Search Results for - Narrowed by: 2003 - Computer security. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092003$0025092003$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300? 2024-06-21T01:18:23Z Building a global information assurance program ent://SD_ILS/0/SD_ILS:2322916 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Curts, Raymond J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780203997550/?ar">https://learning.oreilly.com/library/view/~/9780203997550/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780203997550/?ar">https://go.oreilly.com/library-access/library/view/-/9780203997550/?ar</a><br/>Format:&#160;Electronic Resources<br/> Configuring Symantec AntiVirus Enterprise Edition. ent://SD_ILS/0/SD_ILS:1192006 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294056">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity Operations Handbook : the definitive reference on operational cybersecurity. ent://SD_ILS/0/SD_ILS:1195110 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Rittinghouse, PhD, CISM, John.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=313612">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Role-Based Access Control. ent://SD_ILS/0/SD_ILS:1183341 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Ferraiolo, David.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227631">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Techniques and Applications of Digital Watermarking and Content Protection : Techniques and Applications. ent://SD_ILS/0/SD_ILS:1183299 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Arnold, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227587">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mission-Critical Network Planning. ent://SD_ILS/0/SD_ILS:1183361 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Liotine, Matthew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227652">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Defense and Detection Strategies against Internet Worms. ent://SD_ILS/0/SD_ILS:1183369 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Nazario, Jose.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227660">Click to View</a><br/>Format:&#160;Electronic Resources<br/> SSCP Systems Security Certified Practitioner Study Guide and DVD Training System. ent://SD_ILS/0/SD_ILS:1192114 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294375">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Snort Intrusion Detection 2.0. ent://SD_ILS/0/SD_ILS:1192111 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294371">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity operations handbook ent://SD_ILS/0/SD_ILS:341554 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Rittinghouse, John W.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=207316">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=207316</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity operations handbook ent://SD_ILS/0/SD_ILS:65626 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583064">An electronic book accessible through the World Wide Web; click for information</a> Publisher description <a href="http://www.loc.gov/catdir/description/els031/2003051481.html">http://www.loc.gov/catdir/description/els031/2003051481.html</a> Table of contents <a href="http://www.loc.gov/catdir/toc/els031/2003051481.html">http://www.loc.gov/catdir/toc/els031/2003051481.html</a><br/>Format:&#160;Electronic Resources<br/> Internet security a jumpstart for systems administrators and IT managers ent://SD_ILS/0/SD_ILS:65631 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Speed, Tim.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582982">An electronic book accessible through the World Wide Web; click for information</a> Publisher description <a href="http://www.loc.gov/catdir/description/els041/2003279708.html">http://www.loc.gov/catdir/description/els041/2003279708.html</a> Table of contents <a href="http://www.loc.gov/catdir/toc/els041/2003279708.html">http://www.loc.gov/catdir/toc/els041/2003279708.html</a><br/>Format:&#160;Electronic Resources<br/> Cisco security professional's guide to secure intrusion detection systems ent://SD_ILS/0/SD_ILS:65728 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Burton, James.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266696">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Snort 2.0 intrusion detection ent://SD_ILS/0/SD_ILS:65919 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Beale, Jay.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836746">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Hacking Linux exposed ent://SD_ILS/0/SD_ILS:47680 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Hatch, Brian.<br/>Contributor biographical information <a href="http://www.loc.gov/catdir/bios/mh042/2003269974.html">http://www.loc.gov/catdir/bios/mh042/2003269974.html</a> Publisher description <a href="http://www.loc.gov/catdir/description/mh031/2003269974.html">http://www.loc.gov/catdir/description/mh031/2003269974.html</a> Table of contents <a href="http://www.loc.gov/catdir/toc/mh031/2003269974.html">http://www.loc.gov/catdir/toc/mh031/2003269974.html</a><br/>Format:&#160;Books<br/> Hacking Linux exposed ent://SD_ILS/0/SD_ILS:15945 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Hatch, Brian.<br/>Format:&#160;Books<br/> Network intrusion detection ent://SD_ILS/0/SD_ILS:12188 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Northcutt, Stephen.<br/>Format:&#160;Books<br/> Snort 2.0 intrusion detection. ent://SD_ILS/0/SD_ILS:14618 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Beale, Jay.<br/>Format:&#160;Books<br/> Invasion of Privacy : Big Brother and the Company Hackers. ent://SD_ILS/0/SD_ILS:1304380 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Weber, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3135625">Click to View</a><br/>Format:&#160;Electronic Resources<br/> zSeries Crypto Guide Update. ent://SD_ILS/0/SD_ILS:1310096 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306705">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Secure coding : principles and practices ent://SD_ILS/0/SD_ILS:2281006 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Graff, Mark.<br/><a href="https://learning.oreilly.com/library/view/~/0596002424">https://learning.oreilly.com/library/view/~/0596002424</a> <a href="https://learning.oreilly.com/library/view/~/0596002424/?ar">https://learning.oreilly.com/library/view/~/0596002424/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596002424/?ar">https://go.oreilly.com/library-access/library/view/-/0596002424/?ar</a><br/>Format:&#160;Electronic Resources<br/> Stealing the network : how to own the box ent://SD_ILS/0/SD_ILS:2280926 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Russell, Ryan, 1969-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781931836876/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836876/?ar</a> <a href="https://www.sciencedirect.com/science/book/9781931836876">https://www.sciencedirect.com/science/book/9781931836876</a> <a href="https://learning.oreilly.com/library/view/~/9781931836876/?ar">https://learning.oreilly.com/library/view/~/9781931836876/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781931836876">https://learning.oreilly.com/library/view/~/9781931836876</a><br/>Format:&#160;Electronic Resources<br/> Practical UNIX and Internet security ent://SD_ILS/0/SD_ILS:2281256 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Garfinkel, Simson.<br/><a href="https://learning.oreilly.com/library/view/~/0596003234">https://learning.oreilly.com/library/view/~/0596003234</a> <a href="https://learning.oreilly.com/library/view/~/0596003234/?ar">https://learning.oreilly.com/library/view/~/0596003234/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596003234/?ar">https://go.oreilly.com/library-access/library/view/-/0596003234/?ar</a><br/>Format:&#160;Electronic Resources<br/> Writing secure code : practical strategies and proven techniques for building secure applications in a networked world ent://SD_ILS/0/SD_ILS:2281158 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Howard, Michael, 1965- author.<br/><a href="https://learning.oreilly.com/library/view/~/0735617228">https://learning.oreilly.com/library/view/~/0735617228</a> <a href="https://go.oreilly.com/library-access/library/view/-/0735617228/?ar">https://go.oreilly.com/library-access/library/view/-/0735617228/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0735617228/?ar">https://learning.oreilly.com/library/view/~/0735617228/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mac OS X security ent://SD_ILS/0/SD_ILS:2281166 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Potter, Bruce.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0735713480/?ar">https://go.oreilly.com/library-access/library/view/-/0735713480/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0735713480">https://learning.oreilly.com/library/view/~/0735713480</a> <a href="https://learning.oreilly.com/library/view/~/0735713480/?ar">https://learning.oreilly.com/library/view/~/0735713480/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security for Microsoft Visual Basic .NET ent://SD_ILS/0/SD_ILS:2281971 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Robinson, Ed, 1967-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0735619190/?ar">https://go.oreilly.com/library-access/library/view/-/0735619190/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0735619190/?ar">https://learning.oreilly.com/library/view/~/0735619190/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0735619190">https://learning.oreilly.com/library/view/~/0735619190</a><br/>Format:&#160;Electronic Resources<br/> Intrusion detection with Snort ent://SD_ILS/0/SD_ILS:2281704 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Koziol, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/157870281X">https://learning.oreilly.com/library/view/~/157870281X</a> <a href="https://learning.oreilly.com/library/view/~/157870281X/?ar">https://learning.oreilly.com/library/view/~/157870281X/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/157870281X/?ar">https://go.oreilly.com/library-access/library/view/-/157870281X/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security : Secrets, Intruders and ID Tags. ent://SD_ILS/0/SD_ILS:1326744 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Patch, Kimberly.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3411447">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network security a practical guide ent://SD_ILS/0/SD_ILS:2047802 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Poole, Owen.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=298471">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking the art of exploitation ent://SD_ILS/0/SD_ILS:2047639 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=273488">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Snort Intrusion Detection 2.0. ent://SD_ILS/0/SD_ILS:2286960 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Russell, Ryan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780080481005/?ar">https://go.oreilly.com/library-access/library/view/-/9780080481005/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780080481005/?ar">https://learning.oreilly.com/library/view/~/9780080481005/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780080481005">https://learning.oreilly.com/library/view/~/9780080481005</a><br/>Format:&#160;Electronic Resources<br/> Inside Java 2 platform security : architecture, API design, and implementation ent://SD_ILS/0/SD_ILS:2288322 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Gong, Li.<br/><a href="https://learning.oreilly.com/library/view/~/0201787911">https://learning.oreilly.com/library/view/~/0201787911</a> <a href="https://learning.oreilly.com/library/view/~/0201787911/?ar">https://learning.oreilly.com/library/view/~/0201787911/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0201787911/?ar">https://go.oreilly.com/library-access/library/view/-/0201787911/?ar</a><br/>Format:&#160;Electronic Resources<br/> Incident response &amp; computer forensics ent://SD_ILS/0/SD_ILS:2280958 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Prosise, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/9780072226966">https://learning.oreilly.com/library/view/~/9780072226966</a> <a href="https://learning.oreilly.com/library/view/~/9780072226966/?ar">https://learning.oreilly.com/library/view/~/9780072226966/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780072226966/?ar">https://go.oreilly.com/library-access/library/view/-/9780072226966/?ar</a><br/>Format:&#160;Electronic Resources<br/> Honeypots : tracking hackers ent://SD_ILS/0/SD_ILS:2280821 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Spitzner, Lance.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321108957/?ar">https://go.oreilly.com/library-access/library/view/-/0321108957/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321108957/?ar">https://learning.oreilly.com/library/view/~/0321108957/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321108957">https://learning.oreilly.com/library/view/~/0321108957</a><br/>Format:&#160;Electronic Resources<br/> Mastering network security ent://SD_ILS/0/SD_ILS:2287799 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Brenton, Chris.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780782141429/?ar">https://go.oreilly.com/library-access/library/view/-/9780782141429/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780782141429/?ar">https://learning.oreilly.com/library/view/~/9780782141429/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780782141429">https://learning.oreilly.com/library/view/~/9780782141429</a><br/>Format:&#160;Electronic Resources<br/> Secure programming cookbook for C and C++ ent://SD_ILS/0/SD_ILS:2286392 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Viega, John.<br/><a href="https://learning.oreilly.com/library/view/~/0596003943">https://learning.oreilly.com/library/view/~/0596003943</a> <a href="https://learning.oreilly.com/library/view/~/0596003943/?ar">https://learning.oreilly.com/library/view/~/0596003943/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596003943/?ar">https://go.oreilly.com/library-access/library/view/-/0596003943/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information : Getting, Protecting and Using Data. ent://SD_ILS/0/SD_ILS:1326733 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Patch, Kimberly.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3411436">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Malware : Fighting Malicious Code. ent://SD_ILS/0/SD_ILS:2317983 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Skoudis, Ed, author.<br/><a href="https://learning.oreilly.com/library/view/~/0131014056">https://learning.oreilly.com/library/view/~/0131014056</a> <a href="https://learning.oreilly.com/library/view/~/0131014056/?ar">https://learning.oreilly.com/library/view/~/0131014056/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0131014056/?ar">https://go.oreilly.com/library-access/library/view/-/0131014056/?ar</a><br/>Format:&#160;Electronic Resources<br/> . Net Security and Cryptography. ent://SD_ILS/0/SD_ILS:2317896 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Thorsteinson, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/013100851X">https://learning.oreilly.com/library/view/~/013100851X</a> <a href="https://learning.oreilly.com/library/view/~/013100851X/?ar">https://learning.oreilly.com/library/view/~/013100851X/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/013100851X/?ar">https://go.oreilly.com/library-access/library/view/-/013100851X/?ar</a><br/>Format:&#160;Electronic Resources<br/> Designing Network Security Second Edition ent://SD_ILS/0/SD_ILS:2319725 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Kaeo, Merike, author.<br/><a href="https://learning.oreilly.com/library/view/~/1587051176/?ar">https://learning.oreilly.com/library/view/~/1587051176/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1587051176">https://learning.oreilly.com/library/view/~/1587051176</a> <a href="https://go.oreilly.com/library-access/library/view/-/1587051176/?ar">https://go.oreilly.com/library-access/library/view/-/1587051176/?ar</a><br/>Format:&#160;Electronic Resources<br/> Biometrics for Network Security ent://SD_ILS/0/SD_ILS:2326814 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Reid, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/0131015494">https://learning.oreilly.com/library/view/~/0131015494</a> <a href="https://learning.oreilly.com/library/view/~/0131015494/?ar">https://learning.oreilly.com/library/view/~/0131015494/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0131015494/?ar">https://go.oreilly.com/library-access/library/view/-/0131015494/?ar</a><br/>Format:&#160;Electronic Resources<br/> J2EE&trade; Security for Servlets, EJBs and Web Services: Applying Theory and Standards to Practice ent://SD_ILS/0/SD_ILS:2326839 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Kumar, Pankaj, author.<br/><a href="https://learning.oreilly.com/library/view/~/0131402641/?ar">https://learning.oreilly.com/library/view/~/0131402641/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0131402641">https://learning.oreilly.com/library/view/~/0131402641</a> <a href="https://go.oreilly.com/library-access/library/view/-/0131402641/?ar">https://go.oreilly.com/library-access/library/view/-/0131402641/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cisco security professional's guide to secure intrusion detection systems ent://SD_ILS/0/SD_ILS:2306221 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Burton, James D., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781932266696/?ar">https://go.oreilly.com/library-access/library/view/-/9781932266696/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781932266696/?ar">https://learning.oreilly.com/library/view/~/9781932266696/?ar</a><br/>Format:&#160;Electronic Resources<br/> Current security management &amp; ethical issues of information technology ent://SD_ILS/0/SD_ILS:2261270 2024-06-21T01:18:23Z 2024-06-21T01:18:23Z by&#160;Azari, Rasool.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-93177-743-8">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-93177-743-8</a><br/>Format:&#160;Electronic Resources<br/>