Search Results for - Narrowed by: 2003 - COMPUTERS -- Internet -- Security. - S&eacute;curit&eacute; informatique. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092003$0025092003$0026qf$003dSUBJECT$002509Subject$002509COMPUTERS$002b--$002bInternet$002b--$002bSecurity.$002509COMPUTERS$002b--$002bInternet$002b--$002bSecurity.$0026qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026ps$003d300? 2024-06-20T10:36:48Z Practical UNIX and Internet security ent://SD_ILS/0/SD_ILS:2281256 2024-06-20T10:36:48Z 2024-06-20T10:36:48Z by&#160;Garfinkel, Simson.<br/><a href="https://learning.oreilly.com/library/view/~/0596003234">https://learning.oreilly.com/library/view/~/0596003234</a> <a href="https://learning.oreilly.com/library/view/~/0596003234/?ar">https://learning.oreilly.com/library/view/~/0596003234/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596003234/?ar">https://go.oreilly.com/library-access/library/view/-/0596003234/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security for Microsoft Visual Basic .NET ent://SD_ILS/0/SD_ILS:2281971 2024-06-20T10:36:48Z 2024-06-20T10:36:48Z by&#160;Robinson, Ed, 1967-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0735619190/?ar">https://go.oreilly.com/library-access/library/view/-/0735619190/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0735619190/?ar">https://learning.oreilly.com/library/view/~/0735619190/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0735619190">https://learning.oreilly.com/library/view/~/0735619190</a><br/>Format:&#160;Electronic Resources<br/> Intrusion detection with Snort ent://SD_ILS/0/SD_ILS:2281704 2024-06-20T10:36:48Z 2024-06-20T10:36:48Z by&#160;Koziol, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/157870281X">https://learning.oreilly.com/library/view/~/157870281X</a> <a href="https://learning.oreilly.com/library/view/~/157870281X/?ar">https://learning.oreilly.com/library/view/~/157870281X/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/157870281X/?ar">https://go.oreilly.com/library-access/library/view/-/157870281X/?ar</a><br/>Format:&#160;Electronic Resources<br/> Incident response &amp; computer forensics ent://SD_ILS/0/SD_ILS:2280958 2024-06-20T10:36:48Z 2024-06-20T10:36:48Z by&#160;Prosise, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/9780072226966">https://learning.oreilly.com/library/view/~/9780072226966</a> <a href="https://learning.oreilly.com/library/view/~/9780072226966/?ar">https://learning.oreilly.com/library/view/~/9780072226966/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780072226966/?ar">https://go.oreilly.com/library-access/library/view/-/9780072226966/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering network security ent://SD_ILS/0/SD_ILS:2287799 2024-06-20T10:36:48Z 2024-06-20T10:36:48Z by&#160;Brenton, Chris.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780782141429/?ar">https://go.oreilly.com/library-access/library/view/-/9780782141429/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780782141429/?ar">https://learning.oreilly.com/library/view/~/9780782141429/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780782141429">https://learning.oreilly.com/library/view/~/9780782141429</a><br/>Format:&#160;Electronic Resources<br/>