Search Results for - Narrowed by: 2004 - Computer security.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092004$0025092004$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?2024-06-20T02:58:22ZCyber adversary characterization auditing the hacker mindent://SD_ILS/0/SD_ILS:655792024-06-20T02:58:22Z2024-06-20T02:58:22Zby Parker, Tom, 1982-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836111">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Bluetooth Security.ent://SD_ILS/0/SD_ILS:11833592024-06-20T02:58:22Z2024-06-20T02:58:22Zby Gehrmann, Christian.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227650">Click to View</a><br/>Format: Electronic Resources<br/>Finding and Fixing Vulnerabilities in Information Systems : The Vulnerability Assessment and Mitigation Methodology.ent://SD_ILS/0/SD_ILS:11810992024-06-20T02:58:22Z2024-06-20T02:58:22Zby Anton, Philip S.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=197482">Click to View</a><br/>Format: Electronic Resources<br/>User's Guide tp Crytography and Standards.ent://SD_ILS/0/SD_ILS:11833672024-06-20T02:58:22Z2024-06-20T02:58:22Zby Dent, Alex.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227658">Click to View</a><br/>Format: Electronic Resources<br/>Privacy Protection and Computer Forensics.ent://SD_ILS/0/SD_ILS:11834012024-06-20T02:58:22Z2024-06-20T02:58:22Zby Caloyannides, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227692">Click to View</a><br/>Format: Electronic Resources<br/>Intelligent Watermarking Techniques : Series On Innovative Intelligence.ent://SD_ILS/0/SD_ILS:11836292024-06-20T02:58:22Z2024-06-20T02:58:22Zby Pan, Jeng-Shyang.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=231561">Click to View</a><br/>Format: Electronic Resources<br/>Innocent Code : A Security Wake-Up Call for Web Programmers.ent://SD_ILS/0/SD_ILS:11819202024-06-20T02:58:22Z2024-06-20T02:58:22Zby Huseby, Sverre H.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=210558">Click to View</a><br/>Format: Electronic Resources<br/>Protecting Your Library's Digital Sources : The Essential Guide to Planning and Preservation.ent://SD_ILS/0/SD_ILS:11824142024-06-20T02:58:22Z2024-06-20T02:58:22Zby Kahn, Miriam B.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=218937">Click to View</a><br/>Format: Electronic Resources<br/>Stealing the Network : How to Own a Continent.ent://SD_ILS/0/SD_ILS:11921162024-06-20T02:58:22Z2024-06-20T02:58:22Zby Russell, Ryan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294377">Click to View</a><br/>Format: Electronic Resources<br/>WarDriving : A Guide to Wireless Security.ent://SD_ILS/0/SD_ILS:11921352024-06-20T02:58:22Z2024-06-20T02:58:22Zby Hurley, Chris.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294441">Click to View</a><br/>Format: Electronic Resources<br/>Google Hacking for Penetration Testers.ent://SD_ILS/0/SD_ILS:11920392024-06-20T02:58:22Z2024-06-20T02:58:22Zby Long, Johnny.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294147">Click to View</a><br/>Format: Electronic Resources<br/>MCSE Designing Security for a Windows Server 2003 Network (Exam 70-298) : Study Guide and DVD Training System.ent://SD_ILS/0/SD_ILS:11920722024-06-20T02:58:22Z2024-06-20T02:58:22Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294253">Click to View</a><br/>Format: Electronic Resources<br/>Programmer's Ultimate Security DeskRef : Your Programming Security Encyclopedia.ent://SD_ILS/0/SD_ILS:11920972024-06-20T02:58:22Z2024-06-20T02:58:22Zby Foster, James C.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294328">Click to View</a><br/>Format: Electronic Resources<br/>WarDriving drive, detect, defend : a guide to wireless securityent://SD_ILS/0/SD_ILS:658052024-06-20T02:58:22Z2024-06-20T02:58:22Zby Hurley, Chris.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836036">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Implementing homeland security for enterprise ITent://SD_ILS/0/SD_ILS:656212024-06-20T02:58:22Z2024-06-20T02:58:22Zby Erbschloe, Michael, 1951-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">An electronic book accessible through the World Wide Web; click for information</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/els051/2003062590.html">http://www.loc.gov/catdir/toc/els051/2003062590.html</a>
Publisher description <a href="http://www.loc.gov/catdir/description/els041/2003062590.html">http://www.loc.gov/catdir/description/els041/2003062590.html</a><br/>Format: Electronic Resources<br/>Snort 2.1 intrusion detectionent://SD_ILS/0/SD_ILS:659072024-06-20T02:58:22Z2024-06-20T02:58:22Zby Beale, Jay.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836043">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Security assessment case studies for implementing the NSA IAMent://SD_ILS/0/SD_ILS:659382024-06-20T02:58:22Z2024-06-20T02:58:22Zby Rogers, Russ.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266962">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>HP Nonstop server securit a practical handbookent://SD_ILS/0/SD_ILS:657622024-06-20T02:58:22Z2024-06-20T02:58:22Zby Hill, Terri.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583149">An electronic book accessible through the World Wide Web; click for information</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/els051/2004296150.html">http://www.loc.gov/catdir/toc/els051/2004296150.html</a>
Publisher description <a href="http://www.loc.gov/catdir/description/els051/2004296150.html">http://www.loc.gov/catdir/description/els051/2004296150.html</a><br/>Format: Electronic Resources<br/>Nessus network auditingent://SD_ILS/0/SD_ILS:659852024-06-20T02:58:22Z2024-06-20T02:58:22Zby Deraison, Renaud.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836081">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Wireless operational securityent://SD_ILS/0/SD_ILS:660872024-06-20T02:58:22Z2024-06-20T02:58:22Zby Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583170">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Windows Server 2003 security infrastructuresent://SD_ILS/0/SD_ILS:660192024-06-20T02:58:22Z2024-06-20T02:58:22Zby Clercq, Jan de, 1968-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582838">An electronic book accessible through the World Wide Web; click for information</a>
Publisher description <a href="http://www.loc.gov/catdir/description/els051/2004273211.html">http://www.loc.gov/catdir/description/els051/2004273211.html</a><br/>Format: Electronic Resources<br/>Dr. Tom Shinder's Configuring ISA Server 2004.ent://SD_ILS/0/SD_ILS:11920222024-06-20T02:58:22Z2024-06-20T02:58:22Zby Littlejohn Shinder, Debra.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294094">Click to View</a><br/>Format: Electronic Resources<br/>Ethereal Packet Sniffing.ent://SD_ILS/0/SD_ILS:11920282024-06-20T02:58:22Z2024-06-20T02:58:22Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294122">Click to View</a><br/>Format: Electronic Resources<br/>Hacking the Code : Auditor's Guide to Writing Secure Code for the Web.ent://SD_ILS/0/SD_ILS:11920482024-06-20T02:58:22Z2024-06-20T02:58:22Zby Burnett, Mark.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294160">Click to View</a><br/>Format: Electronic Resources<br/>Cyber Adversary Characterization : Auditing the Hacker Mind.ent://SD_ILS/0/SD_ILS:11920122024-06-20T02:58:22Z2024-06-20T02:58:22Zby Parker, Tom.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294071">Click to View</a><br/>Format: Electronic Resources<br/>Click, Click, Who's There? : A Family-Based, Non-Technical Approach to Help Parents Protect Their Children Online.ent://SD_ILS/0/SD_ILS:11975872024-06-20T02:58:22Z2024-06-20T02:58:22Zby Koh, Lisa.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=338852">Click to View</a><br/>Format: Electronic Resources<br/>Security Sage's Guide to Hardening the Network Infrastructure.ent://SD_ILS/0/SD_ILS:11921082024-06-20T02:58:22Z2024-06-20T02:58:22Zby Andres, Steven.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294359">Click to View</a><br/>Format: Electronic Resources<br/>Computer Forensics JumpStart.ent://SD_ILS/0/SD_ILS:11871092024-06-20T02:58:22Z2024-06-20T02:58:22Zby Solomon, Micah.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=267268">Click to View</a><br/>Format: Electronic Resources<br/>Homeland Security : Techniques and Technologies.ent://SD_ILS/0/SD_ILS:13044202024-06-20T02:58:22Z2024-06-20T02:58:22Zby Mena, Jesus.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3135665">Click to View</a><br/>Format: Electronic Resources<br/>IBM eServer zSeries 990 (z990) Cryptography Implementation.ent://SD_ILS/0/SD_ILS:13101822024-06-20T02:58:22Z2024-06-20T02:58:22Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306791">Click to View</a><br/>Format: Electronic Resources<br/>Linux on IBM eServer zSeries and S/390 : Best Security Practices.ent://SD_ILS/0/SD_ILS:13102262024-06-20T02:58:22Z2024-06-20T02:58:22Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306835">Click to View</a><br/>Format: Electronic Resources<br/>zSeries Trusted Key Entry (TKE) V4.2 Update.ent://SD_ILS/0/SD_ILS:13100672024-06-20T02:58:22Z2024-06-20T02:58:22Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306676">Click to View</a><br/>Format: Electronic Resources<br/>iSeries Access for Windows V5R2 Hot Topics : Tailored Images, Application Administration, SSL, and Kerberos.ent://SD_ILS/0/SD_ILS:13100902024-06-20T02:58:22Z2024-06-20T02:58:22Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306699">Click to View</a><br/>Format: Electronic Resources<br/>Code Hacking : A Developer's Guide to Network Security.ent://SD_ILS/0/SD_ILS:13044362024-06-20T02:58:22Z2024-06-20T02:58:22Zby Conway, Richard.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3135681">Click to View</a><br/>Format: Electronic Resources<br/>Assessing and Managing Security Risk in IT Systemsent://SD_ILS/0/SD_ILS:23263052024-06-20T02:58:22Z2024-06-20T02:58:22Zby McCumber, John.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780203490426/?ar">https://go.oreilly.com/library-access/library/view/-/9780203490426/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780203490426">https://learning.oreilly.com/library/view/~/9780203490426</a>
<a href="https://learning.oreilly.com/library/view/~/9780203490426/?ar">https://learning.oreilly.com/library/view/~/9780203490426/?ar</a><br/>Format: Electronic Resources<br/>Information security and ethics social and organizational issuesent://SD_ILS/0/SD_ILS:22615972024-06-20T02:58:22Z2024-06-20T02:58:22Zby Quigley, Marian.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-286-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-286-7</a><br/>Format: Electronic Resources<br/>Information security policies and actions in modern integrated systemsent://SD_ILS/0/SD_ILS:22615992024-06-20T02:58:22Z2024-06-20T02:58:22Zby Fugini, Mariagrazia, 1957-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-186-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-186-5</a><br/>Format: Electronic Resources<br/>Managing security with Snort and IDS toolsent://SD_ILS/0/SD_ILS:22914502024-06-20T02:58:22Z2024-06-20T02:58:22Zby Cox, Kerry.<br/><a href="https://learning.oreilly.com/library/view/~/0596006616">https://learning.oreilly.com/library/view/~/0596006616</a>
<a href="https://learning.oreilly.com/library/view/~/0596006616/?ar">https://learning.oreilly.com/library/view/~/0596006616/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596006616/?ar">https://go.oreilly.com/library-access/library/view/-/0596006616/?ar</a><br/>Format: Electronic Resources<br/>Effective Oracle Database 10g security by designent://SD_ILS/0/SD_ILS:22850822024-06-20T02:58:22Z2024-06-20T02:58:22Zby Knox, David (David C.)<br/><a href="https://learning.oreilly.com/library/view/~/9780072231304/?ar">https://learning.oreilly.com/library/view/~/9780072231304/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780072231304/?ar">https://go.oreilly.com/library-access/library/view/-/9780072231304/?ar</a><br/>Format: Electronic Resources<br/>The effective incident response teament://SD_ILS/0/SD_ILS:22847362024-06-20T02:58:22Z2024-06-20T02:58:22Zby Lucas, Julie, 1964-<br/><a href="https://learning.oreilly.com/library/view/~/0201761750">https://learning.oreilly.com/library/view/~/0201761750</a>
<a href="https://learning.oreilly.com/library/view/~/0201761750/?ar">https://learning.oreilly.com/library/view/~/0201761750/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0201761750/?ar">https://go.oreilly.com/library-access/library/view/-/0201761750/?ar</a><br/>Format: Electronic Resources<br/>Linux on IBM eserver zSeries and S/390 best security practicesent://SD_ILS/0/SD_ILS:23043142024-06-20T02:58:22Z2024-06-20T02:58:22Zby Geiselhart, Gregory.<br/><a href="https://learning.oreilly.com/library/view/~/0738497665/?ar">https://learning.oreilly.com/library/view/~/0738497665/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738497665/?ar">https://go.oreilly.com/library-access/library/view/-/0738497665/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738497665">https://learning.oreilly.com/library/view/~/0738497665</a><br/>Format: Electronic Resources<br/>Privacy What Developers and IT Professionals Should Knowent://SD_ILS/0/SD_ILS:23197422024-06-20T02:58:22Z2024-06-20T02:58:22Zby Cannon, J., author.<br/><a href="https://learning.oreilly.com/library/view/~/0321224094">https://learning.oreilly.com/library/view/~/0321224094</a>
<a href="https://learning.oreilly.com/library/view/~/0321224094/?ar">https://learning.oreilly.com/library/view/~/0321224094/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0321224094/?ar">https://go.oreilly.com/library-access/library/view/-/0321224094/?ar</a><br/>Format: Electronic Resources<br/>The .NET developer's guide to Windows securityent://SD_ILS/0/SD_ILS:23241532024-06-20T02:58:22Z2024-06-20T02:58:22Zby Brown, Keith, 1967 March 16-<br/><a href="https://learning.oreilly.com/library/view/~/0321228359">https://learning.oreilly.com/library/view/~/0321228359</a>
<a href="https://learning.oreilly.com/library/view/~/0321228359/?ar">https://learning.oreilly.com/library/view/~/0321228359/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0321228359/?ar">https://go.oreilly.com/library-access/library/view/-/0321228359/?ar</a><br/>Format: Electronic Resources<br/>Introduction to Computer Security.ent://SD_ILS/0/SD_ILS:23179802024-06-20T02:58:22Z2024-06-20T02:58:22Zby Bishop, Matt (Matthew A.), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321247442/?ar">https://go.oreilly.com/library-access/library/view/-/0321247442/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321247442/?ar">https://learning.oreilly.com/library/view/~/0321247442/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321247442">https://learning.oreilly.com/library/view/~/0321247442</a><br/>Format: Electronic Resources<br/>Security awareness : applying practical security in your worldent://SD_ILS/0/SD_ILS:23357372024-06-20T02:58:22Z2024-06-20T02:58:22Zby Ciampa, Mark D., author<br/>Format: Books<br/>IT security advice from expertsent://SD_ILS/0/SD_ILS:22616852024-06-20T02:58:22Z2024-06-20T02:58:22Zby Oliva, Lawrence M.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-247-3">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-247-3</a><br/>Format: Electronic Resources<br/>Malicious cryptography : exposing cryptovirologyent://SD_ILS/0/SD_ILS:23102812024-06-20T02:58:22Z2024-06-20T02:58:22Zby Young, Adam, 1972- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780764568466/?ar">https://go.oreilly.com/library-access/library/view/-/9780764568466/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780764568466">https://learning.oreilly.com/library/view/~/9780764568466</a>
<a href="https://learning.oreilly.com/library/view/~/9780764568466/?ar">https://learning.oreilly.com/library/view/~/9780764568466/?ar</a><br/>Format: Electronic Resources<br/>Enterprise Java security : building secure J2EE applicationsent://SD_ILS/0/SD_ILS:22813552024-06-20T02:58:22Z2024-06-20T02:58:22Zby Pistoia, Marco.<br/><a href="https://learning.oreilly.com/library/view/~/0321118898">https://learning.oreilly.com/library/view/~/0321118898</a>
<a href="https://learning.oreilly.com/library/view/~/0321118898/?ar">https://learning.oreilly.com/library/view/~/0321118898/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0321118898/?ar">https://go.oreilly.com/library-access/library/view/-/0321118898/?ar</a><br/>Format: Electronic Resources<br/>Defend I.T. : security by exampleent://SD_ILS/0/SD_ILS:22814962024-06-20T02:58:22Z2024-06-20T02:58:22Zby Gupta, Ajay.<br/><a href="https://learning.oreilly.com/library/view/~/0321197674">https://learning.oreilly.com/library/view/~/0321197674</a>
<a href="https://learning.oreilly.com/library/view/~/0321197674/?ar">https://learning.oreilly.com/library/view/~/0321197674/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0321197674/?ar">https://go.oreilly.com/library-access/library/view/-/0321197674/?ar</a><br/>Format: Electronic Resources<br/>IBM eserver zSeries 990 (z990) cryptography implementationent://SD_ILS/0/SD_ILS:22832922024-06-20T02:58:22Z2024-06-20T02:58:22Zby Rayns, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/0738490369">https://learning.oreilly.com/library/view/~/0738490369</a>
<a href="https://learning.oreilly.com/library/view/~/0738490369/?ar">https://learning.oreilly.com/library/view/~/0738490369/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738490369/?ar">https://go.oreilly.com/library-access/library/view/-/0738490369/?ar</a><br/>Format: Electronic Resources<br/>The shellcoder's handbook : discovering and exploiting security holesent://SD_ILS/0/SD_ILS:22818332024-06-20T02:58:22Z2024-06-20T02:58:22Zby Koziol, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/9780764544682">https://learning.oreilly.com/library/view/~/9780764544682</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780764544682/?ar">https://go.oreilly.com/library-access/library/view/-/9780764544682/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780764544682/?ar">https://learning.oreilly.com/library/view/~/9780764544682/?ar</a><br/>Format: Electronic Resources<br/>HP Nonstop server security : a practical handbookent://SD_ILS/0/SD_ILS:22819222024-06-20T02:58:22Z2024-06-20T02:58:22Zby Hill, Terri.<br/><a href="https://learning.oreilly.com/library/view/~/9781555583149">https://learning.oreilly.com/library/view/~/9781555583149</a>
<a href="https://learning.oreilly.com/library/view/~/9781555583149/?ar">https://learning.oreilly.com/library/view/~/9781555583149/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781555583149/?ar">https://go.oreilly.com/library-access/library/view/-/9781555583149/?ar</a>
<a href="https://www.sciencedirect.com/science/book/9781555583149">https://www.sciencedirect.com/science/book/9781555583149</a><br/>Format: Electronic Resources<br/>Buffer-Overflows und Format-String-Schwachstellen : Funktionsweisen, Exploits und Gegenmassnahmenent://SD_ILS/0/SD_ILS:22864512024-06-20T02:58:22Z2024-06-20T02:58:22Zby Klein, Tobias.<br/><a href="https://learning.oreilly.com/library/view/~/9783898641920/?ar">https://learning.oreilly.com/library/view/~/9783898641920/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783898641920/?ar">https://go.oreilly.com/library-access/library/view/-/9783898641920/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783898641920">https://learning.oreilly.com/library/view/~/9783898641920</a><br/>Format: Electronic Resources<br/>Network security hacksent://SD_ILS/0/SD_ILS:22813772024-06-20T02:58:22Z2024-06-20T02:58:22Zby Lockhart, Andrew.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596006438/?ar">https://go.oreilly.com/library-access/library/view/-/0596006438/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596006438/?ar">https://learning.oreilly.com/library/view/~/0596006438/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596006438">https://learning.oreilly.com/library/view/~/0596006438</a><br/>Format: Electronic Resources<br/>Snort 2.1 intrusion detectionent://SD_ILS/0/SD_ILS:22836402024-06-20T02:58:22Z2024-06-20T02:58:22Zby Beale, Jay.<br/><a href="https://www.sciencedirect.com/science/book/9781931836043">https://www.sciencedirect.com/science/book/9781931836043</a>
<a href="https://learning.oreilly.com/library/view/~/9781931836043/?ar">https://learning.oreilly.com/library/view/~/9781931836043/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781931836043/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836043/?ar</a><br/>Format: Electronic Resources<br/>