Search Results for - Narrowed by: 2003 - COMPUTERS -- Networking -- Security. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092003$0025092003$0026qf$003dSUBJECT$002509Subject$002509COMPUTERS$002b--$002bNetworking$002b--$002bSecurity.$002509COMPUTERS$002b--$002bNetworking$002b--$002bSecurity.$0026ps$003d300? 2024-05-23T11:43:06Z TICSA TruSecure ICSA certified security associate : exam TUO-001 : training guide ent://SD_ILS/0/SD_ILS:2281543 2024-05-23T11:43:06Z 2024-05-23T11:43:06Z by&#160;Chapple, Mike.<br/><a href="https://learning.oreilly.com/library/view/~/0789727838">https://learning.oreilly.com/library/view/~/0789727838</a> <a href="https://learning.oreilly.com/library/view/~/0789727838/?ar">https://learning.oreilly.com/library/view/~/0789727838/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0789727838/?ar">https://go.oreilly.com/library-access/library/view/-/0789727838/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security+ ent://SD_ILS/0/SD_ILS:2281559 2024-05-23T11:43:06Z 2024-05-23T11:43:06Z by&#160;Hausman, Kalani Kirk.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0789729105/?ar">https://go.oreilly.com/library-access/library/view/-/0789729105/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0789729105/?ar">https://learning.oreilly.com/library/view/~/0789729105/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0789729105">https://learning.oreilly.com/library/view/~/0789729105</a><br/>Format:&#160;Electronic Resources<br/> Intrusion detection with Snort ent://SD_ILS/0/SD_ILS:2281704 2024-05-23T11:43:06Z 2024-05-23T11:43:06Z by&#160;Koziol, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/157870281X">https://learning.oreilly.com/library/view/~/157870281X</a> <a href="https://learning.oreilly.com/library/view/~/157870281X/?ar">https://learning.oreilly.com/library/view/~/157870281X/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/157870281X/?ar">https://go.oreilly.com/library-access/library/view/-/157870281X/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity operations handbook ent://SD_ILS/0/SD_ILS:341554 2024-05-23T11:43:06Z 2024-05-23T11:43:06Z by&#160;Rittinghouse, John W.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=207316">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=207316</a><br/>Format:&#160;Electronic Resources<br/> Mastering network security ent://SD_ILS/0/SD_ILS:2287799 2024-05-23T11:43:06Z 2024-05-23T11:43:06Z by&#160;Brenton, Chris.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780782141429/?ar">https://go.oreilly.com/library-access/library/view/-/9780782141429/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780782141429/?ar">https://learning.oreilly.com/library/view/~/9780782141429/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780782141429">https://learning.oreilly.com/library/view/~/9780782141429</a><br/>Format:&#160;Electronic Resources<br/> Managing a network vulnerability assessment ent://SD_ILS/0/SD_ILS:2284729 2024-05-23T11:43:06Z 2024-05-23T11:43:06Z by&#160;Peltier, Thomas R.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780203503041/?ar">https://go.oreilly.com/library-access/library/view/-/9780203503041/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780203503041/?ar">https://learning.oreilly.com/library/view/~/9780203503041/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical UNIX and Internet security ent://SD_ILS/0/SD_ILS:2281256 2024-05-23T11:43:06Z 2024-05-23T11:43:06Z by&#160;Garfinkel, Simson.<br/><a href="https://learning.oreilly.com/library/view/~/0596003234">https://learning.oreilly.com/library/view/~/0596003234</a> <a href="https://learning.oreilly.com/library/view/~/0596003234/?ar">https://learning.oreilly.com/library/view/~/0596003234/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596003234/?ar">https://go.oreilly.com/library-access/library/view/-/0596003234/?ar</a><br/>Format:&#160;Electronic Resources<br/> Linux security cookbook ent://SD_ILS/0/SD_ILS:2281262 2024-05-23T11:43:06Z 2024-05-23T11:43:06Z by&#160;Barrett, Daniel J.<br/><a href="https://learning.oreilly.com/library/view/~/0596003919/?ar">https://learning.oreilly.com/library/view/~/0596003919/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596003919/?ar">https://go.oreilly.com/library-access/library/view/-/0596003919/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596003919">https://learning.oreilly.com/library/view/~/0596003919</a><br/>Format:&#160;Electronic Resources<br/> Programming .NET security ent://SD_ILS/0/SD_ILS:2281268 2024-05-23T11:43:06Z 2024-05-23T11:43:06Z by&#160;Freeman, Adam.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596004427/?ar">https://go.oreilly.com/library-access/library/view/-/0596004427/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596004427/?ar">https://learning.oreilly.com/library/view/~/0596004427/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596004427">https://learning.oreilly.com/library/view/~/0596004427</a><br/>Format:&#160;Electronic Resources<br/> Maximum wireless security ent://SD_ILS/0/SD_ILS:2281684 2024-05-23T11:43:06Z 2024-05-23T11:43:06Z by&#160;Peikari, Cyrus.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0672324881/?ar">https://go.oreilly.com/library-access/library/view/-/0672324881/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0672324881/?ar">https://learning.oreilly.com/library/view/~/0672324881/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0672324881">https://learning.oreilly.com/library/view/~/0672324881</a><br/>Format:&#160;Electronic Resources<br/> Incident response &amp; computer forensics ent://SD_ILS/0/SD_ILS:2280958 2024-05-23T11:43:06Z 2024-05-23T11:43:06Z by&#160;Prosise, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/9780072226966">https://learning.oreilly.com/library/view/~/9780072226966</a> <a href="https://learning.oreilly.com/library/view/~/9780072226966/?ar">https://learning.oreilly.com/library/view/~/9780072226966/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780072226966/?ar">https://go.oreilly.com/library-access/library/view/-/9780072226966/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security for Microsoft Visual Basic .NET ent://SD_ILS/0/SD_ILS:2281971 2024-05-23T11:43:06Z 2024-05-23T11:43:06Z by&#160;Robinson, Ed, 1967-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0735619190/?ar">https://go.oreilly.com/library-access/library/view/-/0735619190/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0735619190/?ar">https://learning.oreilly.com/library/view/~/0735619190/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0735619190">https://learning.oreilly.com/library/view/~/0735619190</a><br/>Format:&#160;Electronic Resources<br/> Using the common criteria for IT security evaluation ent://SD_ILS/0/SD_ILS:2281784 2024-05-23T11:43:06Z 2024-05-23T11:43:06Z by&#160;Herrmann, Debra S.<br/><a href="https://learning.oreilly.com/library/view/~/9781420031423">https://learning.oreilly.com/library/view/~/9781420031423</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781420031423/?ar">https://go.oreilly.com/library-access/library/view/-/9781420031423/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781420031423/?ar">https://learning.oreilly.com/library/view/~/9781420031423/?ar</a><br/>Format:&#160;Electronic Resources<br/>