Search Results for - Narrowed by: 2002 - Computer networks -- Security measures. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092002$0025092002$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300? 2024-05-20T10:58:33Z Introduction to Communication Electronic Warfare Systems. ent://SD_ILS/0/SD_ILS:1183329 2024-05-20T10:58:33Z 2024-05-20T10:58:33Z by&#160;Poisel, Richard.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227618">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Comparison of recovery requirements with investigation requirements for intrusion management systems ent://SD_ILS/0/SD_ILS:25247 2024-05-20T10:58:33Z 2024-05-20T10:58:33Z by&#160;Arpa&ccedil;ay Tapucu, Dilek.<br/><a href="http://hdl.handle.net/11147/3463">Access to Electronic Version.</a><br/>Format:&#160;Manuscript<br/> Information security best practices 205 basic rules ent://SD_ILS/0/SD_ILS:65092 2024-05-20T10:58:33Z 2024-05-20T10:58:33Z by&#160;Stefanek, George L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781878707963">An electronic book accessible through the World Wide Web; click for information</a> Publisher description <a href="http://www.loc.gov/catdir/description/els031/2002016635.html">http://www.loc.gov/catdir/description/els031/2002016635.html</a> Table of contents <a href="http://www.loc.gov/catdir/toc/els031/2002016635.html">http://www.loc.gov/catdir/toc/els031/2002016635.html</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing your wireless network ent://SD_ILS/0/SD_ILS:65582 2024-05-20T10:58:33Z 2024-05-20T10:58:33Z by&#160;Barnes, Christian.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994596">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Data networks routing, security, and performance optimization ent://SD_ILS/0/SD_ILS:65644 2024-05-20T10:58:33Z 2024-05-20T10:58:33Z by&#160;Kenyon, Tony, 1960-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582715">An electronic book accessible through the World Wide Web; click for information</a> Publisher description <a href="http://www.loc.gov/catdir/description/els031/2002019364.html">http://www.loc.gov/catdir/description/els031/2002019364.html</a> Table of contents <a href="http://www.loc.gov/catdir/toc/els031/2002019364.html">http://www.loc.gov/catdir/toc/els031/2002019364.html</a><br/>Format:&#160;Electronic Resources<br/> Standards And Practices Necessary To Implement A Successful Security Review Program For Intrusion Management Systems ent://SD_ILS/0/SD_ILS:48243 2024-05-20T10:58:33Z 2024-05-20T10:58:33Z by&#160;Doruk, Alpay.<br/><a href="http://hdl.handle.net/11147/3706">Access to Electronic Version.</a><br/>Format:&#160;Manuscript<br/> Nokia network security solutions handbook ent://SD_ILS/0/SD_ILS:65902 2024-05-20T10:58:33Z 2024-05-20T10:58:33Z by&#160;Maxwell, Doug.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836708">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> ISA server and beyond real world security solutions for Microsoft enterprise networks ent://SD_ILS/0/SD_ILS:65706 2024-05-20T10:58:33Z 2024-05-20T10:58:33Z by&#160;Shinder, Thomas W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836661">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Disappearing cryptography information hiding : steganography &amp; watermarking ent://SD_ILS/0/SD_ILS:65679 2024-05-20T10:58:33Z 2024-05-20T10:58:33Z by&#160;Wayner, Peter, 1964-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607699">An electronic book accessible through the World Wide Web; click for information</a> Publisher description <a href="http://www.loc.gov/catdir/description/els031/2001099790.html">http://www.loc.gov/catdir/description/els031/2001099790.html</a> Table of contents <a href="http://www.loc.gov/catdir/toc/els031/2001099790.html">http://www.loc.gov/catdir/toc/els031/2001099790.html</a><br/>Format:&#160;Electronic Resources<br/> Managing Cisco network security ent://SD_ILS/0/SD_ILS:65693 2024-05-20T10:58:33Z 2024-05-20T10:58:33Z by&#160;Danielyan, Edgar.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836562">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing your network ent://SD_ILS/0/SD_ILS:65753 2024-05-20T10:58:33Z 2024-05-20T10:58:33Z by&#160;Ahmad, David R. Mirza.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994701">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Scene of the cybercrime computer forensics handbook ent://SD_ILS/0/SD_ILS:65871 2024-05-20T10:58:33Z 2024-05-20T10:58:33Z by&#160;Shinder, Debra Littlejohn.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836654">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Hackproofing Your Wireless Network. ent://SD_ILS/0/SD_ILS:1192049 2024-05-20T10:58:33Z 2024-05-20T10:58:33Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294161">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hack Proofing ColdFusion : The Only Way to Stop a Hacker Is to Think Like One. ent://SD_ILS/0/SD_ILS:1192040 2024-05-20T10:58:33Z 2024-05-20T10:58:33Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294151">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Nokia Network Security Solutions Handbook. ent://SD_ILS/0/SD_ILS:1192081 2024-05-20T10:58:33Z 2024-05-20T10:58:33Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294289">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cisco Security Specialists Guide to PIX Firewall. ent://SD_ILS/0/SD_ILS:1191996 2024-05-20T10:58:33Z 2024-05-20T10:58:33Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294036">Click to View</a><br/>Format:&#160;Electronic Resources<br/>