Search Results for - Narrowed by: 2003 - Computer security.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092003$0025092003$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?2024-06-21T01:18:23ZBuilding a global information assurance programent://SD_ILS/0/SD_ILS:23229162024-06-21T01:18:23Z2024-06-21T01:18:23Zby Curts, Raymond J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780203997550/?ar">https://learning.oreilly.com/library/view/~/9780203997550/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780203997550/?ar">https://go.oreilly.com/library-access/library/view/-/9780203997550/?ar</a><br/>Format: Electronic Resources<br/>Configuring Symantec AntiVirus Enterprise Edition.ent://SD_ILS/0/SD_ILS:11920062024-06-21T01:18:23Z2024-06-21T01:18:23Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294056">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity Operations Handbook : the definitive reference on operational cybersecurity.ent://SD_ILS/0/SD_ILS:11951102024-06-21T01:18:23Z2024-06-21T01:18:23Zby Rittinghouse, PhD, CISM, John.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=313612">Click to View</a><br/>Format: Electronic Resources<br/>Role-Based Access Control.ent://SD_ILS/0/SD_ILS:11833412024-06-21T01:18:23Z2024-06-21T01:18:23Zby Ferraiolo, David.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227631">Click to View</a><br/>Format: Electronic Resources<br/>Techniques and Applications of Digital Watermarking and Content Protection : Techniques and Applications.ent://SD_ILS/0/SD_ILS:11832992024-06-21T01:18:23Z2024-06-21T01:18:23Zby Arnold, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227587">Click to View</a><br/>Format: Electronic Resources<br/>Mission-Critical Network Planning.ent://SD_ILS/0/SD_ILS:11833612024-06-21T01:18:23Z2024-06-21T01:18:23Zby Liotine, Matthew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227652">Click to View</a><br/>Format: Electronic Resources<br/>Defense and Detection Strategies against Internet Worms.ent://SD_ILS/0/SD_ILS:11833692024-06-21T01:18:23Z2024-06-21T01:18:23Zby Nazario, Jose.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227660">Click to View</a><br/>Format: Electronic Resources<br/>SSCP Systems Security Certified Practitioner Study Guide and DVD Training System.ent://SD_ILS/0/SD_ILS:11921142024-06-21T01:18:23Z2024-06-21T01:18:23Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294375">Click to View</a><br/>Format: Electronic Resources<br/>Snort Intrusion Detection 2.0.ent://SD_ILS/0/SD_ILS:11921112024-06-21T01:18:23Z2024-06-21T01:18:23Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294371">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity operations handbookent://SD_ILS/0/SD_ILS:3415542024-06-21T01:18:23Z2024-06-21T01:18:23Zby Rittinghouse, John W.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=207316">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=207316</a><br/>Format: Electronic Resources<br/>Cybersecurity operations handbookent://SD_ILS/0/SD_ILS:656262024-06-21T01:18:23Z2024-06-21T01:18:23Zby Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583064">An electronic book accessible through the World Wide Web; click for information</a>
Publisher description <a href="http://www.loc.gov/catdir/description/els031/2003051481.html">http://www.loc.gov/catdir/description/els031/2003051481.html</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/els031/2003051481.html">http://www.loc.gov/catdir/toc/els031/2003051481.html</a><br/>Format: Electronic Resources<br/>Internet security a jumpstart for systems administrators and IT managersent://SD_ILS/0/SD_ILS:656312024-06-21T01:18:23Z2024-06-21T01:18:23Zby Speed, Tim.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582982">An electronic book accessible through the World Wide Web; click for information</a>
Publisher description <a href="http://www.loc.gov/catdir/description/els041/2003279708.html">http://www.loc.gov/catdir/description/els041/2003279708.html</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/els041/2003279708.html">http://www.loc.gov/catdir/toc/els041/2003279708.html</a><br/>Format: Electronic Resources<br/>Cisco security professional's guide to secure intrusion detection systemsent://SD_ILS/0/SD_ILS:657282024-06-21T01:18:23Z2024-06-21T01:18:23Zby Burton, James.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266696">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Snort 2.0 intrusion detectionent://SD_ILS/0/SD_ILS:659192024-06-21T01:18:23Z2024-06-21T01:18:23Zby Beale, Jay.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836746">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Hacking Linux exposedent://SD_ILS/0/SD_ILS:476802024-06-21T01:18:23Z2024-06-21T01:18:23Zby Hatch, Brian.<br/>Contributor biographical information <a href="http://www.loc.gov/catdir/bios/mh042/2003269974.html">http://www.loc.gov/catdir/bios/mh042/2003269974.html</a>
Publisher description <a href="http://www.loc.gov/catdir/description/mh031/2003269974.html">http://www.loc.gov/catdir/description/mh031/2003269974.html</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/mh031/2003269974.html">http://www.loc.gov/catdir/toc/mh031/2003269974.html</a><br/>Format: Books<br/>Hacking Linux exposedent://SD_ILS/0/SD_ILS:159452024-06-21T01:18:23Z2024-06-21T01:18:23Zby Hatch, Brian.<br/>Format: Books<br/>Network intrusion detectionent://SD_ILS/0/SD_ILS:121882024-06-21T01:18:23Z2024-06-21T01:18:23Zby Northcutt, Stephen.<br/>Format: Books<br/>Snort 2.0 intrusion detection.ent://SD_ILS/0/SD_ILS:146182024-06-21T01:18:23Z2024-06-21T01:18:23Zby Beale, Jay.<br/>Format: Books<br/>Invasion of Privacy : Big Brother and the Company Hackers.ent://SD_ILS/0/SD_ILS:13043802024-06-21T01:18:23Z2024-06-21T01:18:23Zby Weber, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3135625">Click to View</a><br/>Format: Electronic Resources<br/>zSeries Crypto Guide Update.ent://SD_ILS/0/SD_ILS:13100962024-06-21T01:18:23Z2024-06-21T01:18:23Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306705">Click to View</a><br/>Format: Electronic Resources<br/>Secure coding : principles and practicesent://SD_ILS/0/SD_ILS:22810062024-06-21T01:18:23Z2024-06-21T01:18:23Zby Graff, Mark.<br/><a href="https://learning.oreilly.com/library/view/~/0596002424">https://learning.oreilly.com/library/view/~/0596002424</a>
<a href="https://learning.oreilly.com/library/view/~/0596002424/?ar">https://learning.oreilly.com/library/view/~/0596002424/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596002424/?ar">https://go.oreilly.com/library-access/library/view/-/0596002424/?ar</a><br/>Format: Electronic Resources<br/>Stealing the network : how to own the boxent://SD_ILS/0/SD_ILS:22809262024-06-21T01:18:23Z2024-06-21T01:18:23Zby Russell, Ryan, 1969-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781931836876/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836876/?ar</a>
<a href="https://www.sciencedirect.com/science/book/9781931836876">https://www.sciencedirect.com/science/book/9781931836876</a>
<a href="https://learning.oreilly.com/library/view/~/9781931836876/?ar">https://learning.oreilly.com/library/view/~/9781931836876/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781931836876">https://learning.oreilly.com/library/view/~/9781931836876</a><br/>Format: Electronic Resources<br/>Practical UNIX and Internet securityent://SD_ILS/0/SD_ILS:22812562024-06-21T01:18:23Z2024-06-21T01:18:23Zby Garfinkel, Simson.<br/><a href="https://learning.oreilly.com/library/view/~/0596003234">https://learning.oreilly.com/library/view/~/0596003234</a>
<a href="https://learning.oreilly.com/library/view/~/0596003234/?ar">https://learning.oreilly.com/library/view/~/0596003234/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596003234/?ar">https://go.oreilly.com/library-access/library/view/-/0596003234/?ar</a><br/>Format: Electronic Resources<br/>Writing secure code : practical strategies and proven techniques for building secure applications in a networked worldent://SD_ILS/0/SD_ILS:22811582024-06-21T01:18:23Z2024-06-21T01:18:23Zby Howard, Michael, 1965- author.<br/><a href="https://learning.oreilly.com/library/view/~/0735617228">https://learning.oreilly.com/library/view/~/0735617228</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0735617228/?ar">https://go.oreilly.com/library-access/library/view/-/0735617228/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0735617228/?ar">https://learning.oreilly.com/library/view/~/0735617228/?ar</a><br/>Format: Electronic Resources<br/>Mac OS X securityent://SD_ILS/0/SD_ILS:22811662024-06-21T01:18:23Z2024-06-21T01:18:23Zby Potter, Bruce.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0735713480/?ar">https://go.oreilly.com/library-access/library/view/-/0735713480/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0735713480">https://learning.oreilly.com/library/view/~/0735713480</a>
<a href="https://learning.oreilly.com/library/view/~/0735713480/?ar">https://learning.oreilly.com/library/view/~/0735713480/?ar</a><br/>Format: Electronic Resources<br/>Security for Microsoft Visual Basic .NETent://SD_ILS/0/SD_ILS:22819712024-06-21T01:18:23Z2024-06-21T01:18:23Zby Robinson, Ed, 1967-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0735619190/?ar">https://go.oreilly.com/library-access/library/view/-/0735619190/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0735619190/?ar">https://learning.oreilly.com/library/view/~/0735619190/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0735619190">https://learning.oreilly.com/library/view/~/0735619190</a><br/>Format: Electronic Resources<br/>Intrusion detection with Snortent://SD_ILS/0/SD_ILS:22817042024-06-21T01:18:23Z2024-06-21T01:18:23Zby Koziol, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/157870281X">https://learning.oreilly.com/library/view/~/157870281X</a>
<a href="https://learning.oreilly.com/library/view/~/157870281X/?ar">https://learning.oreilly.com/library/view/~/157870281X/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/157870281X/?ar">https://go.oreilly.com/library-access/library/view/-/157870281X/?ar</a><br/>Format: Electronic Resources<br/>Security : Secrets, Intruders and ID Tags.ent://SD_ILS/0/SD_ILS:13267442024-06-21T01:18:23Z2024-06-21T01:18:23Zby Patch, Kimberly.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3411447">Click to View</a><br/>Format: Electronic Resources<br/>Network security a practical guideent://SD_ILS/0/SD_ILS:20478022024-06-21T01:18:23Z2024-06-21T01:18:23Zby Poole, Owen.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=298471">Click to View</a><br/>Format: Electronic Resources<br/>Hacking the art of exploitationent://SD_ILS/0/SD_ILS:20476392024-06-21T01:18:23Z2024-06-21T01:18:23Zby Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=273488">Click to View</a><br/>Format: Electronic Resources<br/>Snort Intrusion Detection 2.0.ent://SD_ILS/0/SD_ILS:22869602024-06-21T01:18:23Z2024-06-21T01:18:23Zby Russell, Ryan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780080481005/?ar">https://go.oreilly.com/library-access/library/view/-/9780080481005/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780080481005/?ar">https://learning.oreilly.com/library/view/~/9780080481005/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780080481005">https://learning.oreilly.com/library/view/~/9780080481005</a><br/>Format: Electronic Resources<br/>Inside Java 2 platform security : architecture, API design, and implementationent://SD_ILS/0/SD_ILS:22883222024-06-21T01:18:23Z2024-06-21T01:18:23Zby Gong, Li.<br/><a href="https://learning.oreilly.com/library/view/~/0201787911">https://learning.oreilly.com/library/view/~/0201787911</a>
<a href="https://learning.oreilly.com/library/view/~/0201787911/?ar">https://learning.oreilly.com/library/view/~/0201787911/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0201787911/?ar">https://go.oreilly.com/library-access/library/view/-/0201787911/?ar</a><br/>Format: Electronic Resources<br/>Incident response & computer forensicsent://SD_ILS/0/SD_ILS:22809582024-06-21T01:18:23Z2024-06-21T01:18:23Zby Prosise, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/9780072226966">https://learning.oreilly.com/library/view/~/9780072226966</a>
<a href="https://learning.oreilly.com/library/view/~/9780072226966/?ar">https://learning.oreilly.com/library/view/~/9780072226966/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780072226966/?ar">https://go.oreilly.com/library-access/library/view/-/9780072226966/?ar</a><br/>Format: Electronic Resources<br/>Honeypots : tracking hackersent://SD_ILS/0/SD_ILS:22808212024-06-21T01:18:23Z2024-06-21T01:18:23Zby Spitzner, Lance.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321108957/?ar">https://go.oreilly.com/library-access/library/view/-/0321108957/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321108957/?ar">https://learning.oreilly.com/library/view/~/0321108957/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321108957">https://learning.oreilly.com/library/view/~/0321108957</a><br/>Format: Electronic Resources<br/>Mastering network securityent://SD_ILS/0/SD_ILS:22877992024-06-21T01:18:23Z2024-06-21T01:18:23Zby Brenton, Chris.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780782141429/?ar">https://go.oreilly.com/library-access/library/view/-/9780782141429/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780782141429/?ar">https://learning.oreilly.com/library/view/~/9780782141429/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780782141429">https://learning.oreilly.com/library/view/~/9780782141429</a><br/>Format: Electronic Resources<br/>Secure programming cookbook for C and C++ent://SD_ILS/0/SD_ILS:22863922024-06-21T01:18:23Z2024-06-21T01:18:23Zby Viega, John.<br/><a href="https://learning.oreilly.com/library/view/~/0596003943">https://learning.oreilly.com/library/view/~/0596003943</a>
<a href="https://learning.oreilly.com/library/view/~/0596003943/?ar">https://learning.oreilly.com/library/view/~/0596003943/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596003943/?ar">https://go.oreilly.com/library-access/library/view/-/0596003943/?ar</a><br/>Format: Electronic Resources<br/>Information : Getting, Protecting and Using Data.ent://SD_ILS/0/SD_ILS:13267332024-06-21T01:18:23Z2024-06-21T01:18:23Zby Patch, Kimberly.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3411436">Click to View</a><br/>Format: Electronic Resources<br/>Malware : Fighting Malicious Code.ent://SD_ILS/0/SD_ILS:23179832024-06-21T01:18:23Z2024-06-21T01:18:23Zby Skoudis, Ed, author.<br/><a href="https://learning.oreilly.com/library/view/~/0131014056">https://learning.oreilly.com/library/view/~/0131014056</a>
<a href="https://learning.oreilly.com/library/view/~/0131014056/?ar">https://learning.oreilly.com/library/view/~/0131014056/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0131014056/?ar">https://go.oreilly.com/library-access/library/view/-/0131014056/?ar</a><br/>Format: Electronic Resources<br/>. Net Security and Cryptography.ent://SD_ILS/0/SD_ILS:23178962024-06-21T01:18:23Z2024-06-21T01:18:23Zby Thorsteinson, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/013100851X">https://learning.oreilly.com/library/view/~/013100851X</a>
<a href="https://learning.oreilly.com/library/view/~/013100851X/?ar">https://learning.oreilly.com/library/view/~/013100851X/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/013100851X/?ar">https://go.oreilly.com/library-access/library/view/-/013100851X/?ar</a><br/>Format: Electronic Resources<br/>Designing Network Security Second Editionent://SD_ILS/0/SD_ILS:23197252024-06-21T01:18:23Z2024-06-21T01:18:23Zby Kaeo, Merike, author.<br/><a href="https://learning.oreilly.com/library/view/~/1587051176/?ar">https://learning.oreilly.com/library/view/~/1587051176/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587051176">https://learning.oreilly.com/library/view/~/1587051176</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1587051176/?ar">https://go.oreilly.com/library-access/library/view/-/1587051176/?ar</a><br/>Format: Electronic Resources<br/>Biometrics for Network Securityent://SD_ILS/0/SD_ILS:23268142024-06-21T01:18:23Z2024-06-21T01:18:23Zby Reid, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/0131015494">https://learning.oreilly.com/library/view/~/0131015494</a>
<a href="https://learning.oreilly.com/library/view/~/0131015494/?ar">https://learning.oreilly.com/library/view/~/0131015494/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0131015494/?ar">https://go.oreilly.com/library-access/library/view/-/0131015494/?ar</a><br/>Format: Electronic Resources<br/>J2EE™ Security for Servlets, EJBs and Web Services: Applying Theory and Standards to Practiceent://SD_ILS/0/SD_ILS:23268392024-06-21T01:18:23Z2024-06-21T01:18:23Zby Kumar, Pankaj, author.<br/><a href="https://learning.oreilly.com/library/view/~/0131402641/?ar">https://learning.oreilly.com/library/view/~/0131402641/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0131402641">https://learning.oreilly.com/library/view/~/0131402641</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0131402641/?ar">https://go.oreilly.com/library-access/library/view/-/0131402641/?ar</a><br/>Format: Electronic Resources<br/>Cisco security professional's guide to secure intrusion detection systemsent://SD_ILS/0/SD_ILS:23062212024-06-21T01:18:23Z2024-06-21T01:18:23Zby Burton, James D., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781932266696/?ar">https://go.oreilly.com/library-access/library/view/-/9781932266696/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781932266696/?ar">https://learning.oreilly.com/library/view/~/9781932266696/?ar</a><br/>Format: Electronic Resources<br/>Current security management & ethical issues of information technologyent://SD_ILS/0/SD_ILS:22612702024-06-21T01:18:23Z2024-06-21T01:18:23Zby Azari, Rasool.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-93177-743-8">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-93177-743-8</a><br/>Format: Electronic Resources<br/>