Search Results for - Narrowed by: 2009 - COMPUTERS -- Networking -- Security. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092009$0025092009$0026qf$003dSUBJECT$002509Subject$002509COMPUTERS$002b--$002bNetworking$002b--$002bSecurity.$002509COMPUTERS$002b--$002bNetworking$002b--$002bSecurity.$0026ps$003d300$0026isd$003dtrue? 2024-09-23T22:18:33Z The myths of security : what the computer security industry doesn't want you to know ent://SD_ILS/0/SD_ILS:2106561 2024-09-23T22:18:33Z 2024-09-23T22:18:33Z by&#160;Viega, John.<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=414821">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=414821</a><br/>Format:&#160;Electronic Resources<br/> Virtualization for security : including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting ent://SD_ILS/0/SD_ILS:2286530 2024-09-23T22:18:33Z 2024-09-23T22:18:33Z by&#160;Hoopes, John.<br/><a href="https://learning.oreilly.com/library/view/~/9781597493055">https://learning.oreilly.com/library/view/~/9781597493055</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597493055/?ar">https://go.oreilly.com/library-access/library/view/-/9781597493055/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597493055/?ar">https://learning.oreilly.com/library/view/~/9781597493055/?ar</a><br/>Format:&#160;Electronic Resources<br/> How to secure and audit Oracle 10g and 11g ent://SD_ILS/0/SD_ILS:2286324 2024-09-23T22:18:33Z 2024-09-23T22:18:33Z by&#160;Ben-Natan, Ron.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781420084139/?ar">https://go.oreilly.com/library-access/library/view/-/9781420084139/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781420084139/?ar">https://learning.oreilly.com/library/view/~/9781420084139/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781420084139">https://learning.oreilly.com/library/view/~/9781420084139</a><br/>Format:&#160;Electronic Resources<br/> GFI network security and PCI compliance power tools ent://SD_ILS/0/SD_ILS:2286159 2024-09-23T22:18:33Z 2024-09-23T22:18:33Z by&#160;Posey, Brien.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492850/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492850/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492850/?ar">https://learning.oreilly.com/library/view/~/9781597492850/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security in a Web 2.0+ world : a standards based approach ent://SD_ILS/0/SD_ILS:2288464 2024-09-23T22:18:33Z 2024-09-23T22:18:33Z by&#160;Solari, C. (Carlos)<br/><a href="https://learning.oreilly.com/library/view/~/9780470745755/?ar">https://learning.oreilly.com/library/view/~/9780470745755/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470745755">https://learning.oreilly.com/library/view/~/9780470745755</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470745755/?ar">https://go.oreilly.com/library-access/library/view/-/9780470745755/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cisco router and switch forensics : investigating and analyzing malicious network activity ent://SD_ILS/0/SD_ILS:2287180 2024-09-23T22:18:33Z 2024-09-23T22:18:33Z by&#160;Liu, Dale.<br/><a href="https://learning.oreilly.com/library/view/~/9781597494182">https://learning.oreilly.com/library/view/~/9781597494182</a> <a href="https://learning.oreilly.com/library/view/~/9781597494182/?ar">https://learning.oreilly.com/library/view/~/9781597494182/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597494182/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494182/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mac OS X, iPod, and iPhone forensic analysis DVD toolkit ent://SD_ILS/0/SD_ILS:2287201 2024-09-23T22:18:33Z 2024-09-23T22:18:33Z by&#160;Kubasiak, Ryan R.<br/><a href="https://learning.oreilly.com/library/view/~/9780080949185/?ar">https://learning.oreilly.com/library/view/~/9780080949185/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780080949185">https://learning.oreilly.com/library/view/~/9780080949185</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780080949185/?ar">https://go.oreilly.com/library-access/library/view/-/9780080949185/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security in wireless ad hoc and sensor networks ent://SD_ILS/0/SD_ILS:2285854 2024-09-23T22:18:33Z 2024-09-23T22:18:33Z by&#160;&Ccedil;ayirci, E. (Erdal)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470027486/?ar">https://go.oreilly.com/library-access/library/view/-/9780470027486/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470027486/?ar">https://learning.oreilly.com/library/view/~/9780470027486/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470027486">https://learning.oreilly.com/library/view/~/9780470027486</a><br/>Format:&#160;Electronic Resources<br/> Next generation SSH2 implementation : securing data in motion ent://SD_ILS/0/SD_ILS:2285986 2024-09-23T22:18:33Z 2024-09-23T22:18:33Z by&#160;Liu, Dale.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492836/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492836/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492836/?ar">https://learning.oreilly.com/library/view/~/9781597492836/?ar</a><br/>Format:&#160;Electronic Resources<br/> E-discovery : creating and managing an enterprisewide program : a technical guide to digital investigation and litigation support ent://SD_ILS/0/SD_ILS:2286529 2024-09-23T22:18:33Z 2024-09-23T22:18:33Z by&#160;Schuler, Karen.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492966/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492966/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492966/?ar">https://learning.oreilly.com/library/view/~/9781597492966/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Mac hacker's handbook ent://SD_ILS/0/SD_ILS:2286341 2024-09-23T22:18:33Z 2024-09-23T22:18:33Z by&#160;Miller, Charles, 1951-<br/><a href="https://learning.oreilly.com/library/view/~/9781118080337/?ar">https://learning.oreilly.com/library/view/~/9781118080337/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118080337/?ar">https://go.oreilly.com/library-access/library/view/-/9781118080337/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118080337">https://learning.oreilly.com/library/view/~/9781118080337</a><br/>Format:&#160;Electronic Resources<br/> The myths of security : what the computer security industry doesn't want you to know ent://SD_ILS/0/SD_ILS:2286938 2024-09-23T22:18:33Z 2024-09-23T22:18:33Z by&#160;Viega, John.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780596803957/?ar">https://go.oreilly.com/library-access/library/view/-/9780596803957/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780596803957/?ar">https://learning.oreilly.com/library/view/~/9780596803957/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780596803957">https://learning.oreilly.com/library/view/~/9780596803957</a><br/>Format:&#160;Electronic Resources<br/> SAP security configuration and deployment : the IT administrator's guide to best practices ent://SD_ILS/0/SD_ILS:2285985 2024-09-23T22:18:33Z 2024-09-23T22:18:33Z by&#160;Wun-Young, Leslie.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492843">https://learning.oreilly.com/library/view/~/9781597492843</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492843/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492843/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492843/?ar">https://learning.oreilly.com/library/view/~/9781597492843/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:2286804 2024-09-23T22:18:33Z 2024-09-23T22:18:33Z by&#160;Vacca, John R.<br/><a href="https://learning.oreilly.com/library/view/~/9780080921945">https://learning.oreilly.com/library/view/~/9780080921945</a> <a href="https://learning.oreilly.com/library/view/~/9780080921945/?ar">https://learning.oreilly.com/library/view/~/9780080921945/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780080921945/?ar">https://go.oreilly.com/library-access/library/view/-/9780080921945/?ar</a><br/>Format:&#160;Electronic Resources<br/> Beautiful security ent://SD_ILS/0/SD_ILS:2286888 2024-09-23T22:18:33Z 2024-09-23T22:18:33Z by&#160;Oram, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9780596801786/?ar">https://learning.oreilly.com/library/view/~/9780596801786/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780596801786">https://learning.oreilly.com/library/view/~/9780596801786</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780596801786/?ar">https://go.oreilly.com/library-access/library/view/-/9780596801786/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mobile malware attacks and defense ent://SD_ILS/0/SD_ILS:2294476 2024-09-23T22:18:33Z 2024-09-23T22:18:33Z by&#160;Dunham, Ken.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492980/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492980/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492980/?ar">https://learning.oreilly.com/library/view/~/9781597492980/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information Security Breaches : Avoidance and Treatment based on ISO27001. ent://SD_ILS/0/SD_ILS:2288616 2024-09-23T22:18:33Z 2024-09-23T22:18:33Z by&#160;Krausz, Michael.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280273">https://learning.oreilly.com/library/view/~/9781849280273</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849280273/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280273/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849280273/?ar">https://learning.oreilly.com/library/view/~/9781849280273/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security testing handbook for banking applications ent://SD_ILS/0/SD_ILS:2288620 2024-09-23T22:18:33Z 2024-09-23T22:18:33Z by&#160;Doraiswamy, Arvind.<br/><a href="https://learning.oreilly.com/library/view/~/9781905356829/?ar">https://learning.oreilly.com/library/view/~/9781905356829/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781905356829/?ar">https://go.oreilly.com/library-access/library/view/-/9781905356829/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281089">https://learning.oreilly.com/library/view/~/9781849281089</a> <a href="https://learning.oreilly.com/library/view/~/9781905356829">https://learning.oreilly.com/library/view/~/9781905356829</a><br/>Format:&#160;Electronic Resources<br/> Mobile Security : a Pocket Guide. ent://SD_ILS/0/SD_ILS:2288625 2024-09-23T22:18:33Z 2024-09-23T22:18:33Z by&#160;Furnell, Steven.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281225/?ar">https://learning.oreilly.com/library/view/~/9781849281225/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849281225/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281225/?ar</a><br/>Format:&#160;Electronic Resources<br/> The definitive guide to the C &amp; A transformation : the first publication of a comprehensive view Of the C &amp; A transformation ent://SD_ILS/0/SD_ILS:2290306 2024-09-23T22:18:33Z 2024-09-23T22:18:33Z by&#160;Mehan, Julie E.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281294/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281294/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281294/?ar">https://learning.oreilly.com/library/view/~/9781849281294/?ar</a><br/>Format:&#160;Electronic Resources<br/> ModSecurity 2.5 : securing your Apache installation and web applications : prevent web application hacking with this easy-to-use guide ent://SD_ILS/0/SD_ILS:2288845 2024-09-23T22:18:33Z 2024-09-23T22:18:33Z by&#160;Mischel, Magnus.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781847194749/?ar">https://go.oreilly.com/library-access/library/view/-/9781847194749/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781847194749">https://learning.oreilly.com/library/view/~/9781847194749</a> <a href="https://learning.oreilly.com/library/view/~/9781847194749/?ar">https://learning.oreilly.com/library/view/~/9781847194749/?ar</a><br/>Format:&#160;Electronic Resources<br/> How to survive a data breach : a pocket guide ent://SD_ILS/0/SD_ILS:2290079 2024-09-23T22:18:33Z 2024-09-23T22:18:33Z by&#160;Mitchell, Stewart.<br/><a href="https://learning.oreilly.com/library/view/~/9781905356966">https://learning.oreilly.com/library/view/~/9781905356966</a> <a href="https://learning.oreilly.com/library/view/~/9781905356966/?ar">https://learning.oreilly.com/library/view/~/9781905356966/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781905356966/?ar">https://go.oreilly.com/library-access/library/view/-/9781905356966/?ar</a><br/>Format:&#160;Electronic Resources<br/> Gray hat Python : Python programming for hackers and reverse engineers ent://SD_ILS/0/SD_ILS:2287862 2024-09-23T22:18:33Z 2024-09-23T22:18:33Z by&#160;Seitz, Justin.<br/><a href="https://learning.oreilly.com/library/view/~/9781593271923">https://learning.oreilly.com/library/view/~/9781593271923</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781593271923/?ar">https://go.oreilly.com/library-access/library/view/-/9781593271923/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781593271923/?ar">https://learning.oreilly.com/library/view/~/9781593271923/?ar</a><br/>Format:&#160;Electronic Resources<br/> CompTIA Security+ Deluxe study guide ent://SD_ILS/0/SD_ILS:2286330 2024-09-23T22:18:33Z 2024-09-23T22:18:33Z by&#160;Dulaney, Emmett A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470372968/?ar">https://go.oreilly.com/library-access/library/view/-/9780470372968/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470372968/?ar">https://learning.oreilly.com/library/view/~/9780470372968/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470372968">https://learning.oreilly.com/library/view/~/9780470372968</a><br/>Format:&#160;Electronic Resources<br/> Cloud security and privacy ent://SD_ILS/0/SD_ILS:2287451 2024-09-23T22:18:33Z 2024-09-23T22:18:33Z by&#160;Mather, Tim.<br/><a href="https://learning.oreilly.com/library/view/~/9780596806453/?ar">https://learning.oreilly.com/library/view/~/9780596806453/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780596806453/?ar">https://go.oreilly.com/library-access/library/view/-/9780596806453/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780596806453">https://learning.oreilly.com/library/view/~/9780596806453</a><br/>Format:&#160;Electronic Resources<br/> CompTIA Security+ study guide ent://SD_ILS/0/SD_ILS:2286901 2024-09-23T22:18:33Z 2024-09-23T22:18:33Z by&#160;Dulaney, Emmett A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470372975/?ar">https://go.oreilly.com/library-access/library/view/-/9780470372975/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470372975/?ar">https://learning.oreilly.com/library/view/~/9780470372975/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470372975">https://learning.oreilly.com/library/view/~/9780470372975</a><br/>Format:&#160;Electronic Resources<br/> Apache : receptury ent://SD_ILS/0/SD_ILS:2296868 2024-09-23T22:18:33Z 2024-09-23T22:18:33Z by&#160;Bowen, Richard Cooper, 1971-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457176425/?ar">https://go.oreilly.com/library-access/library/view/-/9781457176425/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457176425/?ar">https://learning.oreilly.com/library/view/~/9781457176425/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457176425">https://learning.oreilly.com/library/view/~/9781457176425</a><br/>Format:&#160;Electronic Resources<br/>