Search Results for - Narrowed by: 2003 - COMPUTERS -- Security -- General.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092003$0025092003$0026qf$003dSUBJECT$002509Subject$002509COMPUTERS$002b--$002bSecurity$002b--$002bGeneral.$002509COMPUTERS$002b--$002bSecurity$002b--$002bGeneral.$0026ps$003d300?
2024-05-23T15:25:59Z
TICSA TruSecure ICSA certified security associate : exam TUO-001 : training guide
ent://SD_ILS/0/SD_ILS:2281543
2024-05-23T15:25:59Z
2024-05-23T15:25:59Z
by Chapple, Mike.<br/><a href="https://learning.oreilly.com/library/view/~/0789727838">https://learning.oreilly.com/library/view/~/0789727838</a>
<a href="https://learning.oreilly.com/library/view/~/0789727838/?ar">https://learning.oreilly.com/library/view/~/0789727838/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0789727838/?ar">https://go.oreilly.com/library-access/library/view/-/0789727838/?ar</a><br/>Format: Electronic Resources<br/>
Security+
ent://SD_ILS/0/SD_ILS:2281559
2024-05-23T15:25:59Z
2024-05-23T15:25:59Z
by Hausman, Kalani Kirk.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0789729105/?ar">https://go.oreilly.com/library-access/library/view/-/0789729105/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0789729105/?ar">https://learning.oreilly.com/library/view/~/0789729105/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0789729105">https://learning.oreilly.com/library/view/~/0789729105</a><br/>Format: Electronic Resources<br/>
Intrusion detection with Snort
ent://SD_ILS/0/SD_ILS:2281704
2024-05-23T15:25:59Z
2024-05-23T15:25:59Z
by Koziol, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/157870281X">https://learning.oreilly.com/library/view/~/157870281X</a>
<a href="https://learning.oreilly.com/library/view/~/157870281X/?ar">https://learning.oreilly.com/library/view/~/157870281X/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/157870281X/?ar">https://go.oreilly.com/library-access/library/view/-/157870281X/?ar</a><br/>Format: Electronic Resources<br/>
Cybersecurity operations handbook
ent://SD_ILS/0/SD_ILS:341554
2024-05-23T15:25:59Z
2024-05-23T15:25:59Z
by Rittinghouse, John W.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=207316">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=207316</a><br/>Format: Electronic Resources<br/>
Mastering network security
ent://SD_ILS/0/SD_ILS:2287799
2024-05-23T15:25:59Z
2024-05-23T15:25:59Z
by Brenton, Chris.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780782141429/?ar">https://go.oreilly.com/library-access/library/view/-/9780782141429/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780782141429/?ar">https://learning.oreilly.com/library/view/~/9780782141429/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780782141429">https://learning.oreilly.com/library/view/~/9780782141429</a><br/>Format: Electronic Resources<br/>
Managing a network vulnerability assessment
ent://SD_ILS/0/SD_ILS:2284729
2024-05-23T15:25:59Z
2024-05-23T15:25:59Z
by Peltier, Thomas R.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780203503041/?ar">https://go.oreilly.com/library-access/library/view/-/9780203503041/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780203503041/?ar">https://learning.oreilly.com/library/view/~/9780203503041/?ar</a><br/>Format: Electronic Resources<br/>
Practical UNIX and Internet security
ent://SD_ILS/0/SD_ILS:2281256
2024-05-23T15:25:59Z
2024-05-23T15:25:59Z
by Garfinkel, Simson.<br/><a href="https://learning.oreilly.com/library/view/~/0596003234">https://learning.oreilly.com/library/view/~/0596003234</a>
<a href="https://learning.oreilly.com/library/view/~/0596003234/?ar">https://learning.oreilly.com/library/view/~/0596003234/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596003234/?ar">https://go.oreilly.com/library-access/library/view/-/0596003234/?ar</a><br/>Format: Electronic Resources<br/>
Linux security cookbook
ent://SD_ILS/0/SD_ILS:2281262
2024-05-23T15:25:59Z
2024-05-23T15:25:59Z
by Barrett, Daniel J.<br/><a href="https://learning.oreilly.com/library/view/~/0596003919/?ar">https://learning.oreilly.com/library/view/~/0596003919/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596003919/?ar">https://go.oreilly.com/library-access/library/view/-/0596003919/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596003919">https://learning.oreilly.com/library/view/~/0596003919</a><br/>Format: Electronic Resources<br/>
Programming .NET security
ent://SD_ILS/0/SD_ILS:2281268
2024-05-23T15:25:59Z
2024-05-23T15:25:59Z
by Freeman, Adam.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596004427/?ar">https://go.oreilly.com/library-access/library/view/-/0596004427/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596004427/?ar">https://learning.oreilly.com/library/view/~/0596004427/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596004427">https://learning.oreilly.com/library/view/~/0596004427</a><br/>Format: Electronic Resources<br/>
Maximum wireless security
ent://SD_ILS/0/SD_ILS:2281684
2024-05-23T15:25:59Z
2024-05-23T15:25:59Z
by Peikari, Cyrus.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0672324881/?ar">https://go.oreilly.com/library-access/library/view/-/0672324881/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672324881/?ar">https://learning.oreilly.com/library/view/~/0672324881/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672324881">https://learning.oreilly.com/library/view/~/0672324881</a><br/>Format: Electronic Resources<br/>
Incident response & computer forensics
ent://SD_ILS/0/SD_ILS:2280958
2024-05-23T15:25:59Z
2024-05-23T15:25:59Z
by Prosise, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/9780072226966">https://learning.oreilly.com/library/view/~/9780072226966</a>
<a href="https://learning.oreilly.com/library/view/~/9780072226966/?ar">https://learning.oreilly.com/library/view/~/9780072226966/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780072226966/?ar">https://go.oreilly.com/library-access/library/view/-/9780072226966/?ar</a><br/>Format: Electronic Resources<br/>
Security for Microsoft Visual Basic .NET
ent://SD_ILS/0/SD_ILS:2281971
2024-05-23T15:25:59Z
2024-05-23T15:25:59Z
by Robinson, Ed, 1967-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0735619190/?ar">https://go.oreilly.com/library-access/library/view/-/0735619190/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0735619190/?ar">https://learning.oreilly.com/library/view/~/0735619190/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0735619190">https://learning.oreilly.com/library/view/~/0735619190</a><br/>Format: Electronic Resources<br/>
Using the common criteria for IT security evaluation
ent://SD_ILS/0/SD_ILS:2281784
2024-05-23T15:25:59Z
2024-05-23T15:25:59Z
by Herrmann, Debra S.<br/><a href="https://learning.oreilly.com/library/view/~/9781420031423">https://learning.oreilly.com/library/view/~/9781420031423</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781420031423/?ar">https://go.oreilly.com/library-access/library/view/-/9781420031423/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420031423/?ar">https://learning.oreilly.com/library/view/~/9781420031423/?ar</a><br/>Format: Electronic Resources<br/>