Search Results for - Narrowed by: 2004 - S&eacute;curit&eacute; informatique. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092004$0025092004$0026qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026ps$003d300? 2024-05-31T22:37:00Z Introduction to Computer Security. ent://SD_ILS/0/SD_ILS:2317980 2024-05-31T22:37:00Z 2024-05-31T22:37:00Z by&#160;Bishop, Matt (Matthew A.), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321247442/?ar">https://go.oreilly.com/library-access/library/view/-/0321247442/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321247442/?ar">https://learning.oreilly.com/library/view/~/0321247442/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321247442">https://learning.oreilly.com/library/view/~/0321247442</a><br/>Format:&#160;Electronic Resources<br/> Privacy What Developers and IT Professionals Should Know ent://SD_ILS/0/SD_ILS:2319742 2024-05-31T22:37:00Z 2024-05-31T22:37:00Z by&#160;Cannon, J., author.<br/><a href="https://learning.oreilly.com/library/view/~/0321224094">https://learning.oreilly.com/library/view/~/0321224094</a> <a href="https://learning.oreilly.com/library/view/~/0321224094/?ar">https://learning.oreilly.com/library/view/~/0321224094/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0321224094/?ar">https://go.oreilly.com/library-access/library/view/-/0321224094/?ar</a><br/>Format:&#160;Electronic Resources<br/> Malicious cryptography : exposing cryptovirology ent://SD_ILS/0/SD_ILS:2310281 2024-05-31T22:37:00Z 2024-05-31T22:37:00Z by&#160;Young, Adam, 1972- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780764568466/?ar">https://go.oreilly.com/library-access/library/view/-/9780764568466/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780764568466">https://learning.oreilly.com/library/view/~/9780764568466</a> <a href="https://learning.oreilly.com/library/view/~/9780764568466/?ar">https://learning.oreilly.com/library/view/~/9780764568466/?ar</a><br/>Format:&#160;Electronic Resources<br/> Buffer-Overflows und Format-String-Schwachstellen : Funktionsweisen, Exploits und Gegenmassnahmen ent://SD_ILS/0/SD_ILS:2286451 2024-05-31T22:37:00Z 2024-05-31T22:37:00Z by&#160;Klein, Tobias.<br/><a href="https://learning.oreilly.com/library/view/~/9783898641920/?ar">https://learning.oreilly.com/library/view/~/9783898641920/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783898641920/?ar">https://go.oreilly.com/library-access/library/view/-/9783898641920/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783898641920">https://learning.oreilly.com/library/view/~/9783898641920</a><br/>Format:&#160;Electronic Resources<br/> Snort 2.1 intrusion detection ent://SD_ILS/0/SD_ILS:2283640 2024-05-31T22:37:00Z 2024-05-31T22:37:00Z by&#160;Beale, Jay.<br/><a href="https://www.sciencedirect.com/science/book/9781931836043">https://www.sciencedirect.com/science/book/9781931836043</a> <a href="https://learning.oreilly.com/library/view/~/9781931836043/?ar">https://learning.oreilly.com/library/view/~/9781931836043/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781931836043/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836043/?ar</a><br/>Format:&#160;Electronic Resources<br/> Defend I.T. : security by example ent://SD_ILS/0/SD_ILS:2281496 2024-05-31T22:37:00Z 2024-05-31T22:37:00Z by&#160;Gupta, Ajay.<br/><a href="https://learning.oreilly.com/library/view/~/0321197674">https://learning.oreilly.com/library/view/~/0321197674</a> <a href="https://learning.oreilly.com/library/view/~/0321197674/?ar">https://learning.oreilly.com/library/view/~/0321197674/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0321197674/?ar">https://go.oreilly.com/library-access/library/view/-/0321197674/?ar</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Java security : building secure J2EE applications ent://SD_ILS/0/SD_ILS:2281355 2024-05-31T22:37:00Z 2024-05-31T22:37:00Z by&#160;Pistoia, Marco.<br/><a href="https://learning.oreilly.com/library/view/~/0321118898">https://learning.oreilly.com/library/view/~/0321118898</a> <a href="https://learning.oreilly.com/library/view/~/0321118898/?ar">https://learning.oreilly.com/library/view/~/0321118898/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0321118898/?ar">https://go.oreilly.com/library-access/library/view/-/0321118898/?ar</a><br/>Format:&#160;Electronic Resources<br/> HP Nonstop server security : a practical handbook ent://SD_ILS/0/SD_ILS:2281922 2024-05-31T22:37:00Z 2024-05-31T22:37:00Z by&#160;Hill, Terri.<br/><a href="https://learning.oreilly.com/library/view/~/9781555583149">https://learning.oreilly.com/library/view/~/9781555583149</a> <a href="https://learning.oreilly.com/library/view/~/9781555583149/?ar">https://learning.oreilly.com/library/view/~/9781555583149/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781555583149/?ar">https://go.oreilly.com/library-access/library/view/-/9781555583149/?ar</a> <a href="https://www.sciencedirect.com/science/book/9781555583149">https://www.sciencedirect.com/science/book/9781555583149</a><br/>Format:&#160;Electronic Resources<br/> Network security hacks ent://SD_ILS/0/SD_ILS:2281377 2024-05-31T22:37:00Z 2024-05-31T22:37:00Z by&#160;Lockhart, Andrew.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596006438/?ar">https://go.oreilly.com/library-access/library/view/-/0596006438/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596006438/?ar">https://learning.oreilly.com/library/view/~/0596006438/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596006438">https://learning.oreilly.com/library/view/~/0596006438</a><br/>Format:&#160;Electronic Resources<br/> The shellcoder's handbook : discovering and exploiting security holes ent://SD_ILS/0/SD_ILS:2281833 2024-05-31T22:37:00Z 2024-05-31T22:37:00Z by&#160;Koziol, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/9780764544682">https://learning.oreilly.com/library/view/~/9780764544682</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780764544682/?ar">https://go.oreilly.com/library-access/library/view/-/9780764544682/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780764544682/?ar">https://learning.oreilly.com/library/view/~/9780764544682/?ar</a><br/>Format:&#160;Electronic Resources<br/> IBM eserver zSeries 990 (z990) cryptography implementation ent://SD_ILS/0/SD_ILS:2283292 2024-05-31T22:37:00Z 2024-05-31T22:37:00Z by&#160;Rayns, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/0738490369">https://learning.oreilly.com/library/view/~/0738490369</a> <a href="https://learning.oreilly.com/library/view/~/0738490369/?ar">https://learning.oreilly.com/library/view/~/0738490369/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0738490369/?ar">https://go.oreilly.com/library-access/library/view/-/0738490369/?ar</a><br/>Format:&#160;Electronic Resources<br/> Effective Oracle Database 10g security by design ent://SD_ILS/0/SD_ILS:2285082 2024-05-31T22:37:00Z 2024-05-31T22:37:00Z by&#160;Knox, David (David C.)<br/><a href="https://learning.oreilly.com/library/view/~/9780072231304/?ar">https://learning.oreilly.com/library/view/~/9780072231304/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780072231304/?ar">https://go.oreilly.com/library-access/library/view/-/9780072231304/?ar</a><br/>Format:&#160;Electronic Resources<br/> The effective incident response team ent://SD_ILS/0/SD_ILS:2284736 2024-05-31T22:37:00Z 2024-05-31T22:37:00Z by&#160;Lucas, Julie, 1964-<br/><a href="https://learning.oreilly.com/library/view/~/0201761750">https://learning.oreilly.com/library/view/~/0201761750</a> <a href="https://learning.oreilly.com/library/view/~/0201761750/?ar">https://learning.oreilly.com/library/view/~/0201761750/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0201761750/?ar">https://go.oreilly.com/library-access/library/view/-/0201761750/?ar</a><br/>Format:&#160;Electronic Resources<br/> Managing security with Snort and IDS tools ent://SD_ILS/0/SD_ILS:2291450 2024-05-31T22:37:00Z 2024-05-31T22:37:00Z by&#160;Cox, Kerry.<br/><a href="https://learning.oreilly.com/library/view/~/0596006616">https://learning.oreilly.com/library/view/~/0596006616</a> <a href="https://learning.oreilly.com/library/view/~/0596006616/?ar">https://learning.oreilly.com/library/view/~/0596006616/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596006616/?ar">https://go.oreilly.com/library-access/library/view/-/0596006616/?ar</a><br/>Format:&#160;Electronic Resources<br/> Linux on IBM eserver zSeries and S/390 best security practices ent://SD_ILS/0/SD_ILS:2304314 2024-05-31T22:37:00Z 2024-05-31T22:37:00Z by&#160;Geiselhart, Gregory.<br/><a href="https://learning.oreilly.com/library/view/~/0738497665/?ar">https://learning.oreilly.com/library/view/~/0738497665/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0738497665/?ar">https://go.oreilly.com/library-access/library/view/-/0738497665/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738497665">https://learning.oreilly.com/library/view/~/0738497665</a><br/>Format:&#160;Electronic Resources<br/> The .NET developer's guide to Windows security ent://SD_ILS/0/SD_ILS:2324153 2024-05-31T22:37:00Z 2024-05-31T22:37:00Z by&#160;Brown, Keith, 1967 March 16-<br/><a href="https://learning.oreilly.com/library/view/~/0321228359">https://learning.oreilly.com/library/view/~/0321228359</a> <a href="https://learning.oreilly.com/library/view/~/0321228359/?ar">https://learning.oreilly.com/library/view/~/0321228359/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0321228359/?ar">https://go.oreilly.com/library-access/library/view/-/0321228359/?ar</a><br/>Format:&#160;Electronic Resources<br/> Assessing and Managing Security Risk in IT Systems ent://SD_ILS/0/SD_ILS:2326305 2024-05-31T22:37:00Z 2024-05-31T22:37:00Z by&#160;McCumber, John.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780203490426/?ar">https://go.oreilly.com/library-access/library/view/-/9780203490426/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780203490426">https://learning.oreilly.com/library/view/~/9780203490426</a> <a href="https://learning.oreilly.com/library/view/~/9780203490426/?ar">https://learning.oreilly.com/library/view/~/9780203490426/?ar</a><br/>Format:&#160;Electronic Resources<br/>