Search Results for - Narrowed by: 2002 - Computer networks -- Security measures.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092002$0025092002$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300?2024-05-20T10:58:33ZIntroduction to Communication Electronic Warfare Systems.ent://SD_ILS/0/SD_ILS:11833292024-05-20T10:58:33Z2024-05-20T10:58:33Zby Poisel, Richard.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227618">Click to View</a><br/>Format: Electronic Resources<br/>Comparison of recovery requirements with investigation requirements for intrusion management systemsent://SD_ILS/0/SD_ILS:252472024-05-20T10:58:33Z2024-05-20T10:58:33Zby Arpaçay Tapucu, Dilek.<br/><a href="http://hdl.handle.net/11147/3463">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Information security best practices 205 basic rulesent://SD_ILS/0/SD_ILS:650922024-05-20T10:58:33Z2024-05-20T10:58:33Zby Stefanek, George L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781878707963">An electronic book accessible through the World Wide Web; click for information</a>
Publisher description <a href="http://www.loc.gov/catdir/description/els031/2002016635.html">http://www.loc.gov/catdir/description/els031/2002016635.html</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/els031/2002016635.html">http://www.loc.gov/catdir/toc/els031/2002016635.html</a><br/>Format: Electronic Resources<br/>Hack proofing your wireless networkent://SD_ILS/0/SD_ILS:655822024-05-20T10:58:33Z2024-05-20T10:58:33Zby Barnes, Christian.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994596">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Data networks routing, security, and performance optimizationent://SD_ILS/0/SD_ILS:656442024-05-20T10:58:33Z2024-05-20T10:58:33Zby Kenyon, Tony, 1960-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582715">An electronic book accessible through the World Wide Web; click for information</a>
Publisher description <a href="http://www.loc.gov/catdir/description/els031/2002019364.html">http://www.loc.gov/catdir/description/els031/2002019364.html</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/els031/2002019364.html">http://www.loc.gov/catdir/toc/els031/2002019364.html</a><br/>Format: Electronic Resources<br/>Standards And Practices Necessary To Implement A Successful Security Review Program For Intrusion Management Systemsent://SD_ILS/0/SD_ILS:482432024-05-20T10:58:33Z2024-05-20T10:58:33Zby Doruk, Alpay.<br/><a href="http://hdl.handle.net/11147/3706">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Nokia network security solutions handbookent://SD_ILS/0/SD_ILS:659022024-05-20T10:58:33Z2024-05-20T10:58:33Zby Maxwell, Doug.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836708">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>ISA server and beyond real world security solutions for Microsoft enterprise networksent://SD_ILS/0/SD_ILS:657062024-05-20T10:58:33Z2024-05-20T10:58:33Zby Shinder, Thomas W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836661">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Disappearing cryptography information hiding : steganography & watermarkingent://SD_ILS/0/SD_ILS:656792024-05-20T10:58:33Z2024-05-20T10:58:33Zby Wayner, Peter, 1964-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607699">An electronic book accessible through the World Wide Web; click for information</a>
Publisher description <a href="http://www.loc.gov/catdir/description/els031/2001099790.html">http://www.loc.gov/catdir/description/els031/2001099790.html</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/els031/2001099790.html">http://www.loc.gov/catdir/toc/els031/2001099790.html</a><br/>Format: Electronic Resources<br/>Managing Cisco network securityent://SD_ILS/0/SD_ILS:656932024-05-20T10:58:33Z2024-05-20T10:58:33Zby Danielyan, Edgar.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836562">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Hack proofing your networkent://SD_ILS/0/SD_ILS:657532024-05-20T10:58:33Z2024-05-20T10:58:33Zby Ahmad, David R. Mirza.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994701">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Scene of the cybercrime computer forensics handbookent://SD_ILS/0/SD_ILS:658712024-05-20T10:58:33Z2024-05-20T10:58:33Zby Shinder, Debra Littlejohn.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836654">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Hackproofing Your Wireless Network.ent://SD_ILS/0/SD_ILS:11920492024-05-20T10:58:33Z2024-05-20T10:58:33Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294161">Click to View</a><br/>Format: Electronic Resources<br/>Hack Proofing ColdFusion : The Only Way to Stop a Hacker Is to Think Like One.ent://SD_ILS/0/SD_ILS:11920402024-05-20T10:58:33Z2024-05-20T10:58:33Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294151">Click to View</a><br/>Format: Electronic Resources<br/>Nokia Network Security Solutions Handbook.ent://SD_ILS/0/SD_ILS:11920812024-05-20T10:58:33Z2024-05-20T10:58:33Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294289">Click to View</a><br/>Format: Electronic Resources<br/>Cisco Security Specialists Guide to PIX Firewall.ent://SD_ILS/0/SD_ILS:11919962024-05-20T10:58:33Z2024-05-20T10:58:33Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294036">Click to View</a><br/>Format: Electronic Resources<br/>