Search Results for - Narrowed by: 2002 - Computer security.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092002$0025092002$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?2024-09-22T17:21:45ZHoneypots : tracking hackersent://SD_ILS/0/SD_ILS:22808212024-09-22T17:21:45Z2024-09-22T17:21:45Zby Spitzner, Lance.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321108957/?ar">https://go.oreilly.com/library-access/library/view/-/0321108957/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321108957/?ar">https://learning.oreilly.com/library/view/~/0321108957/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321108957">https://learning.oreilly.com/library/view/~/0321108957</a><br/>Format: Electronic Resources<br/>Hack proofing your networkent://SD_ILS/0/SD_ILS:22807602024-09-22T17:21:45Z2024-09-22T17:21:45Zby Ahmad, David R. Mirza.<br/><a href="https://learning.oreilly.com/library/view/~/9781928994701">https://learning.oreilly.com/library/view/~/9781928994701</a>
<a href="https://www.sciencedirect.com/science/book/9781928994701">https://www.sciencedirect.com/science/book/9781928994701</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781928994701/?ar">https://go.oreilly.com/library-access/library/view/-/9781928994701/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781928994701/?ar">https://learning.oreilly.com/library/view/~/9781928994701/?ar</a><br/>Format: Electronic Resources<br/>Privacy defended : protecting yourself onlineent://SD_ILS/0/SD_ILS:22807762024-09-22T17:21:45Z2024-09-22T17:21:45Zby Bahadur, Gary.<br/><a href="https://learning.oreilly.com/library/view/~/078972605X">https://learning.oreilly.com/library/view/~/078972605X</a>
<a href="https://learning.oreilly.com/library/view/~/078972605X/?ar">https://learning.oreilly.com/library/view/~/078972605X/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/078972605X/?ar">https://go.oreilly.com/library-access/library/view/-/078972605X/?ar</a><br/>Format: Electronic Resources<br/>Building an information security awareness programent://SD_ILS/0/SD_ILS:22817822024-09-22T17:21:45Z2024-09-22T17:21:45Zby Desman, Mark B.<br/><a href="https://learning.oreilly.com/library/view/~/9781420000054">https://learning.oreilly.com/library/view/~/9781420000054</a>
<a href="https://learning.oreilly.com/library/view/~/9781420000054/?ar">https://learning.oreilly.com/library/view/~/9781420000054/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781420000054/?ar">https://go.oreilly.com/library-access/library/view/-/9781420000054/?ar</a><br/>Format: Electronic Resources<br/>IBM WebSphere V5.0 securityent://SD_ILS/0/SD_ILS:23001102024-09-22T17:21:45Z2024-09-22T17:21:45Zby Kovari, Peter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738425494/?ar">https://go.oreilly.com/library-access/library/view/-/0738425494/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738425494/?ar">https://learning.oreilly.com/library/view/~/0738425494/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738425494">https://learning.oreilly.com/library/view/~/0738425494</a><br/>Format: Electronic Resources<br/>Check Point NG : next generation security administrationent://SD_ILS/0/SD_ILS:23060662024-09-22T17:21:45Z2024-09-22T17:21:45Zby Simonis, Drew, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781928994749/?ar">https://learning.oreilly.com/library/view/~/9781928994749/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781928994749/?ar">https://go.oreilly.com/library-access/library/view/-/9781928994749/?ar</a><br/>Format: Electronic Resources<br/>An introduction to security in a CSM 1.3 for AIX 5L environmentent://SD_ILS/0/SD_ILS:22878272024-09-22T17:21:45Z2024-09-22T17:21:45Zby Lascu, Octavian.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738427896/?ar">https://go.oreilly.com/library-access/library/view/-/0738427896/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738427896/?ar">https://learning.oreilly.com/library/view/~/0738427896/?ar</a><br/>Format: Electronic Resources<br/>Web Hacking : Attacks and Defense.ent://SD_ILS/0/SD_ILS:23179722024-09-22T17:21:45Z2024-09-22T17:21:45Zby McClure, Stuart, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0201761769/?ar">https://go.oreilly.com/library-access/library/view/-/0201761769/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0201761769">https://learning.oreilly.com/library/view/~/0201761769</a>
<a href="https://learning.oreilly.com/library/view/~/0201761769/?ar">https://learning.oreilly.com/library/view/~/0201761769/?ar</a><br/>Format: Electronic Resources<br/>Network security : private communication in a public worldent://SD_ILS/0/SD_ILS:22853752024-09-22T17:21:45Z2024-09-22T17:21:45Zby Kaufman, Charlie, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780137155880/?ar">https://go.oreilly.com/library-access/library/view/-/9780137155880/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780137155880/?ar">https://learning.oreilly.com/library/view/~/9780137155880/?ar</a><br/>Format: Electronic Resources<br/>Crackproof your software the best ways to protect your software against crackersent://SD_ILS/0/SD_ILS:20476362024-09-22T17:21:45Z2024-09-22T17:21:45Zby C̆ervĕn, Pavol.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=273482">Click to View</a><br/>Format: Electronic Resources<br/>Developing Secure Distributed Systems with CORBA.ent://SD_ILS/0/SD_ILS:11833142024-09-22T17:21:45Z2024-09-22T17:21:45Zby Land, Ulrich.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227602">Click to View</a><br/>Format: Electronic Resources<br/>Special Issue On Internet Security.ent://SD_ILS/0/SD_ILS:11838882024-09-22T17:21:45Z2024-09-22T17:21:45Zby Warren, Mathew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=232281">Click to View</a><br/>Format: Electronic Resources<br/>Hack proofing XMLent://SD_ILS/0/SD_ILS:657232024-09-22T17:21:45Z2024-09-22T17:21:45Zby 'ken'@ftu.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836500">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Scene of the cybercrime computer forensics handbookent://SD_ILS/0/SD_ILS:658712024-09-22T17:21:45Z2024-09-22T17:21:45Zby Shinder, Debra Littlejohn.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836654">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Information security best practices 205 basic rulesent://SD_ILS/0/SD_ILS:650922024-09-22T17:21:45Z2024-09-22T17:21:45Zby Stefanek, George L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781878707963">An electronic book accessible through the World Wide Web; click for information</a>
Publisher description <a href="http://www.loc.gov/catdir/description/els031/2002016635.html">http://www.loc.gov/catdir/description/els031/2002016635.html</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/els031/2002016635.html">http://www.loc.gov/catdir/toc/els031/2002016635.html</a><br/>Format: Electronic Resources<br/>Hack proofing ColdFusionent://SD_ILS/0/SD_ILS:656462024-09-22T17:21:45Z2024-09-22T17:21:45Zby Meyer, Greg.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994770">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Comparison of recovery requirements with investigation requirements for intrusion management systemsent://SD_ILS/0/SD_ILS:252472024-09-22T17:21:45Z2024-09-22T17:21:45Zby Arpaçay Tapucu, Dilek.<br/><a href="http://hdl.handle.net/11147/3463">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Computer security: art and scienceent://SD_ILS/0/SD_ILS:113982024-09-22T17:21:45Z2024-09-22T17:21:45Zby Bishop, Matt.<br/>Format: Books<br/>Cryptanalysis of number theretic ciphersent://SD_ILS/0/SD_ILS:119832024-09-22T17:21:45Z2024-09-22T17:21:45Zby Wagstaff, Samuel S.<br/>Format: Books<br/>Hack Proofing XML.ent://SD_ILS/0/SD_ILS:11920442024-09-22T17:21:45Z2024-09-22T17:21:45Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294155">Click to View</a><br/>Format: Electronic Resources<br/>Hack I.T. : security through penetration testingent://SD_ILS/0/SD_ILS:22808202024-09-22T17:21:45Z2024-09-22T17:21:45Zby Klevinsky, T. J.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0201719568/?ar">https://go.oreilly.com/library-access/library/view/-/0201719568/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0201719568">https://learning.oreilly.com/library/view/~/0201719568</a>
<a href="https://learning.oreilly.com/library/view/~/0201719568/?ar">https://learning.oreilly.com/library/view/~/0201719568/?ar</a><br/>Format: Electronic Resources<br/>Scene of the cybercrime : computer forensics handbookent://SD_ILS/0/SD_ILS:22807562024-09-22T17:21:45Z2024-09-22T17:21:45Zby Shinder, Debra Littlejohn, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781931836654">https://learning.oreilly.com/library/view/~/9781931836654</a>
<a href="https://learning.oreilly.com/library/view/~/9781931836654/?ar">https://learning.oreilly.com/library/view/~/9781931836654/?ar</a>
<a href="https://www.sciencedirect.com/science/book/9781931836654">https://www.sciencedirect.com/science/book/9781931836654</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781931836654/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836654/?ar</a><br/>Format: Electronic Resources<br/>The art of deception : controlling the human element of securityent://SD_ILS/0/SD_ILS:22807462024-09-22T17:21:45Z2024-09-22T17:21:45Zby Mitnick, Kevin D. (Kevin David), 1963- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780764542800/?ar">https://learning.oreilly.com/library/view/~/9780764542800/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780764542800/?ar">https://go.oreilly.com/library-access/library/view/-/9780764542800/?ar</a><br/>Format: Electronic Resources<br/>Building secure software : how to avoid security problems the right wayent://SD_ILS/0/SD_ILS:22883542024-09-22T17:21:45Z2024-09-22T17:21:45Zby Viega, John.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780672334092/?ar">https://go.oreilly.com/library-access/library/view/-/9780672334092/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780672334092/?ar">https://learning.oreilly.com/library/view/~/9780672334092/?ar</a><br/>Format: Electronic Resources<br/>Secure XML : the New Syntax for Signatures and Encryption.ent://SD_ILS/0/SD_ILS:22904912024-09-22T17:21:45Z2024-09-22T17:21:45Zby Niles, Kitty, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0201756056/?ar">https://go.oreilly.com/library-access/library/view/-/0201756056/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0201756056">https://learning.oreilly.com/library/view/~/0201756056</a>
<a href="https://learning.oreilly.com/library/view/~/0201756056/?ar">https://learning.oreilly.com/library/view/~/0201756056/?ar</a><br/>Format: Electronic Resources<br/>Hack Proofing ColdFusion : The Only Way to Stop a Hacker Is to Think Like One.ent://SD_ILS/0/SD_ILS:11920402024-09-22T17:21:45Z2024-09-22T17:21:45Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294151">Click to View</a><br/>Format: Electronic Resources<br/>Checkpoint Next Generation Security Administration.ent://SD_ILS/0/SD_ILS:11919912024-09-22T17:21:45Z2024-09-22T17:21:45Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294029">Click to View</a><br/>Format: Electronic Resources<br/>Analysis, Design and Implementation of Secure and Interoperable Distributed Health Information Systems : Analysis, Design and Implementation for Secure and Interoperable Distributed Heal.ent://SD_ILS/0/SD_ILS:11871962024-09-22T17:21:45Z2024-09-22T17:21:45Zby Blobel, B.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=267473">Click to View</a><br/>Format: Electronic Resources<br/>Security Technologies for the World Wide Web.ent://SD_ILS/0/SD_ILS:11833302024-09-22T17:21:45Z2024-09-22T17:21:45Zby Oppliger, Rolf.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227620">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity Today and Tomorrow : Pay Now or Pay Later.ent://SD_ILS/0/SD_ILS:13172712024-09-22T17:21:45Z2024-09-22T17:21:45Zby National Research Council (U.S.), Computer Science and Telecommunications Board Staff.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3375180">Click to View</a><br/>Format: Electronic Resources<br/>Putting the Latest z/OS Security Features to Work.ent://SD_ILS/0/SD_ILS:13100542024-09-22T17:21:45Z2024-09-22T17:21:45Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306663">Click to View</a><br/>Format: Electronic Resources<br/>Windows 2000 Security.ent://SD_ILS/0/SD_ILS:13045092024-09-22T17:21:45Z2024-09-22T17:21:45Zby Gupta, Rashi.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3135756">Click to View</a><br/>Format: Electronic Resources<br/>Java Security.ent://SD_ILS/0/SD_ILS:13044512024-09-22T17:21:45Z2024-09-22T17:21:45Zby Sethi, Harpreet.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3135698">Click to View</a><br/>Format: Electronic Resources<br/>Linux Security.ent://SD_ILS/0/SD_ILS:13044582024-09-22T17:21:45Z2024-09-22T17:21:45Zby Siddiqui, Shadab.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3135705">Click to View</a><br/>Format: Electronic Resources<br/>Introduction to Security in a CSM 1.3 for AIX 5L Environment.ent://SD_ILS/0/SD_ILS:13101032024-09-22T17:21:45Z2024-09-22T17:21:45Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306712">Click to View</a><br/>Format: Electronic Resources<br/>Network Interdiction and Stochastic Integer Programming.ent://SD_ILS/0/SD_ILS:12968572024-09-22T17:21:45Z2024-09-22T17:21:45Zby Woodruff, David L.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3036010">Click to View</a><br/>Format: Electronic Resources<br/>Computer Security : Art and Science.ent://SD_ILS/0/SD_ILS:23180122024-09-22T17:21:45Z2024-09-22T17:21:45Zby Bishop, Matthew A. (Matthew A.) author.<br/><a href="https://learning.oreilly.com/library/view/~/0201440997">https://learning.oreilly.com/library/view/~/0201440997</a>
<a href="https://learning.oreilly.com/library/view/~/0201440997/?ar">https://learning.oreilly.com/library/view/~/0201440997/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0201440997/?ar">https://go.oreilly.com/library-access/library/view/-/0201440997/?ar</a><br/>Format: Electronic Resources<br/>Security in Computing, Third Editionent://SD_ILS/0/SD_ILS:23265792024-09-22T17:21:45Z2024-09-22T17:21:45Zby Pfleeger, Charles, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0130355488/?ar">https://go.oreilly.com/library-access/library/view/-/0130355488/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0130355488/?ar">https://learning.oreilly.com/library/view/~/0130355488/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0130355488">https://learning.oreilly.com/library/view/~/0130355488</a><br/>Format: Electronic Resources<br/>Network Intrusion Detection, Third Editionent://SD_ILS/0/SD_ILS:23197342024-09-22T17:21:45Z2024-09-22T17:21:45Zby Northcutt, Stephen, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0735712654/?ar">https://go.oreilly.com/library-access/library/view/-/0735712654/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0735712654">https://learning.oreilly.com/library/view/~/0735712654</a>
<a href="https://learning.oreilly.com/library/view/~/0735712654/?ar">https://learning.oreilly.com/library/view/~/0735712654/?ar</a><br/>Format: Electronic Resources<br/>Maximum Security, Fourth Editionent://SD_ILS/0/SD_ILS:23195942024-09-22T17:21:45Z2024-09-22T17:21:45Zby Anonymous, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0672324598/?ar">https://go.oreilly.com/library-access/library/view/-/0672324598/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672324598">https://learning.oreilly.com/library/view/~/0672324598</a>
<a href="https://learning.oreilly.com/library/view/~/0672324598/?ar">https://learning.oreilly.com/library/view/~/0672324598/?ar</a><br/>Format: Electronic Resources<br/>