Search Results for - Narrowed by: 2002 - Computer security. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092002$0025092002$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue? 2024-09-22T17:21:45Z Honeypots : tracking hackers ent://SD_ILS/0/SD_ILS:2280821 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;Spitzner, Lance.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321108957/?ar">https://go.oreilly.com/library-access/library/view/-/0321108957/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321108957/?ar">https://learning.oreilly.com/library/view/~/0321108957/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321108957">https://learning.oreilly.com/library/view/~/0321108957</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing your network ent://SD_ILS/0/SD_ILS:2280760 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;Ahmad, David R. Mirza.<br/><a href="https://learning.oreilly.com/library/view/~/9781928994701">https://learning.oreilly.com/library/view/~/9781928994701</a> <a href="https://www.sciencedirect.com/science/book/9781928994701">https://www.sciencedirect.com/science/book/9781928994701</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781928994701/?ar">https://go.oreilly.com/library-access/library/view/-/9781928994701/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781928994701/?ar">https://learning.oreilly.com/library/view/~/9781928994701/?ar</a><br/>Format:&#160;Electronic Resources<br/> Privacy defended : protecting yourself online ent://SD_ILS/0/SD_ILS:2280776 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;Bahadur, Gary.<br/><a href="https://learning.oreilly.com/library/view/~/078972605X">https://learning.oreilly.com/library/view/~/078972605X</a> <a href="https://learning.oreilly.com/library/view/~/078972605X/?ar">https://learning.oreilly.com/library/view/~/078972605X/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/078972605X/?ar">https://go.oreilly.com/library-access/library/view/-/078972605X/?ar</a><br/>Format:&#160;Electronic Resources<br/> Building an information security awareness program ent://SD_ILS/0/SD_ILS:2281782 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;Desman, Mark B.<br/><a href="https://learning.oreilly.com/library/view/~/9781420000054">https://learning.oreilly.com/library/view/~/9781420000054</a> <a href="https://learning.oreilly.com/library/view/~/9781420000054/?ar">https://learning.oreilly.com/library/view/~/9781420000054/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781420000054/?ar">https://go.oreilly.com/library-access/library/view/-/9781420000054/?ar</a><br/>Format:&#160;Electronic Resources<br/> IBM WebSphere V5.0 security ent://SD_ILS/0/SD_ILS:2300110 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;Kovari, Peter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738425494/?ar">https://go.oreilly.com/library-access/library/view/-/0738425494/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738425494/?ar">https://learning.oreilly.com/library/view/~/0738425494/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738425494">https://learning.oreilly.com/library/view/~/0738425494</a><br/>Format:&#160;Electronic Resources<br/> Check Point NG : next generation security administration ent://SD_ILS/0/SD_ILS:2306066 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;Simonis, Drew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781928994749/?ar">https://learning.oreilly.com/library/view/~/9781928994749/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781928994749/?ar">https://go.oreilly.com/library-access/library/view/-/9781928994749/?ar</a><br/>Format:&#160;Electronic Resources<br/> An introduction to security in a CSM 1.3 for AIX 5L environment ent://SD_ILS/0/SD_ILS:2287827 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;Lascu, Octavian.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738427896/?ar">https://go.oreilly.com/library-access/library/view/-/0738427896/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738427896/?ar">https://learning.oreilly.com/library/view/~/0738427896/?ar</a><br/>Format:&#160;Electronic Resources<br/> Web Hacking : Attacks and Defense. ent://SD_ILS/0/SD_ILS:2317972 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;McClure, Stuart, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0201761769/?ar">https://go.oreilly.com/library-access/library/view/-/0201761769/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0201761769">https://learning.oreilly.com/library/view/~/0201761769</a> <a href="https://learning.oreilly.com/library/view/~/0201761769/?ar">https://learning.oreilly.com/library/view/~/0201761769/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network security : private communication in a public world ent://SD_ILS/0/SD_ILS:2285375 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;Kaufman, Charlie, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780137155880/?ar">https://go.oreilly.com/library-access/library/view/-/9780137155880/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780137155880/?ar">https://learning.oreilly.com/library/view/~/9780137155880/?ar</a><br/>Format:&#160;Electronic Resources<br/> Crackproof your software the best ways to protect your software against crackers ent://SD_ILS/0/SD_ILS:2047636 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;C̆ervĕn, Pavol.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=273482">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Developing Secure Distributed Systems with CORBA. ent://SD_ILS/0/SD_ILS:1183314 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;Land, Ulrich.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227602">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Special Issue On Internet Security. ent://SD_ILS/0/SD_ILS:1183888 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;Warren, Mathew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=232281">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing XML ent://SD_ILS/0/SD_ILS:65723 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;'ken'@ftu.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836500">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Scene of the cybercrime computer forensics handbook ent://SD_ILS/0/SD_ILS:65871 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;Shinder, Debra Littlejohn.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836654">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Information security best practices 205 basic rules ent://SD_ILS/0/SD_ILS:65092 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;Stefanek, George L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781878707963">An electronic book accessible through the World Wide Web; click for information</a> Publisher description <a href="http://www.loc.gov/catdir/description/els031/2002016635.html">http://www.loc.gov/catdir/description/els031/2002016635.html</a> Table of contents <a href="http://www.loc.gov/catdir/toc/els031/2002016635.html">http://www.loc.gov/catdir/toc/els031/2002016635.html</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing ColdFusion ent://SD_ILS/0/SD_ILS:65646 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;Meyer, Greg.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994770">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Comparison of recovery requirements with investigation requirements for intrusion management systems ent://SD_ILS/0/SD_ILS:25247 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;Arpa&ccedil;ay Tapucu, Dilek.<br/><a href="http://hdl.handle.net/11147/3463">Access to Electronic Version.</a><br/>Format:&#160;Manuscript<br/> Computer security: art and science ent://SD_ILS/0/SD_ILS:11398 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;Bishop, Matt.<br/>Format:&#160;Books<br/> Cryptanalysis of number theretic ciphers ent://SD_ILS/0/SD_ILS:11983 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;Wagstaff, Samuel S.<br/>Format:&#160;Books<br/> Hack Proofing XML. ent://SD_ILS/0/SD_ILS:1192044 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294155">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hack I.T. : security through penetration testing ent://SD_ILS/0/SD_ILS:2280820 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;Klevinsky, T. J.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0201719568/?ar">https://go.oreilly.com/library-access/library/view/-/0201719568/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0201719568">https://learning.oreilly.com/library/view/~/0201719568</a> <a href="https://learning.oreilly.com/library/view/~/0201719568/?ar">https://learning.oreilly.com/library/view/~/0201719568/?ar</a><br/>Format:&#160;Electronic Resources<br/> Scene of the cybercrime : computer forensics handbook ent://SD_ILS/0/SD_ILS:2280756 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;Shinder, Debra Littlejohn, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781931836654">https://learning.oreilly.com/library/view/~/9781931836654</a> <a href="https://learning.oreilly.com/library/view/~/9781931836654/?ar">https://learning.oreilly.com/library/view/~/9781931836654/?ar</a> <a href="https://www.sciencedirect.com/science/book/9781931836654">https://www.sciencedirect.com/science/book/9781931836654</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781931836654/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836654/?ar</a><br/>Format:&#160;Electronic Resources<br/> The art of deception : controlling the human element of security ent://SD_ILS/0/SD_ILS:2280746 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;Mitnick, Kevin D. (Kevin David), 1963- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780764542800/?ar">https://learning.oreilly.com/library/view/~/9780764542800/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780764542800/?ar">https://go.oreilly.com/library-access/library/view/-/9780764542800/?ar</a><br/>Format:&#160;Electronic Resources<br/> Building secure software : how to avoid security problems the right way ent://SD_ILS/0/SD_ILS:2288354 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;Viega, John.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780672334092/?ar">https://go.oreilly.com/library-access/library/view/-/9780672334092/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780672334092/?ar">https://learning.oreilly.com/library/view/~/9780672334092/?ar</a><br/>Format:&#160;Electronic Resources<br/> Secure XML : the New Syntax for Signatures and Encryption. ent://SD_ILS/0/SD_ILS:2290491 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;Niles, Kitty, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0201756056/?ar">https://go.oreilly.com/library-access/library/view/-/0201756056/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0201756056">https://learning.oreilly.com/library/view/~/0201756056</a> <a href="https://learning.oreilly.com/library/view/~/0201756056/?ar">https://learning.oreilly.com/library/view/~/0201756056/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hack Proofing ColdFusion : The Only Way to Stop a Hacker Is to Think Like One. ent://SD_ILS/0/SD_ILS:1192040 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294151">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Checkpoint Next Generation Security Administration. ent://SD_ILS/0/SD_ILS:1191991 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294029">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Analysis, Design and Implementation of Secure and Interoperable Distributed Health Information Systems : Analysis, Design and Implementation for Secure and Interoperable Distributed Heal. ent://SD_ILS/0/SD_ILS:1187196 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;Blobel, B.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=267473">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security Technologies for the World Wide Web. ent://SD_ILS/0/SD_ILS:1183330 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;Oppliger, Rolf.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227620">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity Today and Tomorrow : Pay Now or Pay Later. ent://SD_ILS/0/SD_ILS:1317271 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;National Research Council (U.S.), Computer Science and Telecommunications Board Staff.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3375180">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Putting the Latest z/OS Security Features to Work. ent://SD_ILS/0/SD_ILS:1310054 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306663">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Windows 2000 Security. ent://SD_ILS/0/SD_ILS:1304509 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;Gupta, Rashi.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3135756">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Java Security. ent://SD_ILS/0/SD_ILS:1304451 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;Sethi, Harpreet.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3135698">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Linux Security. ent://SD_ILS/0/SD_ILS:1304458 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;Siddiqui, Shadab.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3135705">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Security in a CSM 1.3 for AIX 5L Environment. ent://SD_ILS/0/SD_ILS:1310103 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306712">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network Interdiction and Stochastic Integer Programming. ent://SD_ILS/0/SD_ILS:1296857 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;Woodruff, David L.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3036010">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer Security : Art and Science. ent://SD_ILS/0/SD_ILS:2318012 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;Bishop, Matthew A. (Matthew A.) author.<br/><a href="https://learning.oreilly.com/library/view/~/0201440997">https://learning.oreilly.com/library/view/~/0201440997</a> <a href="https://learning.oreilly.com/library/view/~/0201440997/?ar">https://learning.oreilly.com/library/view/~/0201440997/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0201440997/?ar">https://go.oreilly.com/library-access/library/view/-/0201440997/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security in Computing, Third Edition ent://SD_ILS/0/SD_ILS:2326579 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;Pfleeger, Charles, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0130355488/?ar">https://go.oreilly.com/library-access/library/view/-/0130355488/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0130355488/?ar">https://learning.oreilly.com/library/view/~/0130355488/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0130355488">https://learning.oreilly.com/library/view/~/0130355488</a><br/>Format:&#160;Electronic Resources<br/> Network Intrusion Detection, Third Edition ent://SD_ILS/0/SD_ILS:2319734 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;Northcutt, Stephen, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0735712654/?ar">https://go.oreilly.com/library-access/library/view/-/0735712654/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0735712654">https://learning.oreilly.com/library/view/~/0735712654</a> <a href="https://learning.oreilly.com/library/view/~/0735712654/?ar">https://learning.oreilly.com/library/view/~/0735712654/?ar</a><br/>Format:&#160;Electronic Resources<br/> Maximum Security, Fourth Edition ent://SD_ILS/0/SD_ILS:2319594 2024-09-22T17:21:45Z 2024-09-22T17:21:45Z by&#160;Anonymous, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0672324598/?ar">https://go.oreilly.com/library-access/library/view/-/0672324598/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0672324598">https://learning.oreilly.com/library/view/~/0672324598</a> <a href="https://learning.oreilly.com/library/view/~/0672324598/?ar">https://learning.oreilly.com/library/view/~/0672324598/?ar</a><br/>Format:&#160;Electronic Resources<br/>