Search Results for - Narrowed by: 2005 - Computer networks -- Security measures.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092005$0025092005$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300?2024-06-18T08:22:35ZMicrosoft Internet security and acceleration (ISA) server 2004 administrator's pocket consultantent://SD_ILS/0/SD_ILS:22824462024-06-18T08:22:35Z2024-06-18T08:22:35Zby Ratliff, Bud, 1970-<br/><a href="https://learning.oreilly.com/library/view/~/0735621888">https://learning.oreilly.com/library/view/~/0735621888</a>
<a href="https://learning.oreilly.com/library/view/~/0735621888/?ar">https://learning.oreilly.com/library/view/~/0735621888/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0735621888/?ar">https://go.oreilly.com/library-access/library/view/-/0735621888/?ar</a><br/>Format: Electronic Resources<br/>Nessus, Snort, & Ethereal power tools customizing open source security applicationsent://SD_ILS/0/SD_ILS:657872024-06-18T08:22:35Z2024-06-18T08:22:35Zby Archibald, Neil.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490207">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Aggressive network self-defenseent://SD_ILS/0/SD_ILS:654372024-06-18T08:22:35Z2024-06-18T08:22:35Zby Archibald, Neil.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Physical security for ITent://SD_ILS/0/SD_ILS:658502024-06-18T08:22:35Z2024-06-18T08:22:35Zby Erbschloe, Michael, 1951-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583279">An electronic book accessible through the World Wide Web; click for information</a>
Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip051/2004023167.html">http://www.loc.gov/catdir/toc/ecip051/2004023167.html</a>
Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0617/2004023167-d.html">http://www.loc.gov/catdir/enhancements/fy0617/2004023167-d.html</a><br/>Format: Electronic Resources<br/>Business continuity and disaster recovery for infosec managersent://SD_ILS/0/SD_ILS:654042024-06-18T08:22:35Z2024-06-18T08:22:35Zby Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583392">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Cisco Pix firewalls configure, manage, & troubleshootent://SD_ILS/0/SD_ILS:656942024-06-18T08:22:35Z2024-06-18T08:22:35Zby Behrens, Thorsten.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490047">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Host integrity monitoring using Osiris and Samhainent://SD_ILS/0/SD_ILS:655982024-06-18T08:22:35Z2024-06-18T08:22:35Zby Wotring, Brian.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490184">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Configuring Check Point NGX VPN-1/fire wall-ent://SD_ILS/0/SD_ILS:656622024-06-18T08:22:35Z2024-06-18T08:22:35Zby Stephens, Robert.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490313">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Intrusion prevention and active response deploying network and host IPSent://SD_ILS/0/SD_ILS:656692024-06-18T08:22:35Z2024-06-18T08:22:35Zby Rash, Michael (Michael Brandon)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266474">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Network security a practical approachent://SD_ILS/0/SD_ILS:659562024-06-18T08:22:35Z2024-06-18T08:22:35Zby Harrington, Jan L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123116338">An electronic book accessible through the World Wide Web; click for information</a>
Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0623/2005040077-d.html">http://www.loc.gov/catdir/enhancements/fy0623/2005040077-d.html</a>
Table of contents only <a href="http://www.loc.gov/catdir/enhancements/fy0623/2005040077-t.html">http://www.loc.gov/catdir/enhancements/fy0623/2005040077-t.html</a><br/>Format: Electronic Resources<br/>Intrusion Prevention and Active Response : Deploying Network and Host IPS.ent://SD_ILS/0/SD_ILS:11831112024-06-18T08:22:35Z2024-06-18T08:22:35Zby Rash, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=226578">Click to View</a><br/>Format: Electronic Resources<br/>Securing IM and P2P Applications for the Enterprise.ent://SD_ILS/0/SD_ILS:11860592024-06-18T08:22:35Z2024-06-18T08:22:35Zby Sachs, Marcus.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254847">Click to View</a><br/>Format: Electronic Resources<br/>Insider Threat : Protecting the Enterprise from Sabotage, Spying, and Theft.ent://SD_ILS/0/SD_ILS:11860612024-06-18T08:22:35Z2024-06-18T08:22:35Zby Cole, Eric.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254849">Click to View</a><br/>Format: Electronic Resources<br/>Buffer Overflow Attacks : Detect, Exploit, Prevent.ent://SD_ILS/0/SD_ILS:11825002024-06-18T08:22:35Z2024-06-18T08:22:35Zby Deckard, Jason.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=222803">Click to View</a><br/>Format: Electronic Resources<br/>Virtual Private Networking : A Construction, Operation and Utilization Guide.ent://SD_ILS/0/SD_ILS:12099242024-06-18T08:22:35Z2024-06-18T08:22:35Zby Held, Gilbert.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=470565">Click to View</a><br/>Format: Electronic Resources<br/>How to Cheat at Designing Security for a Windows Server 2003 Network.ent://SD_ILS/0/SD_ILS:11860442024-06-18T08:22:35Z2024-06-18T08:22:35Zby Ruston, Chris.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254832">Click to View</a><br/>Format: Electronic Resources<br/>Nessus, Snort, & Ethereal Power Tools : Customizing Open Source Security Applications.ent://SD_ILS/0/SD_ILS:11860512024-06-18T08:22:35Z2024-06-18T08:22:35Zby Caswell, Brian.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254839">Click to View</a><br/>Format: Electronic Resources<br/>Cisco PIX Firewalls : Configure / Manage / Troubleshoot.ent://SD_ILS/0/SD_ILS:11860472024-06-18T08:22:35Z2024-06-18T08:22:35Zby Browne, Brian.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254835">Click to View</a><br/>Format: Electronic Resources<br/>Host Integrity Monitoring Using Osiris and Samhain : Using Osiris and Samhain.ent://SD_ILS/0/SD_ILS:11839532024-06-18T08:22:35Z2024-06-18T08:22:35Zby Wotring, Brian.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=233599">Click to View</a><br/>Format: Electronic Resources<br/>Network Security Evaluation Using the NSA IEM : Using the NSA IEM.ent://SD_ILS/0/SD_ILS:11860542024-06-18T08:22:35Z2024-06-18T08:22:35Zby Rogers, Russ.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254842">Click to View</a><br/>Format: Electronic Resources<br/>z/OS 1.6 Security Services Update.ent://SD_ILS/0/SD_ILS:13098442024-06-18T08:22:35Z2024-06-18T08:22:35Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306453">Click to View</a><br/>Format: Electronic Resources<br/>Distributed Security and High Availability with Tivoli Access Manager and WebSphere Application Server for z/OS.ent://SD_ILS/0/SD_ILS:13099932024-06-18T08:22:35Z2024-06-18T08:22:35Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306602">Click to View</a><br/>Format: Electronic Resources<br/>Secure Production Deployment of B2B Solutions using WebSphere Business Integration Connect.ent://SD_ILS/0/SD_ILS:13098472024-06-18T08:22:35Z2024-06-18T08:22:35Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306456">Click to View</a><br/>Format: Electronic Resources<br/>Identity and Access Management Solutions Using WebSphere Portal V5.1, Tivoli Identity Manager V4.5.1, and Tivoli Access Manager V5.1.ent://SD_ILS/0/SD_ILS:13099372024-06-18T08:22:35Z2024-06-18T08:22:35Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306546">Click to View</a><br/>Format: Electronic Resources<br/>IBM System z9 109 Technical Introduction.ent://SD_ILS/0/SD_ILS:13099732024-06-18T08:22:35Z2024-06-18T08:22:35Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306582">Click to View</a><br/>Format: Electronic Resources<br/>z/OS Diagnostic Data : Collection and Analysis.ent://SD_ILS/0/SD_ILS:13101612024-06-18T08:22:35Z2024-06-18T08:22:35Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306770">Click to View</a><br/>Format: Electronic Resources<br/>WebSphere Application Server for z/OS V5 and J2EE 1.3 Security Handbook.ent://SD_ILS/0/SD_ILS:13097732024-06-18T08:22:35Z2024-06-18T08:22:35Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306382">Click to View</a><br/>Format: Electronic Resources<br/>Silence on the wire a field guide to passive reconnaissance and indirect attacksent://SD_ILS/0/SD_ILS:20476512024-06-18T08:22:35Z2024-06-18T08:22:35Zby Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=273504">Click to View</a><br/>Format: Electronic Resources<br/>Network security fundamentalsent://SD_ILS/0/SD_ILS:22816422024-06-18T08:22:35Z2024-06-18T08:22:35Zby Laet, Gert De.<br/><a href="https://learning.oreilly.com/library/view/~/1587051672">https://learning.oreilly.com/library/view/~/1587051672</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1587051672/?ar">https://go.oreilly.com/library-access/library/view/-/1587051672/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587051672/?ar">https://learning.oreilly.com/library/view/~/1587051672/?ar</a><br/>Format: Electronic Resources<br/>The business case for network security : advocacy, governance, and ROIent://SD_ILS/0/SD_ILS:22816462024-06-18T08:22:35Z2024-06-18T08:22:35Zby Paquet, Catherine.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1587201216/?ar">https://go.oreilly.com/library-access/library/view/-/1587201216/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587201216/?ar">https://learning.oreilly.com/library/view/~/1587201216/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587201216">https://learning.oreilly.com/library/view/~/1587201216</a><br/>Format: Electronic Resources<br/>Network security toolsent://SD_ILS/0/SD_ILS:22821582024-06-18T08:22:35Z2024-06-18T08:22:35Zby Clarke, Justin.<br/><a href="https://learning.oreilly.com/library/view/~/0596007949">https://learning.oreilly.com/library/view/~/0596007949</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596007949/?ar">https://go.oreilly.com/library-access/library/view/-/0596007949/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596007949/?ar">https://learning.oreilly.com/library/view/~/0596007949/?ar</a><br/>Format: Electronic Resources<br/>Digital identityent://SD_ILS/0/SD_ILS:22932882024-06-18T08:22:35Z2024-06-18T08:22:35Zby Windley, Phillip J., 1958-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596008783/?ar">https://go.oreilly.com/library-access/library/view/-/0596008783/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008783/?ar">https://learning.oreilly.com/library/view/~/0596008783/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008783">https://learning.oreilly.com/library/view/~/0596008783</a><br/>Format: Electronic Resources<br/>Snort cookbookent://SD_ILS/0/SD_ILS:22825852024-06-18T08:22:35Z2024-06-18T08:22:35Zby Orebaugh, Angela.<br/><a href="https://learning.oreilly.com/library/view/~/0596007914">https://learning.oreilly.com/library/view/~/0596007914</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596007914/?ar">https://go.oreilly.com/library-access/library/view/-/0596007914/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596007914/?ar">https://learning.oreilly.com/library/view/~/0596007914/?ar</a><br/>Format: Electronic Resources<br/>SSH, the secure shell : the definitive guideent://SD_ILS/0/SD_ILS:22825872024-06-18T08:22:35Z2024-06-18T08:22:35Zby Barrett, Daniel J.<br/><a href="https://learning.oreilly.com/library/view/~/0596008953/?ar">https://learning.oreilly.com/library/view/~/0596008953/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596008953/?ar">https://go.oreilly.com/library-access/library/view/-/0596008953/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008953">https://learning.oreilly.com/library/view/~/0596008953</a><br/>Format: Electronic Resources<br/>Inside network security assessment : guarding your IT infrastructureent://SD_ILS/0/SD_ILS:22820832024-06-18T08:22:35Z2024-06-18T08:22:35Zby Gregg, Michael (Michael C.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/0672328097/?ar">https://go.oreilly.com/library-access/library/view/-/0672328097/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672328097/?ar">https://learning.oreilly.com/library/view/~/0672328097/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672328097">https://learning.oreilly.com/library/view/~/0672328097</a><br/>Format: Electronic Resources<br/>Phishing exposedent://SD_ILS/0/SD_ILS:22819922024-06-18T08:22:35Z2024-06-18T08:22:35Zby James, Lance.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490306/?ar">https://learning.oreilly.com/library/view/~/9781597490306/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490306">https://learning.oreilly.com/library/view/~/9781597490306</a>
<a href="https://www.sciencedirect.com/science/book/9781597490306">https://www.sciencedirect.com/science/book/9781597490306</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490306/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490306/?ar</a><br/>Format: Electronic Resources<br/>The database hacker's handbook : defending database serversent://SD_ILS/0/SD_ILS:22822642024-06-18T08:22:35Z2024-06-18T08:22:35Zby Litchfield, David, 1975-<br/><a href="https://learning.oreilly.com/library/view/~/9780764578014/?ar">https://learning.oreilly.com/library/view/~/9780764578014/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780764578014/?ar">https://go.oreilly.com/library-access/library/view/-/9780764578014/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780764578014">https://learning.oreilly.com/library/view/~/9780764578014</a><br/>Format: Electronic Resources<br/>Counter hack reloaded : a step-by-step guide to computer attacks and effective defensesent://SD_ILS/0/SD_ILS:22831032024-06-18T08:22:35Z2024-06-18T08:22:35Zby Skoudis, Ed.<br/><a href="https://learning.oreilly.com/library/view/~/9780131481046/?ar">https://learning.oreilly.com/library/view/~/9780131481046/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780131481046/?ar">https://go.oreilly.com/library-access/library/view/-/9780131481046/?ar</a><br/>Format: Electronic Resources<br/>Host integrity monitoring : using Osiris and Samhainent://SD_ILS/0/SD_ILS:22826202024-06-18T08:22:35Z2024-06-18T08:22:35Zby Wotring, Brian.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490184">https://learning.oreilly.com/library/view/~/9781597490184</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490184/?ar">https://learning.oreilly.com/library/view/~/9781597490184/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490184/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490184/?ar</a>
<a href="https://www.sciencedirect.com/science/book/9781597490184">https://www.sciencedirect.com/science/book/9781597490184</a><br/>Format: Electronic Resources<br/>Silence on the wire : a field guide to passive reconnaissance and indirect attacksent://SD_ILS/0/SD_ILS:22873772024-06-18T08:22:35Z2024-06-18T08:22:35Zby Zalewski, Michal, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1593270461/?ar">https://go.oreilly.com/library-access/library/view/-/1593270461/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1593270461/?ar">https://learning.oreilly.com/library/view/~/1593270461/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1593270461">https://learning.oreilly.com/library/view/~/1593270461</a><br/>Format: Electronic Resources<br/>WebSphere Application Server for z/OS V5 and J2EE 1.3 security handbookent://SD_ILS/0/SD_ILS:22961872024-06-18T08:22:35Z2024-06-18T08:22:35Zby Allison, Steve.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738490679/?ar">https://go.oreilly.com/library-access/library/view/-/0738490679/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738490679/?ar">https://learning.oreilly.com/library/view/~/0738490679/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738490679">https://learning.oreilly.com/library/view/~/0738490679</a><br/>Format: Electronic Resources<br/>Cisco router firewall securityent://SD_ILS/0/SD_ILS:22815792024-06-18T08:22:35Z2024-06-18T08:22:35Zby Deal, Richard A.<br/><a href="https://learning.oreilly.com/library/view/~/1587051753">https://learning.oreilly.com/library/view/~/1587051753</a>
<a href="https://learning.oreilly.com/library/view/~/1587051753/?ar">https://learning.oreilly.com/library/view/~/1587051753/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1587051753/?ar">https://go.oreilly.com/library-access/library/view/-/1587051753/?ar</a><br/>Format: Electronic Resources<br/>Cisco ASA and PIX firewall handbookent://SD_ILS/0/SD_ILS:22822472024-06-18T08:22:35Z2024-06-18T08:22:35Zby Hucaby, Dave.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1587051583/?ar">https://go.oreilly.com/library-access/library/view/-/1587051583/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587051583/?ar">https://learning.oreilly.com/library/view/~/1587051583/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587051583">https://learning.oreilly.com/library/view/~/1587051583</a><br/>Format: Electronic Resources<br/>Windows Server 2003 security cookbookent://SD_ILS/0/SD_ILS:22820982024-06-18T08:22:35Z2024-06-18T08:22:35Zby Danseglio, Mike.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596007531/?ar">https://go.oreilly.com/library-access/library/view/-/0596007531/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596007531/?ar">https://learning.oreilly.com/library/view/~/0596007531/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596007531">https://learning.oreilly.com/library/view/~/0596007531</a><br/>Format: Electronic Resources<br/>Inside network perimeter securityent://SD_ILS/0/SD_ILS:22833652024-06-18T08:22:35Z2024-06-18T08:22:35Zby Northcutt, Stephen.<br/><a href="https://learning.oreilly.com/library/view/~/0672327376">https://learning.oreilly.com/library/view/~/0672327376</a>
<a href="https://learning.oreilly.com/library/view/~/0672327376/?ar">https://learning.oreilly.com/library/view/~/0672327376/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0672327376/?ar">https://go.oreilly.com/library-access/library/view/-/0672327376/?ar</a><br/>Format: Electronic Resources<br/>IBM system z9 109 technical introductionent://SD_ILS/0/SD_ILS:22877912024-06-18T08:22:35Z2024-06-18T08:22:35Zby Ogden, Bill.<br/><a href="https://learning.oreilly.com/library/view/~/0738493813/?ar">https://learning.oreilly.com/library/view/~/0738493813/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738493813">https://learning.oreilly.com/library/view/~/0738493813</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738493813/?ar">https://go.oreilly.com/library-access/library/view/-/0738493813/?ar</a><br/>Format: Electronic Resources<br/>Microsoft windows security resource kitent://SD_ILS/0/SD_ILS:22828202024-06-18T08:22:35Z2024-06-18T08:22:35Zby Smith, Ben, 1975-<br/><a href="https://learning.oreilly.com/library/view/~/9780735621749">https://learning.oreilly.com/library/view/~/9780735621749</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780735621749/?ar">https://go.oreilly.com/library-access/library/view/-/9780735621749/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780735621749/?ar">https://learning.oreilly.com/library/view/~/9780735621749/?ar</a><br/>Format: Electronic Resources<br/>Nessus, Snort, & Ethereal power tools : customizing open source security applicationsent://SD_ILS/0/SD_ILS:22819942024-06-18T08:22:35Z2024-06-18T08:22:35Zby Archibald, Neil.<br/><a href="https://www.sciencedirect.com/science/book/9781597490207">https://www.sciencedirect.com/science/book/9781597490207</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490207">https://learning.oreilly.com/library/view/~/9781597490207</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490207/?ar">https://learning.oreilly.com/library/view/~/9781597490207/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490207/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490207/?ar</a><br/>Format: Electronic Resources<br/>Cisco Security Agentent://SD_ILS/0/SD_ILS:22818122024-06-18T08:22:35Z2024-06-18T08:22:35Zby Sullivan, Chad.<br/><a href="https://learning.oreilly.com/library/view/~/1587052059">https://learning.oreilly.com/library/view/~/1587052059</a>
<a href="https://learning.oreilly.com/library/view/~/1587052059/?ar">https://learning.oreilly.com/library/view/~/1587052059/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1587052059/?ar">https://go.oreilly.com/library-access/library/view/-/1587052059/?ar</a><br/>Format: Electronic Resources<br/>MPLS VPN securityent://SD_ILS/0/SD_ILS:22818142024-06-18T08:22:35Z2024-06-18T08:22:35Zby Behringer, Michael H.<br/><a href="https://learning.oreilly.com/library/view/~/1587051834">https://learning.oreilly.com/library/view/~/1587051834</a>
<a href="https://learning.oreilly.com/library/view/~/1587051834/?ar">https://learning.oreilly.com/library/view/~/1587051834/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1587051834/?ar">https://go.oreilly.com/library-access/library/view/-/1587051834/?ar</a><br/>Format: Electronic Resources<br/>Cisco network security troubleshooting handbookent://SD_ILS/0/SD_ILS:22823392024-06-18T08:22:35Z2024-06-18T08:22:35Zby Hoda, Mynul.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1587051893/?ar">https://go.oreilly.com/library-access/library/view/-/1587051893/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587051893">https://learning.oreilly.com/library/view/~/1587051893</a>
<a href="https://learning.oreilly.com/library/view/~/1587051893/?ar">https://learning.oreilly.com/library/view/~/1587051893/?ar</a><br/>Format: Electronic Resources<br/>Configuring Check Point NGX VPN-1/FireWall-1ent://SD_ILS/0/SD_ILS:22820002024-06-18T08:22:35Z2024-06-18T08:22:35Zby Stephens, Robert (Information security consultant)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597490313/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490313/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490313/?ar">https://learning.oreilly.com/library/view/~/9781597490313/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490313">https://learning.oreilly.com/library/view/~/9781597490313</a><br/>Format: Electronic Resources<br/>Business continuity and disaster recovery for infosec managersent://SD_ILS/0/SD_ILS:22970512024-06-18T08:22:35Z2024-06-18T08:22:35Zby Rittinghouse, John W.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781555583392/?ar">https://go.oreilly.com/library-access/library/view/-/9781555583392/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781555583392/?ar">https://learning.oreilly.com/library/view/~/9781555583392/?ar</a><br/>Format: Electronic Resources<br/>Network security : a practical approachent://SD_ILS/0/SD_ILS:22969282024-06-18T08:22:35Z2024-06-18T08:22:35Zby Harrington, Jan L.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780123116338/?ar">https://go.oreilly.com/library-access/library/view/-/9780123116338/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780123116338/?ar">https://learning.oreilly.com/library/view/~/9780123116338/?ar</a><br/>Format: Electronic Resources<br/>