Search Results for - Narrowed by: 2005 - Computer networks -- Security measures. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092005$0025092005$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300? 2024-06-18T08:22:35Z Microsoft Internet security and acceleration (ISA) server 2004 administrator's pocket consultant ent://SD_ILS/0/SD_ILS:2282446 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Ratliff, Bud, 1970-<br/><a href="https://learning.oreilly.com/library/view/~/0735621888">https://learning.oreilly.com/library/view/~/0735621888</a> <a href="https://learning.oreilly.com/library/view/~/0735621888/?ar">https://learning.oreilly.com/library/view/~/0735621888/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0735621888/?ar">https://go.oreilly.com/library-access/library/view/-/0735621888/?ar</a><br/>Format:&#160;Electronic Resources<br/> Nessus, Snort, &amp; Ethereal power tools customizing open source security applications ent://SD_ILS/0/SD_ILS:65787 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Archibald, Neil.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490207">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Aggressive network self-defense ent://SD_ILS/0/SD_ILS:65437 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Archibald, Neil.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Physical security for IT ent://SD_ILS/0/SD_ILS:65850 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Erbschloe, Michael, 1951-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583279">An electronic book accessible through the World Wide Web; click for information</a> Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip051/2004023167.html">http://www.loc.gov/catdir/toc/ecip051/2004023167.html</a> Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0617/2004023167-d.html">http://www.loc.gov/catdir/enhancements/fy0617/2004023167-d.html</a><br/>Format:&#160;Electronic Resources<br/> Business continuity and disaster recovery for infosec managers ent://SD_ILS/0/SD_ILS:65404 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583392">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Cisco Pix firewalls configure, manage, &amp; troubleshoot ent://SD_ILS/0/SD_ILS:65694 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Behrens, Thorsten.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490047">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Host integrity monitoring using Osiris and Samhain ent://SD_ILS/0/SD_ILS:65598 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Wotring, Brian.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490184">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Configuring Check Point NGX VPN-1/fire wall- ent://SD_ILS/0/SD_ILS:65662 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Stephens, Robert.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490313">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Intrusion prevention and active response deploying network and host IPS ent://SD_ILS/0/SD_ILS:65669 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Rash, Michael (Michael Brandon)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266474">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Network security a practical approach ent://SD_ILS/0/SD_ILS:65956 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Harrington, Jan L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123116338">An electronic book accessible through the World Wide Web; click for information</a> Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0623/2005040077-d.html">http://www.loc.gov/catdir/enhancements/fy0623/2005040077-d.html</a> Table of contents only <a href="http://www.loc.gov/catdir/enhancements/fy0623/2005040077-t.html">http://www.loc.gov/catdir/enhancements/fy0623/2005040077-t.html</a><br/>Format:&#160;Electronic Resources<br/> Intrusion Prevention and Active Response : Deploying Network and Host IPS. ent://SD_ILS/0/SD_ILS:1183111 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Rash, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=226578">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing IM and P2P Applications for the Enterprise. ent://SD_ILS/0/SD_ILS:1186059 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Sachs, Marcus.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254847">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Insider Threat : Protecting the Enterprise from Sabotage, Spying, and Theft. ent://SD_ILS/0/SD_ILS:1186061 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Cole, Eric.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254849">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Buffer Overflow Attacks : Detect, Exploit, Prevent. ent://SD_ILS/0/SD_ILS:1182500 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Deckard, Jason.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=222803">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Virtual Private Networking : A Construction, Operation and Utilization Guide. ent://SD_ILS/0/SD_ILS:1209924 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Held, Gilbert.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=470565">Click to View</a><br/>Format:&#160;Electronic Resources<br/> How to Cheat at Designing Security for a Windows Server 2003 Network. ent://SD_ILS/0/SD_ILS:1186044 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Ruston, Chris.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254832">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Nessus, Snort, &amp; Ethereal Power Tools : Customizing Open Source Security Applications. ent://SD_ILS/0/SD_ILS:1186051 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Caswell, Brian.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254839">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cisco PIX Firewalls : Configure / Manage / Troubleshoot. ent://SD_ILS/0/SD_ILS:1186047 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Browne, Brian.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254835">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Host Integrity Monitoring Using Osiris and Samhain : Using Osiris and Samhain. ent://SD_ILS/0/SD_ILS:1183953 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Wotring, Brian.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=233599">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network Security Evaluation Using the NSA IEM : Using the NSA IEM. ent://SD_ILS/0/SD_ILS:1186054 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Rogers, Russ.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254842">Click to View</a><br/>Format:&#160;Electronic Resources<br/> z/OS 1.6 Security Services Update. ent://SD_ILS/0/SD_ILS:1309844 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306453">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Distributed Security and High Availability with Tivoli Access Manager and WebSphere Application Server for z/OS. ent://SD_ILS/0/SD_ILS:1309993 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306602">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Secure Production Deployment of B2B Solutions using WebSphere Business Integration Connect. ent://SD_ILS/0/SD_ILS:1309847 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306456">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Identity and Access Management Solutions Using WebSphere Portal V5.1, Tivoli Identity Manager V4.5.1, and Tivoli Access Manager V5.1. ent://SD_ILS/0/SD_ILS:1309937 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306546">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IBM System z9 109 Technical Introduction. ent://SD_ILS/0/SD_ILS:1309973 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306582">Click to View</a><br/>Format:&#160;Electronic Resources<br/> z/OS Diagnostic Data : Collection and Analysis. ent://SD_ILS/0/SD_ILS:1310161 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306770">Click to View</a><br/>Format:&#160;Electronic Resources<br/> WebSphere Application Server for z/OS V5 and J2EE 1.3 Security Handbook. ent://SD_ILS/0/SD_ILS:1309773 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306382">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Silence on the wire a field guide to passive reconnaissance and indirect attacks ent://SD_ILS/0/SD_ILS:2047651 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=273504">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network security fundamentals ent://SD_ILS/0/SD_ILS:2281642 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Laet, Gert De.<br/><a href="https://learning.oreilly.com/library/view/~/1587051672">https://learning.oreilly.com/library/view/~/1587051672</a> <a href="https://go.oreilly.com/library-access/library/view/-/1587051672/?ar">https://go.oreilly.com/library-access/library/view/-/1587051672/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1587051672/?ar">https://learning.oreilly.com/library/view/~/1587051672/?ar</a><br/>Format:&#160;Electronic Resources<br/> The business case for network security : advocacy, governance, and ROI ent://SD_ILS/0/SD_ILS:2281646 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Paquet, Catherine.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1587201216/?ar">https://go.oreilly.com/library-access/library/view/-/1587201216/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1587201216/?ar">https://learning.oreilly.com/library/view/~/1587201216/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1587201216">https://learning.oreilly.com/library/view/~/1587201216</a><br/>Format:&#160;Electronic Resources<br/> Network security tools ent://SD_ILS/0/SD_ILS:2282158 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Clarke, Justin.<br/><a href="https://learning.oreilly.com/library/view/~/0596007949">https://learning.oreilly.com/library/view/~/0596007949</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596007949/?ar">https://go.oreilly.com/library-access/library/view/-/0596007949/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596007949/?ar">https://learning.oreilly.com/library/view/~/0596007949/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital identity ent://SD_ILS/0/SD_ILS:2293288 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Windley, Phillip J., 1958-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596008783/?ar">https://go.oreilly.com/library-access/library/view/-/0596008783/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596008783/?ar">https://learning.oreilly.com/library/view/~/0596008783/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596008783">https://learning.oreilly.com/library/view/~/0596008783</a><br/>Format:&#160;Electronic Resources<br/> Snort cookbook ent://SD_ILS/0/SD_ILS:2282585 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Orebaugh, Angela.<br/><a href="https://learning.oreilly.com/library/view/~/0596007914">https://learning.oreilly.com/library/view/~/0596007914</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596007914/?ar">https://go.oreilly.com/library-access/library/view/-/0596007914/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596007914/?ar">https://learning.oreilly.com/library/view/~/0596007914/?ar</a><br/>Format:&#160;Electronic Resources<br/> SSH, the secure shell : the definitive guide ent://SD_ILS/0/SD_ILS:2282587 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Barrett, Daniel J.<br/><a href="https://learning.oreilly.com/library/view/~/0596008953/?ar">https://learning.oreilly.com/library/view/~/0596008953/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596008953/?ar">https://go.oreilly.com/library-access/library/view/-/0596008953/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596008953">https://learning.oreilly.com/library/view/~/0596008953</a><br/>Format:&#160;Electronic Resources<br/> Inside network security assessment : guarding your IT infrastructure ent://SD_ILS/0/SD_ILS:2282083 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Gregg, Michael (Michael C.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/0672328097/?ar">https://go.oreilly.com/library-access/library/view/-/0672328097/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0672328097/?ar">https://learning.oreilly.com/library/view/~/0672328097/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0672328097">https://learning.oreilly.com/library/view/~/0672328097</a><br/>Format:&#160;Electronic Resources<br/> Phishing exposed ent://SD_ILS/0/SD_ILS:2281992 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;James, Lance.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490306/?ar">https://learning.oreilly.com/library/view/~/9781597490306/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597490306">https://learning.oreilly.com/library/view/~/9781597490306</a> <a href="https://www.sciencedirect.com/science/book/9781597490306">https://www.sciencedirect.com/science/book/9781597490306</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597490306/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490306/?ar</a><br/>Format:&#160;Electronic Resources<br/> The database hacker's handbook : defending database servers ent://SD_ILS/0/SD_ILS:2282264 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Litchfield, David, 1975-<br/><a href="https://learning.oreilly.com/library/view/~/9780764578014/?ar">https://learning.oreilly.com/library/view/~/9780764578014/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780764578014/?ar">https://go.oreilly.com/library-access/library/view/-/9780764578014/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780764578014">https://learning.oreilly.com/library/view/~/9780764578014</a><br/>Format:&#160;Electronic Resources<br/> Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses ent://SD_ILS/0/SD_ILS:2283103 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Skoudis, Ed.<br/><a href="https://learning.oreilly.com/library/view/~/9780131481046/?ar">https://learning.oreilly.com/library/view/~/9780131481046/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780131481046/?ar">https://go.oreilly.com/library-access/library/view/-/9780131481046/?ar</a><br/>Format:&#160;Electronic Resources<br/> Host integrity monitoring : using Osiris and Samhain ent://SD_ILS/0/SD_ILS:2282620 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Wotring, Brian.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490184">https://learning.oreilly.com/library/view/~/9781597490184</a> <a href="https://learning.oreilly.com/library/view/~/9781597490184/?ar">https://learning.oreilly.com/library/view/~/9781597490184/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597490184/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490184/?ar</a> <a href="https://www.sciencedirect.com/science/book/9781597490184">https://www.sciencedirect.com/science/book/9781597490184</a><br/>Format:&#160;Electronic Resources<br/> Silence on the wire : a field guide to passive reconnaissance and indirect attacks ent://SD_ILS/0/SD_ILS:2287377 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Zalewski, Michal, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1593270461/?ar">https://go.oreilly.com/library-access/library/view/-/1593270461/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1593270461/?ar">https://learning.oreilly.com/library/view/~/1593270461/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1593270461">https://learning.oreilly.com/library/view/~/1593270461</a><br/>Format:&#160;Electronic Resources<br/> WebSphere Application Server for z/OS V5 and J2EE 1.3 security handbook ent://SD_ILS/0/SD_ILS:2296187 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Allison, Steve.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738490679/?ar">https://go.oreilly.com/library-access/library/view/-/0738490679/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738490679/?ar">https://learning.oreilly.com/library/view/~/0738490679/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738490679">https://learning.oreilly.com/library/view/~/0738490679</a><br/>Format:&#160;Electronic Resources<br/> Cisco router firewall security ent://SD_ILS/0/SD_ILS:2281579 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Deal, Richard A.<br/><a href="https://learning.oreilly.com/library/view/~/1587051753">https://learning.oreilly.com/library/view/~/1587051753</a> <a href="https://learning.oreilly.com/library/view/~/1587051753/?ar">https://learning.oreilly.com/library/view/~/1587051753/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/1587051753/?ar">https://go.oreilly.com/library-access/library/view/-/1587051753/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cisco ASA and PIX firewall handbook ent://SD_ILS/0/SD_ILS:2282247 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Hucaby, Dave.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1587051583/?ar">https://go.oreilly.com/library-access/library/view/-/1587051583/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1587051583/?ar">https://learning.oreilly.com/library/view/~/1587051583/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1587051583">https://learning.oreilly.com/library/view/~/1587051583</a><br/>Format:&#160;Electronic Resources<br/> Windows Server 2003 security cookbook ent://SD_ILS/0/SD_ILS:2282098 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Danseglio, Mike.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596007531/?ar">https://go.oreilly.com/library-access/library/view/-/0596007531/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596007531/?ar">https://learning.oreilly.com/library/view/~/0596007531/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596007531">https://learning.oreilly.com/library/view/~/0596007531</a><br/>Format:&#160;Electronic Resources<br/> Inside network perimeter security ent://SD_ILS/0/SD_ILS:2283365 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Northcutt, Stephen.<br/><a href="https://learning.oreilly.com/library/view/~/0672327376">https://learning.oreilly.com/library/view/~/0672327376</a> <a href="https://learning.oreilly.com/library/view/~/0672327376/?ar">https://learning.oreilly.com/library/view/~/0672327376/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0672327376/?ar">https://go.oreilly.com/library-access/library/view/-/0672327376/?ar</a><br/>Format:&#160;Electronic Resources<br/> IBM system z9 109 technical introduction ent://SD_ILS/0/SD_ILS:2287791 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Ogden, Bill.<br/><a href="https://learning.oreilly.com/library/view/~/0738493813/?ar">https://learning.oreilly.com/library/view/~/0738493813/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738493813">https://learning.oreilly.com/library/view/~/0738493813</a> <a href="https://go.oreilly.com/library-access/library/view/-/0738493813/?ar">https://go.oreilly.com/library-access/library/view/-/0738493813/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft windows security resource kit ent://SD_ILS/0/SD_ILS:2282820 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Smith, Ben, 1975-<br/><a href="https://learning.oreilly.com/library/view/~/9780735621749">https://learning.oreilly.com/library/view/~/9780735621749</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780735621749/?ar">https://go.oreilly.com/library-access/library/view/-/9780735621749/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780735621749/?ar">https://learning.oreilly.com/library/view/~/9780735621749/?ar</a><br/>Format:&#160;Electronic Resources<br/> Nessus, Snort, &amp; Ethereal power tools : customizing open source security applications ent://SD_ILS/0/SD_ILS:2281994 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Archibald, Neil.<br/><a href="https://www.sciencedirect.com/science/book/9781597490207">https://www.sciencedirect.com/science/book/9781597490207</a> <a href="https://learning.oreilly.com/library/view/~/9781597490207">https://learning.oreilly.com/library/view/~/9781597490207</a> <a href="https://learning.oreilly.com/library/view/~/9781597490207/?ar">https://learning.oreilly.com/library/view/~/9781597490207/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597490207/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490207/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cisco Security Agent ent://SD_ILS/0/SD_ILS:2281812 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Sullivan, Chad.<br/><a href="https://learning.oreilly.com/library/view/~/1587052059">https://learning.oreilly.com/library/view/~/1587052059</a> <a href="https://learning.oreilly.com/library/view/~/1587052059/?ar">https://learning.oreilly.com/library/view/~/1587052059/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/1587052059/?ar">https://go.oreilly.com/library-access/library/view/-/1587052059/?ar</a><br/>Format:&#160;Electronic Resources<br/> MPLS VPN security ent://SD_ILS/0/SD_ILS:2281814 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Behringer, Michael H.<br/><a href="https://learning.oreilly.com/library/view/~/1587051834">https://learning.oreilly.com/library/view/~/1587051834</a> <a href="https://learning.oreilly.com/library/view/~/1587051834/?ar">https://learning.oreilly.com/library/view/~/1587051834/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/1587051834/?ar">https://go.oreilly.com/library-access/library/view/-/1587051834/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cisco network security troubleshooting handbook ent://SD_ILS/0/SD_ILS:2282339 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Hoda, Mynul.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1587051893/?ar">https://go.oreilly.com/library-access/library/view/-/1587051893/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1587051893">https://learning.oreilly.com/library/view/~/1587051893</a> <a href="https://learning.oreilly.com/library/view/~/1587051893/?ar">https://learning.oreilly.com/library/view/~/1587051893/?ar</a><br/>Format:&#160;Electronic Resources<br/> Configuring Check Point NGX VPN-1/FireWall-1 ent://SD_ILS/0/SD_ILS:2282000 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Stephens, Robert (Information security consultant)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597490313/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490313/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597490313/?ar">https://learning.oreilly.com/library/view/~/9781597490313/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597490313">https://learning.oreilly.com/library/view/~/9781597490313</a><br/>Format:&#160;Electronic Resources<br/> Business continuity and disaster recovery for infosec managers ent://SD_ILS/0/SD_ILS:2297051 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Rittinghouse, John W.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781555583392/?ar">https://go.oreilly.com/library-access/library/view/-/9781555583392/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781555583392/?ar">https://learning.oreilly.com/library/view/~/9781555583392/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network security : a practical approach ent://SD_ILS/0/SD_ILS:2296928 2024-06-18T08:22:35Z 2024-06-18T08:22:35Z by&#160;Harrington, Jan L.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780123116338/?ar">https://go.oreilly.com/library-access/library/view/-/9780123116338/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780123116338/?ar">https://learning.oreilly.com/library/view/~/9780123116338/?ar</a><br/>Format:&#160;Electronic Resources<br/>