Search Results for - Narrowed by: 2007 - Computer networks -- Security measures.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092007$0025092007$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300$0026isd$003dtrue?2024-09-24T16:51:07ZHow to cheat at VoIP securityent://SD_ILS/0/SD_ILS:23040972024-09-24T16:51:07Z2024-09-24T16:51:07Zby Porter, Thomas.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491693/?ar">https://learning.oreilly.com/library/view/~/9781597491693/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491693/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491693/?ar</a><br/>Format: Electronic Resources<br/>Configuring Juniper Networks NetScreen & SSG firewallsent://SD_ILS/0/SD_ILS:641752024-09-24T16:51:07Z2024-09-24T16:51:07Zby Cameron, Rob.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491181">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>How to cheat at configuring Open Source security toolsent://SD_ILS/0/SD_ILS:641782024-09-24T16:51:07Z2024-09-24T16:51:07Zby Alder, Raven.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491709">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Snort IDS and IPS toolkitent://SD_ILS/0/SD_ILS:641632024-09-24T16:51:07Z2024-09-24T16:51:07Zby Beale, Jay<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490993">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Integrated security systems design concepts, specifications, and implementationent://SD_ILS/0/SD_ILS:642942024-09-24T16:51:07Z2024-09-24T16:51:07Zby Norman, Thomas, CSC.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679091">An electronic book accessible through the World Wide Web; click for information</a>
Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip074/2006038020.html">http://www.loc.gov/catdir/toc/ecip074/2006038020.html</a>
Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0703/2006038020-d.html">http://www.loc.gov/catdir/enhancements/fy0703/2006038020-d.html</a><br/>Format: Electronic Resources<br/>Techno security's guide to e-discovery and digital forensicsent://SD_ILS/0/SD_ILS:3432012024-09-24T16:51:07Z2024-09-24T16:51:07Zby Wiles, Jack.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=239209">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=239209</a><br/>Format: Electronic Resources<br/>Botnets the killer web appent://SD_ILS/0/SD_ILS:3401602024-09-24T16:51:07Z2024-09-24T16:51:07Zby Schiller, Craig A.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=184406">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=184406</a><br/>Format: Electronic Resources<br/>Network security assessment from vulnerability to patchent://SD_ILS/0/SD_ILS:642842024-09-24T16:51:07Z2024-09-24T16:51:07Zby Manzuik, Steve.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491013">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Asterisk hackingent://SD_ILS/0/SD_ILS:642372024-09-24T16:51:07Z2024-09-24T16:51:07Zby Brashars, Joshua.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491518">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>PCI compliance implementing effective PCI data security standardsent://SD_ILS/0/SD_ILS:643262024-09-24T16:51:07Z2024-09-24T16:51:07Zby Bradley, Tony, 1969-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491655">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Developer's guide to web application securityent://SD_ILS/0/SD_ILS:642382024-09-24T16:51:07Z2024-09-24T16:51:07Zby Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Techno Security's guide to managing risks for IT managers, auditors, and investigatorsent://SD_ILS/0/SD_ILS:642592024-09-24T16:51:07Z2024-09-24T16:51:07Zby Wiles, Jack.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>How to cheat at Voip securityent://SD_ILS/0/SD_ILS:642262024-09-24T16:51:07Z2024-09-24T16:51:07Zby Porter, Thomas, PhD.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491693">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Botnets the killer web appent://SD_ILS/0/SD_ILS:642572024-09-24T16:51:07Z2024-09-24T16:51:07Zby Schiller, Craig A.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491358">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Security Data Visualization : Graphical Techniques for Network Analysis.ent://SD_ILS/0/SD_ILS:12916132024-09-24T16:51:07Z2024-09-24T16:51:07Zby Conti, Greg.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3017625">Click to View</a><br/>Format: Electronic Resources<br/>Misuse of Information Systems : The Impact of Security Countermeasures.ent://SD_ILS/0/SD_ILS:12911772024-09-24T16:51:07Z2024-09-24T16:51:07Zby D'Arcy, John P.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3016826">Click to View</a><br/>Format: Electronic Resources<br/>Toward a Safer and More Secure Cyberspace.ent://SD_ILS/0/SD_ILS:13201382024-09-24T16:51:07Z2024-09-24T16:51:07Zby Committee on Improving Cybersecurity Research in the United States, National Research Council.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3378311">Click to View</a><br/>Format: Electronic Resources<br/>Windows Forensic Analysis DVD Toolkit.ent://SD_ILS/0/SD_ILS:11965182024-09-24T16:51:07Z2024-09-24T16:51:07Zby Carvey, Harlan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=328624">Click to View</a><br/>Format: Electronic Resources<br/>Security in Distributed and Networking Systems.ent://SD_ILS/0/SD_ILS:12583272024-09-24T16:51:07Z2024-09-24T16:51:07Zby Xiao, Yang.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1193126">Click to View</a><br/>Format: Electronic Resources<br/>Fuzzing : brute force vulnerabilty discoveryent://SD_ILS/0/SD_ILS:22834512024-09-24T16:51:07Z2024-09-24T16:51:07Zby Sutton, Michael, 1973-<br/><a href="https://learning.oreilly.com/library/view/~/9780321446114">https://learning.oreilly.com/library/view/~/9780321446114</a>
<a href="https://learning.oreilly.com/library/view/~/9780321446114/?ar">https://learning.oreilly.com/library/view/~/9780321446114/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321446114/?ar">https://go.oreilly.com/library-access/library/view/-/9780321446114/?ar</a><br/>Format: Electronic Resources<br/>Elsevier's dictionary of information security in English, German, French and Russianent://SD_ILS/0/SD_ILS:22834762024-09-24T16:51:07Z2024-09-24T16:51:07Zby Manoilov, G.<br/><a href="https://learning.oreilly.com/library/view/~/9780080488806">https://learning.oreilly.com/library/view/~/9780080488806</a>
<a href="https://learning.oreilly.com/library/view/~/9780080488806/?ar">https://learning.oreilly.com/library/view/~/9780080488806/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780080488806/?ar">https://go.oreilly.com/library-access/library/view/-/9780080488806/?ar</a><br/>Format: Electronic Resources<br/>Cisco NAC appliance : enforcing host security with clean accessent://SD_ILS/0/SD_ILS:22838012024-09-24T16:51:07Z2024-09-24T16:51:07Zby Heary, Jamey.<br/><a href="https://learning.oreilly.com/library/view/~/9781587053061">https://learning.oreilly.com/library/view/~/9781587053061</a>
<a href="https://learning.oreilly.com/library/view/~/9781587053061/?ar">https://learning.oreilly.com/library/view/~/9781587053061/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781587053061/?ar">https://go.oreilly.com/library-access/library/view/-/9781587053061/?ar</a><br/>Format: Electronic Resources<br/>Business continuity & disaster recovery for IT professionalsent://SD_ILS/0/SD_ILS:22839972024-09-24T16:51:07Z2024-09-24T16:51:07Zby Snedaker, Susan.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491723/?ar">https://learning.oreilly.com/library/view/~/9781597491723/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491723/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491723/?ar</a><br/>Format: Electronic Resources<br/>Cisco ASA, PIX, and FWSM firewall handbookent://SD_ILS/0/SD_ILS:22838082024-09-24T16:51:07Z2024-09-24T16:51:07Zby Hucaby, Dave.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781587054570/?ar">https://go.oreilly.com/library-access/library/view/-/9781587054570/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781587054570/?ar">https://learning.oreilly.com/library/view/~/9781587054570/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781587054570">https://learning.oreilly.com/library/view/~/9781587054570</a><br/>Format: Electronic Resources<br/>Security power toolsent://SD_ILS/0/SD_ILS:22839512024-09-24T16:51:07Z2024-09-24T16:51:07Zby Burns, Bryan.<br/><a href="https://learning.oreilly.com/library/view/~/9780596009632">https://learning.oreilly.com/library/view/~/9780596009632</a>
<a href="https://learning.oreilly.com/library/view/~/9780596009632/?ar">https://learning.oreilly.com/library/view/~/9780596009632/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780596009632/?ar">https://go.oreilly.com/library-access/library/view/-/9780596009632/?ar</a><br/>Format: Electronic Resources<br/>Cisco firewall technologyent://SD_ILS/0/SD_ILS:22828432024-09-24T16:51:07Z2024-09-24T16:51:07Zby Mason, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9781587053290/?ar">https://learning.oreilly.com/library/view/~/9781587053290/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781587053290">https://learning.oreilly.com/library/view/~/9781587053290</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781587053290/?ar">https://go.oreilly.com/library-access/library/view/-/9781587053290/?ar</a><br/>Format: Electronic Resources<br/>Security monitoring with Cisco security MARSent://SD_ILS/0/SD_ILS:22837842024-09-24T16:51:07Z2024-09-24T16:51:07Zby Halleen, Gary.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781587052705/?ar">https://go.oreilly.com/library-access/library/view/-/9781587052705/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781587052705/?ar">https://learning.oreilly.com/library/view/~/9781587052705/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781587052705">https://learning.oreilly.com/library/view/~/9781587052705</a><br/>Format: Electronic Resources<br/>PCI compliance : implementing effective PCI data security standardsent://SD_ILS/0/SD_ILS:22856572024-09-24T16:51:07Z2024-09-24T16:51:07Zby Bradley, Tony, 1969-<br/><a href="https://learning.oreilly.com/library/view/~/9781597491655">https://learning.oreilly.com/library/view/~/9781597491655</a>
<a href="https://www.sciencedirect.com/science/book/9781597491655">https://www.sciencedirect.com/science/book/9781597491655</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491655/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491655/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491655/?ar">https://learning.oreilly.com/library/view/~/9781597491655/?ar</a><br/>Format: Electronic Resources<br/>How to cheat at securing your networkent://SD_ILS/0/SD_ILS:22846302024-09-24T16:51:07Z2024-09-24T16:51:07Zby Dubrawsky, Ido.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492317/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492317/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492317/?ar">https://learning.oreilly.com/library/view/~/9781597492317/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492317">https://learning.oreilly.com/library/view/~/9781597492317</a><br/>Format: Electronic Resources<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:22876822024-09-24T16:51:07Z2024-09-24T16:51:07Zby Bayles, Aaron W.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492133/?ar">https://learning.oreilly.com/library/view/~/9781597492133/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492133/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492133/?ar</a><br/>Format: Electronic Resources<br/>Integrated Security Systems Design : Concepts, Specifications, and Implementation.ent://SD_ILS/0/SD_ILS:22869582024-09-24T16:51:07Z2024-09-24T16:51:07Zby Norman, Thomas L.<br/><a href="https://learning.oreilly.com/library/view/~/9780750679091/?ar">https://learning.oreilly.com/library/view/~/9780750679091/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780750679091/?ar">https://go.oreilly.com/library-access/library/view/-/9780750679091/?ar</a><br/>Format: Electronic Resources<br/>Exploiting online games : cheating massively distributed systemsent://SD_ILS/0/SD_ILS:22839332024-09-24T16:51:07Z2024-09-24T16:51:07Zby Hoglund, Greg.<br/><a href="https://learning.oreilly.com/library/view/~/9780132271912/?ar">https://learning.oreilly.com/library/view/~/9780132271912/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780132271912/?ar">https://go.oreilly.com/library-access/library/view/-/9780132271912/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132271912">https://learning.oreilly.com/library/view/~/9780132271912</a><br/>Format: Electronic Resources<br/>Botnets : the killer web appent://SD_ILS/0/SD_ILS:22835652024-09-24T16:51:07Z2024-09-24T16:51:07Zby Schiller, Craig A.<br/><a href="https://www.sciencedirect.com/science/book/9781597491358">https://www.sciencedirect.com/science/book/9781597491358</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491358/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491358/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491358/?ar">https://learning.oreilly.com/library/view/~/9781597491358/?ar</a><br/>Format: Electronic Resources<br/>Techno security's guide to e-discovery and digital forensicsent://SD_ILS/0/SD_ILS:22845142024-09-24T16:51:07Z2024-09-24T16:51:07Zby Wiles, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492232">https://learning.oreilly.com/library/view/~/9781597492232</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492232/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492232/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492232/?ar">https://learning.oreilly.com/library/view/~/9781597492232/?ar</a><br/>Format: Electronic Resources<br/>Network security assessment : from vulnerability to patchent://SD_ILS/0/SD_ILS:22862422024-09-24T16:51:07Z2024-09-24T16:51:07Zby Manzuik, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491013/?ar">https://learning.oreilly.com/library/view/~/9781597491013/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491013/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491013/?ar</a><br/>Format: Electronic Resources<br/>Network security assessmentent://SD_ILS/0/SD_ILS:22839252024-09-24T16:51:07Z2024-09-24T16:51:07Zby McNab, Chris (Chris R.), 1980-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780596510305/?ar">https://go.oreilly.com/library-access/library/view/-/9780596510305/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596510305/?ar">https://learning.oreilly.com/library/view/~/9780596510305/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596510305">https://learning.oreilly.com/library/view/~/9780596510305</a><br/>Format: Electronic Resources<br/>AVIEN malware defense guide for the Enterpriseent://SD_ILS/0/SD_ILS:22845102024-09-24T16:51:07Z2024-09-24T16:51:07Zby Harley, David.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491648">https://learning.oreilly.com/library/view/~/9781597491648</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491648/?ar">https://learning.oreilly.com/library/view/~/9781597491648/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491648/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491648/?ar</a><br/>Format: Electronic Resources<br/>End-to-end network security : defense-in-depthent://SD_ILS/0/SD_ILS:22840522024-09-24T16:51:07Z2024-09-24T16:51:07Zby Santos, Omar.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781587053320/?ar">https://go.oreilly.com/library-access/library/view/-/9781587053320/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781587053320/?ar">https://learning.oreilly.com/library/view/~/9781587053320/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781587053320">https://learning.oreilly.com/library/view/~/9781587053320</a><br/>Format: Electronic Resources<br/>Configuring Juniper Networks NetScreen & SSG firewallsent://SD_ILS/0/SD_ILS:22861842024-09-24T16:51:07Z2024-09-24T16:51:07Zby Cameron, Rob.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597491181/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491181/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491181/?ar">https://learning.oreilly.com/library/view/~/9781597491181/?ar</a><br/>Format: Electronic Resources<br/>Hacking for dummiesent://SD_ILS/0/SD_ILS:22824902024-09-24T16:51:07Z2024-09-24T16:51:07Zby Beaver, Kevin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470052358/?ar">https://go.oreilly.com/library-access/library/view/-/9780470052358/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470052358/?ar">https://learning.oreilly.com/library/view/~/9780470052358/?ar</a><br/>Format: Electronic Resources<br/>Developer's guide to web application securityent://SD_ILS/0/SD_ILS:22828732024-09-24T16:51:07Z2024-09-24T16:51:07Zby Cross, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9781597490610">https://learning.oreilly.com/library/view/~/9781597490610</a>
<a href="https://www.sciencedirect.com/science/book/9781597490610">https://www.sciencedirect.com/science/book/9781597490610</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490610/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490610/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490610/?ar">https://learning.oreilly.com/library/view/~/9781597490610/?ar</a><br/>Format: Electronic Resources<br/>Endpoint securityent://SD_ILS/0/SD_ILS:22831172024-09-24T16:51:07Z2024-09-24T16:51:07Zby Kadrich, Mark.<br/><a href="https://learning.oreilly.com/library/view/~/9780321436955/?ar">https://learning.oreilly.com/library/view/~/9780321436955/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321436955/?ar">https://go.oreilly.com/library-access/library/view/-/9780321436955/?ar</a><br/>Format: Electronic Resources<br/>Web services security and e-businessent://SD_ILS/0/SD_ILS:22620452024-09-24T16:51:07Z2024-09-24T16:51:07Zby Radhamani, G., 1968-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-168-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-168-1</a><br/>Format: Electronic Resources<br/>Snort : IDS and IPS toolkitent://SD_ILS/0/SD_ILS:22891302024-09-24T16:51:07Z2024-09-24T16:51:07Zby Beale, Jay.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597490993/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490993/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490993/?ar">https://learning.oreilly.com/library/view/~/9781597490993/?ar</a>
<a href="https://www.sciencedirect.com/science/book/9781597490993">https://www.sciencedirect.com/science/book/9781597490993</a><br/>Format: Electronic Resources<br/>