Search Results for - Narrowed by: 2003 - S&eacute;curit&eacute; informatique. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092003$0025092003$0026qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026ps$003d300? 2024-05-26T21:34:00Z Building a global information assurance program ent://SD_ILS/0/SD_ILS:2322916 2024-05-26T21:34:00Z 2024-05-26T21:34:00Z by&#160;Curts, Raymond J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780203997550/?ar">https://learning.oreilly.com/library/view/~/9780203997550/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780203997550/?ar">https://go.oreilly.com/library-access/library/view/-/9780203997550/?ar</a><br/>Format:&#160;Electronic Resources<br/> Incident response &amp; computer forensics ent://SD_ILS/0/SD_ILS:2280958 2024-05-26T21:34:00Z 2024-05-26T21:34:00Z by&#160;Prosise, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/9780072226966">https://learning.oreilly.com/library/view/~/9780072226966</a> <a href="https://learning.oreilly.com/library/view/~/9780072226966/?ar">https://learning.oreilly.com/library/view/~/9780072226966/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780072226966/?ar">https://go.oreilly.com/library-access/library/view/-/9780072226966/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical UNIX and Internet security ent://SD_ILS/0/SD_ILS:2281256 2024-05-26T21:34:00Z 2024-05-26T21:34:00Z by&#160;Garfinkel, Simson.<br/><a href="https://learning.oreilly.com/library/view/~/0596003234">https://learning.oreilly.com/library/view/~/0596003234</a> <a href="https://learning.oreilly.com/library/view/~/0596003234/?ar">https://learning.oreilly.com/library/view/~/0596003234/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596003234/?ar">https://go.oreilly.com/library-access/library/view/-/0596003234/?ar</a><br/>Format:&#160;Electronic Resources<br/> Intrusion detection with Snort ent://SD_ILS/0/SD_ILS:2281704 2024-05-26T21:34:00Z 2024-05-26T21:34:00Z by&#160;Koziol, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/157870281X">https://learning.oreilly.com/library/view/~/157870281X</a> <a href="https://learning.oreilly.com/library/view/~/157870281X/?ar">https://learning.oreilly.com/library/view/~/157870281X/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/157870281X/?ar">https://go.oreilly.com/library-access/library/view/-/157870281X/?ar</a><br/>Format:&#160;Electronic Resources<br/> Writing secure code : practical strategies and proven techniques for building secure applications in a networked world ent://SD_ILS/0/SD_ILS:2281158 2024-05-26T21:34:00Z 2024-05-26T21:34:00Z by&#160;Howard, Michael, 1965- author.<br/><a href="https://learning.oreilly.com/library/view/~/0735617228">https://learning.oreilly.com/library/view/~/0735617228</a> <a href="https://go.oreilly.com/library-access/library/view/-/0735617228/?ar">https://go.oreilly.com/library-access/library/view/-/0735617228/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0735617228/?ar">https://learning.oreilly.com/library/view/~/0735617228/?ar</a><br/>Format:&#160;Electronic Resources<br/> Honeypots : tracking hackers ent://SD_ILS/0/SD_ILS:2280821 2024-05-26T21:34:00Z 2024-05-26T21:34:00Z by&#160;Spitzner, Lance.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321108957/?ar">https://go.oreilly.com/library-access/library/view/-/0321108957/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321108957/?ar">https://learning.oreilly.com/library/view/~/0321108957/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321108957">https://learning.oreilly.com/library/view/~/0321108957</a><br/>Format:&#160;Electronic Resources<br/> Secure coding : principles and practices ent://SD_ILS/0/SD_ILS:2281006 2024-05-26T21:34:00Z 2024-05-26T21:34:00Z by&#160;Graff, Mark.<br/><a href="https://learning.oreilly.com/library/view/~/0596002424">https://learning.oreilly.com/library/view/~/0596002424</a> <a href="https://learning.oreilly.com/library/view/~/0596002424/?ar">https://learning.oreilly.com/library/view/~/0596002424/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596002424/?ar">https://go.oreilly.com/library-access/library/view/-/0596002424/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security for Microsoft Visual Basic .NET ent://SD_ILS/0/SD_ILS:2281971 2024-05-26T21:34:00Z 2024-05-26T21:34:00Z by&#160;Robinson, Ed, 1967-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0735619190/?ar">https://go.oreilly.com/library-access/library/view/-/0735619190/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0735619190/?ar">https://learning.oreilly.com/library/view/~/0735619190/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0735619190">https://learning.oreilly.com/library/view/~/0735619190</a><br/>Format:&#160;Electronic Resources<br/> Mac OS X security ent://SD_ILS/0/SD_ILS:2281166 2024-05-26T21:34:00Z 2024-05-26T21:34:00Z by&#160;Potter, Bruce.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0735713480/?ar">https://go.oreilly.com/library-access/library/view/-/0735713480/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0735713480">https://learning.oreilly.com/library/view/~/0735713480</a> <a href="https://learning.oreilly.com/library/view/~/0735713480/?ar">https://learning.oreilly.com/library/view/~/0735713480/?ar</a><br/>Format:&#160;Electronic Resources<br/> Inside Java 2 platform security : architecture, API design, and implementation ent://SD_ILS/0/SD_ILS:2288322 2024-05-26T21:34:00Z 2024-05-26T21:34:00Z by&#160;Gong, Li.<br/><a href="https://learning.oreilly.com/library/view/~/0201787911">https://learning.oreilly.com/library/view/~/0201787911</a> <a href="https://learning.oreilly.com/library/view/~/0201787911/?ar">https://learning.oreilly.com/library/view/~/0201787911/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0201787911/?ar">https://go.oreilly.com/library-access/library/view/-/0201787911/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering network security ent://SD_ILS/0/SD_ILS:2287799 2024-05-26T21:34:00Z 2024-05-26T21:34:00Z by&#160;Brenton, Chris.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780782141429/?ar">https://go.oreilly.com/library-access/library/view/-/9780782141429/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780782141429/?ar">https://learning.oreilly.com/library/view/~/9780782141429/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780782141429">https://learning.oreilly.com/library/view/~/9780782141429</a><br/>Format:&#160;Electronic Resources<br/> Secure programming cookbook for C and C++ ent://SD_ILS/0/SD_ILS:2286392 2024-05-26T21:34:00Z 2024-05-26T21:34:00Z by&#160;Viega, John.<br/><a href="https://learning.oreilly.com/library/view/~/0596003943">https://learning.oreilly.com/library/view/~/0596003943</a> <a href="https://learning.oreilly.com/library/view/~/0596003943/?ar">https://learning.oreilly.com/library/view/~/0596003943/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596003943/?ar">https://go.oreilly.com/library-access/library/view/-/0596003943/?ar</a><br/>Format:&#160;Electronic Resources<br/> Snort Intrusion Detection 2.0. ent://SD_ILS/0/SD_ILS:2286960 2024-05-26T21:34:00Z 2024-05-26T21:34:00Z by&#160;Russell, Ryan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780080481005/?ar">https://go.oreilly.com/library-access/library/view/-/9780080481005/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780080481005/?ar">https://learning.oreilly.com/library/view/~/9780080481005/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780080481005">https://learning.oreilly.com/library/view/~/9780080481005</a><br/>Format:&#160;Electronic Resources<br/> Cisco security professional's guide to secure intrusion detection systems ent://SD_ILS/0/SD_ILS:2306221 2024-05-26T21:34:00Z 2024-05-26T21:34:00Z by&#160;Burton, James D., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781932266696/?ar">https://go.oreilly.com/library-access/library/view/-/9781932266696/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781932266696/?ar">https://learning.oreilly.com/library/view/~/9781932266696/?ar</a><br/>Format:&#160;Electronic Resources<br/> . Net Security and Cryptography. ent://SD_ILS/0/SD_ILS:2317896 2024-05-26T21:34:00Z 2024-05-26T21:34:00Z by&#160;Thorsteinson, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/013100851X">https://learning.oreilly.com/library/view/~/013100851X</a> <a href="https://learning.oreilly.com/library/view/~/013100851X/?ar">https://learning.oreilly.com/library/view/~/013100851X/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/013100851X/?ar">https://go.oreilly.com/library-access/library/view/-/013100851X/?ar</a><br/>Format:&#160;Electronic Resources<br/> Designing Network Security Second Edition ent://SD_ILS/0/SD_ILS:2319725 2024-05-26T21:34:00Z 2024-05-26T21:34:00Z by&#160;Kaeo, Merike, author.<br/><a href="https://learning.oreilly.com/library/view/~/1587051176/?ar">https://learning.oreilly.com/library/view/~/1587051176/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1587051176">https://learning.oreilly.com/library/view/~/1587051176</a> <a href="https://go.oreilly.com/library-access/library/view/-/1587051176/?ar">https://go.oreilly.com/library-access/library/view/-/1587051176/?ar</a><br/>Format:&#160;Electronic Resources<br/> Malware : Fighting Malicious Code. ent://SD_ILS/0/SD_ILS:2317983 2024-05-26T21:34:00Z 2024-05-26T21:34:00Z by&#160;Skoudis, Ed, author.<br/><a href="https://learning.oreilly.com/library/view/~/0131014056">https://learning.oreilly.com/library/view/~/0131014056</a> <a href="https://learning.oreilly.com/library/view/~/0131014056/?ar">https://learning.oreilly.com/library/view/~/0131014056/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0131014056/?ar">https://go.oreilly.com/library-access/library/view/-/0131014056/?ar</a><br/>Format:&#160;Electronic Resources<br/> Biometrics for Network Security ent://SD_ILS/0/SD_ILS:2326814 2024-05-26T21:34:00Z 2024-05-26T21:34:00Z by&#160;Reid, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/0131015494">https://learning.oreilly.com/library/view/~/0131015494</a> <a href="https://learning.oreilly.com/library/view/~/0131015494/?ar">https://learning.oreilly.com/library/view/~/0131015494/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0131015494/?ar">https://go.oreilly.com/library-access/library/view/-/0131015494/?ar</a><br/>Format:&#160;Electronic Resources<br/>