Search Results for - Narrowed by: 2003 - COMPUTERS -- Internet -- Security. - Sécurité informatique.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092003$0025092003$0026qf$003dSUBJECT$002509Subject$002509COMPUTERS$002b--$002bInternet$002b--$002bSecurity.$002509COMPUTERS$002b--$002bInternet$002b--$002bSecurity.$0026qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026ps$003d300?
2024-06-20T10:36:48Z
Practical UNIX and Internet security
ent://SD_ILS/0/SD_ILS:2281256
2024-06-20T10:36:48Z
2024-06-20T10:36:48Z
by Garfinkel, Simson.<br/><a href="https://learning.oreilly.com/library/view/~/0596003234">https://learning.oreilly.com/library/view/~/0596003234</a>
<a href="https://learning.oreilly.com/library/view/~/0596003234/?ar">https://learning.oreilly.com/library/view/~/0596003234/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596003234/?ar">https://go.oreilly.com/library-access/library/view/-/0596003234/?ar</a><br/>Format: Electronic Resources<br/>
Security for Microsoft Visual Basic .NET
ent://SD_ILS/0/SD_ILS:2281971
2024-06-20T10:36:48Z
2024-06-20T10:36:48Z
by Robinson, Ed, 1967-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0735619190/?ar">https://go.oreilly.com/library-access/library/view/-/0735619190/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0735619190/?ar">https://learning.oreilly.com/library/view/~/0735619190/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0735619190">https://learning.oreilly.com/library/view/~/0735619190</a><br/>Format: Electronic Resources<br/>
Intrusion detection with Snort
ent://SD_ILS/0/SD_ILS:2281704
2024-06-20T10:36:48Z
2024-06-20T10:36:48Z
by Koziol, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/157870281X">https://learning.oreilly.com/library/view/~/157870281X</a>
<a href="https://learning.oreilly.com/library/view/~/157870281X/?ar">https://learning.oreilly.com/library/view/~/157870281X/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/157870281X/?ar">https://go.oreilly.com/library-access/library/view/-/157870281X/?ar</a><br/>Format: Electronic Resources<br/>
Incident response & computer forensics
ent://SD_ILS/0/SD_ILS:2280958
2024-06-20T10:36:48Z
2024-06-20T10:36:48Z
by Prosise, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/9780072226966">https://learning.oreilly.com/library/view/~/9780072226966</a>
<a href="https://learning.oreilly.com/library/view/~/9780072226966/?ar">https://learning.oreilly.com/library/view/~/9780072226966/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780072226966/?ar">https://go.oreilly.com/library-access/library/view/-/9780072226966/?ar</a><br/>Format: Electronic Resources<br/>
Mastering network security
ent://SD_ILS/0/SD_ILS:2287799
2024-06-20T10:36:48Z
2024-06-20T10:36:48Z
by Brenton, Chris.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780782141429/?ar">https://go.oreilly.com/library-access/library/view/-/9780782141429/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780782141429/?ar">https://learning.oreilly.com/library/view/~/9780782141429/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780782141429">https://learning.oreilly.com/library/view/~/9780782141429</a><br/>Format: Electronic Resources<br/>