:22888452024-09-27T03:00:15Z2024-09-27T03:00:15Zby Mischel, Magnus.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781847194749/?ar">https://go.oreilly.com/library-access/library/view/-/9781847194749/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781847194749">https://learning.oreilly.com/library/view/~/9781847194749</a>
<a href="https://learning.oreilly.com/library/view/~/9781847194749/?ar">https://learning.oreilly.com/library/view/~/9781847194749/?ar</a><br/>Format: Electronic Resources<br/>Security in wireless ad hoc and sensor networksent://SD_ILS/0/SD_ILS:22858542024-09-27T03:00:15Z2024-09-27T03:00:15Zby Çayirci, E. (Erdal)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470027486/?ar">https://go.oreilly.com/library-access/library/view/-/9780470027486/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470027486/?ar">https://learning.oreilly.com/library/view/~/9780470027486/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470027486">https://learning.oreilly.com/library/view/~/9780470027486</a><br/>Format: Electronic Resources<br/>Mac OS X, iPod, and iPhone forensic analysis DVD toolkitent://SD_ILS/0/SD_ILS:22872012024-09-27T03:00:15Z2024-09-27T03:00:15Zby Kubasiak, Ryan R.<br/><a href="https://learning.oreilly.com/library/view/~/9780080949185/?ar">https://learning.oreilly.com/library/view/~/9780080949185/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780080949185">https://learning.oreilly.com/library/view/~/9780080949185</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780080949185/?ar">https://go.oreilly.com/library-access/library/view/-/9780080949185/?ar</a><br/>Format: Electronic Resources<br/>Information Security Breaches : Avoidance and Treatment based on ISO27001.ent://SD_ILS/0/SD_ILS:22886162024-09-27T03:00:15Z2024-09-27T03:00:15Zby Krausz, Michael.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280273">https://learning.oreilly.com/library/view/~/9781849280273</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849280273/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280273/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849280273/?ar">https://learning.oreilly.com/library/view/~/9781849280273/?ar</a><br/>Format: Electronic Resources<br/>Security testing handbook for banking applicationsent://SD_ILS/0/SD_ILS:22886202024-09-27T03:00:15Z2024-09-27T03:00:15Zby Doraiswamy, Arvind.<br/><a href="https://learning.oreilly.com/library/view/~/9781905356829/?ar">https://learning.oreilly.com/library/view/~/9781905356829/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781905356829/?ar">https://go.oreilly.com/library-access/library/view/-/9781905356829/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281089">https://learning.oreilly.com/library/view/~/9781849281089</a>
<a href="https://learning.oreilly.com/library/view/~/9781905356829">https://learning.oreilly.com/library/view/~/9781905356829</a><br/>Format: Electronic Resources<br/>How to secure and audit Oracle 10g and 11gent://SD_ILS/0/SD_ILS:22863242024-09-27T03:00:15Z2024-09-27T03:00:15Zby Ben-Natan, Ron.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781420084139/?ar">https://go.oreilly.com/library-access/library/view/-/9781420084139/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420084139/?ar">https://learning.oreilly.com/library/view/~/9781420084139/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420084139">https://learning.oreilly.com/library/view/~/9781420084139</a><br/>Format: Electronic Resources<br/>The myths of security : what the computer security industry doesn't want you to knowent://SD_ILS/0/SD_ILS:22869382024-09-27T03:00:15Z2024-09-27T03:00:15Zby Viega, John.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780596803957/?ar">https://go.oreilly.com/library-access/library/view/-/9780596803957/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596803957/?ar">https://learning.oreilly.com/library/view/~/9780596803957/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596803957">https://learning.oreilly.com/library/view/~/9780596803957</a><br/>Format: Electronic Resources<br/>Beautiful securityent://SD_ILS/0/SD_ILS:22868882024-09-27T03:00:15Z2024-09-27T03:00:15Zby Oram, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9780596801786/?ar">https://learning.oreilly.com/library/view/~/9780596801786/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596801786">https://learning.oreilly.com/library/view/~/9780596801786</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780596801786/?ar">https://go.oreilly.com/library-access/library/view/-/9780596801786/?ar</a><br/>Format: Electronic Resources<br/>CompTIA Security+ study guideent://SD_ILS/0/SD_ILS:22869012024-09-27T03:00:15Z2024-09-27T03:00:15Zby Dulaney, Emmett A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470372975/?ar">https://go.oreilly.com/library-access/library/view/-/9780470372975/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470372975/?ar">https://learning.oreilly.com/library/view/~/9780470372975/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470372975">https://learning.oreilly.com/library/view/~/9780470372975</a><br/>Format: Electronic Resources<br/>