Search Results for - Narrowed by: 2010 - COMPUTERS -- Networking -- Security. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092010$0025092010$0026qf$003dSUBJECT$002509Subject$002509COMPUTERS$002b--$002bNetworking$002b--$002bSecurity.$002509COMPUTERS$002b--$002bNetworking$002b--$002bSecurity.$0026ps$003d300$0026isd$003dtrue? 2024-09-22T17:55:05Z Applied Oracle security : developing secure database and middleware environments ent://SD_ILS/0/SD_ILS:2287303 2024-09-22T17:55:05Z 2024-09-22T17:55:05Z by&#160;Knox, David (David C.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071613705/?ar">https://go.oreilly.com/library-access/library/view/-/9780071613705/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071613705/?ar">https://learning.oreilly.com/library/view/~/9780071613705/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071613705">https://learning.oreilly.com/library/view/~/9780071613705</a><br/>Format:&#160;Electronic Resources<br/> CCNA security study guide ent://SD_ILS/0/SD_ILS:2288728 2024-09-22T17:55:05Z 2024-09-22T17:55:05Z by&#160;Boyles, Tim.<br/><a href="https://learning.oreilly.com/library/view/~/9780470527672/?ar">https://learning.oreilly.com/library/view/~/9780470527672/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470527672/?ar">https://go.oreilly.com/library-access/library/view/-/9780470527672/?ar</a><br/>Format:&#160;Electronic Resources<br/> Eleventh hour network+ : exam N10-004 study guide ent://SD_ILS/0/SD_ILS:2287181 2024-09-22T17:55:05Z 2024-09-22T17:55:05Z by&#160;Alpern, Naomi J.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494281/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494281/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597494281/?ar">https://learning.oreilly.com/library/view/~/9781597494281/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597494281">https://learning.oreilly.com/library/view/~/9781597494281</a><br/>Format:&#160;Electronic Resources<br/> IT security metrics : a practical framework for measuring security &amp; protecting data ent://SD_ILS/0/SD_ILS:2289448 2024-09-22T17:55:05Z 2024-09-22T17:55:05Z by&#160;Hayden, Lance.<br/><a href="https://learning.oreilly.com/library/view/~/9780071713405">https://learning.oreilly.com/library/view/~/9780071713405</a> <a href="https://learning.oreilly.com/library/view/~/9780071713405/?ar">https://learning.oreilly.com/library/view/~/9780071713405/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071713405/?ar">https://go.oreilly.com/library-access/library/view/-/9780071713405/?ar</a><br/>Format:&#160;Electronic Resources<br/> Deploying Microsoft Forefront Threat Management Gateway 2010 ent://SD_ILS/0/SD_ILS:2290730 2024-09-22T17:55:05Z 2024-09-22T17:55:05Z by&#160;Diogenes, Yuri.<br/><a href="https://learning.oreilly.com/library/view/~/9780735656741/?ar">https://learning.oreilly.com/library/view/~/9780735656741/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780735656741/?ar">https://go.oreilly.com/library-access/library/view/-/9780735656741/?ar</a><br/>Format:&#160;Electronic Resources<br/> Eleventh hour security+ : exam SYO-201 study guide ent://SD_ILS/0/SD_ILS:2294477 2024-09-22T17:55:05Z 2024-09-22T17:55:05Z by&#160;Dubrawsky, Ido.<br/><a href="https://learning.oreilly.com/library/view/~/9781597494274/?ar">https://learning.oreilly.com/library/view/~/9781597494274/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597494274/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494274/?ar</a><br/>Format:&#160;Electronic Resources<br/> Professional penetration testing : creating and operating a formal hacking lab ent://SD_ILS/0/SD_ILS:2287538 2024-09-22T17:55:05Z 2024-09-22T17:55:05Z by&#160;Wilhelm, Thomas.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494250/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494250/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597494250/?ar">https://learning.oreilly.com/library/view/~/9781597494250/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security for management ent://SD_ILS/0/SD_ILS:309255 2024-09-22T17:55:05Z 2024-09-22T17:55:05Z by&#160;Iyengar, Venugopal.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=342178">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=342178</a><br/>Format:&#160;Electronic Resources<br/> Mac Security Bible. ent://SD_ILS/0/SD_ILS:2287722 2024-09-22T17:55:05Z 2024-09-22T17:55:05Z by&#160;Kissell, Joe.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470474198/?ar">https://go.oreilly.com/library-access/library/view/-/9780470474198/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470474198/?ar">https://learning.oreilly.com/library/view/~/9780470474198/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470474198">https://learning.oreilly.com/library/view/~/9780470474198</a><br/>Format:&#160;Electronic Resources<br/> 24 deadly sins of software security : programming flaws and how to fix them ent://SD_ILS/0/SD_ILS:2287176 2024-09-22T17:55:05Z 2024-09-22T17:55:05Z by&#160;Howard, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9780071626750/?ar">https://learning.oreilly.com/library/view/~/9780071626750/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071626750/?ar">https://go.oreilly.com/library-access/library/view/-/9780071626750/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071626750">https://learning.oreilly.com/library/view/~/9780071626750</a><br/>Format:&#160;Electronic Resources<br/> Secure and resilient software development ent://SD_ILS/0/SD_ILS:2289816 2024-09-22T17:55:05Z 2024-09-22T17:55:05Z by&#160;Merkow, Mark S.<br/><a href="https://learning.oreilly.com/library/view/~/9781439826973/?ar">https://learning.oreilly.com/library/view/~/9781439826973/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439826973/?ar">https://go.oreilly.com/library-access/library/view/-/9781439826973/?ar</a><br/>Format:&#160;Electronic Resources<br/> Designing an IAM framework with Oracle Identity and access management suite ent://SD_ILS/0/SD_ILS:2289729 2024-09-22T17:55:05Z 2024-09-22T17:55:05Z by&#160;Scheidel, Jeff.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071741378/?ar">https://go.oreilly.com/library-access/library/view/-/9780071741378/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071741378/?ar">https://learning.oreilly.com/library/view/~/9780071741378/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071741378">https://learning.oreilly.com/library/view/~/9780071741378</a><br/>Format:&#160;Electronic Resources<br/> IT induction and information security awareness : a pocket guide ent://SD_ILS/0/SD_ILS:2292243 2024-09-22T17:55:05Z 2024-09-22T17:55:05Z by&#160;Maddock, Valerie.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281195">https://learning.oreilly.com/library/view/~/9781849281195</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849281195/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281195/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281195/?ar">https://learning.oreilly.com/library/view/~/9781849281195/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking exposed wireless : wireless security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:2289376 2024-09-22T17:55:05Z 2024-09-22T17:55:05Z by&#160;Cache, Johnny.<br/><a href="https://learning.oreilly.com/library/view/~/9780071666619/?ar">https://learning.oreilly.com/library/view/~/9780071666619/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071666619/?ar">https://go.oreilly.com/library-access/library/view/-/9780071666619/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking for dummies ent://SD_ILS/0/SD_ILS:2287972 2024-09-22T17:55:05Z 2024-09-22T17:55:05Z by&#160;Beaver, Kevin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470550939/?ar">https://go.oreilly.com/library-access/library/view/-/9780470550939/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470550939/?ar">https://learning.oreilly.com/library/view/~/9780470550939/?ar</a><br/>Format:&#160;Electronic Resources<br/> CWSP : certified wireless security professional official study guide ent://SD_ILS/0/SD_ILS:2288340 2024-09-22T17:55:05Z 2024-09-22T17:55:05Z by&#160;Coleman, David D.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470438916/?ar">https://go.oreilly.com/library-access/library/view/-/9780470438916/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470438916/?ar">https://learning.oreilly.com/library/view/~/9780470438916/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud Security and Governance : Who's on your cloud?. ent://SD_ILS/0/SD_ILS:2290671 2024-09-22T17:55:05Z 2024-09-22T17:55:05Z by&#160;Blount, Sumner.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280983">https://learning.oreilly.com/library/view/~/9781849280983</a> <a href="https://learning.oreilly.com/library/view/~/9781849280983/?ar">https://learning.oreilly.com/library/view/~/9781849280983/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849280983/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280983/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information security risk management for ISO27001/ISO27002 ent://SD_ILS/0/SD_ILS:2291936 2024-09-22T17:55:05Z 2024-09-22T17:55:05Z by&#160;Calder, Alan, 1957-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281492/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281492/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281492/?ar">https://learning.oreilly.com/library/view/~/9781849281492/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281492">https://learning.oreilly.com/library/view/~/9781849281492</a><br/>Format:&#160;Electronic Resources<br/> Computer forensics : a pocket guide ent://SD_ILS/0/SD_ILS:2289616 2024-09-22T17:55:05Z 2024-09-22T17:55:05Z by&#160;Clarke, Nathan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281607/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281607/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281607/?ar">https://learning.oreilly.com/library/view/~/9781849281607/?ar</a><br/>Format:&#160;Electronic Resources<br/> Managing Information Security Breaches : Studies from Real Life. ent://SD_ILS/0/SD_ILS:2290674 2024-09-22T17:55:05Z 2024-09-22T17:55:05Z by&#160;Krausz, Michael.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281539/?ar">https://learning.oreilly.com/library/view/~/9781849281539/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security : the Human Factor. ent://SD_ILS/0/SD_ILS:2290675 2024-09-22T17:55:05Z 2024-09-22T17:55:05Z by&#160;Kearney, Paul.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281843/?ar">https://learning.oreilly.com/library/view/~/9781849281843/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849281843/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281843/?ar</a><br/>Format:&#160;Electronic Resources<br/> E-mail Security : a Pocket Guide. ent://SD_ILS/0/SD_ILS:2290676 2024-09-22T17:55:05Z 2024-09-22T17:55:05Z by&#160;Furnell, Steven.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280976">https://learning.oreilly.com/library/view/~/9781849280976</a> <a href="https://learning.oreilly.com/library/view/~/9781849280976/?ar">https://learning.oreilly.com/library/view/~/9781849280976/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849280976/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280976/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mobile application security ent://SD_ILS/0/SD_ILS:2288045 2024-09-22T17:55:05Z 2024-09-22T17:55:05Z by&#160;Dwivedi, Himanshu.<br/><a href="https://learning.oreilly.com/library/view/~/9780071633567/?ar">https://learning.oreilly.com/library/view/~/9780071633567/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071633567/?ar">https://go.oreilly.com/library-access/library/view/-/9780071633567/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071633567">https://learning.oreilly.com/library/view/~/9780071633567</a><br/>Format:&#160;Electronic Resources<br/> Network and system security ent://SD_ILS/0/SD_ILS:2288837 2024-09-22T17:55:05Z 2024-09-22T17:55:05Z by&#160;Vacca, John R.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495356">https://learning.oreilly.com/library/view/~/9781597495356</a> <a href="https://learning.oreilly.com/library/view/~/9781597495356/?ar">https://learning.oreilly.com/library/view/~/9781597495356/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597495356/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495356/?ar</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest web application attacks ent://SD_ILS/0/SD_ILS:2289552 2024-09-22T17:55:05Z 2024-09-22T17:55:05Z by&#160;Shema, Mike.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495431/?ar">https://learning.oreilly.com/library/view/~/9781597495431/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597495431/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495431/?ar</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Mac security : MAC OS X Snow Leopard ent://SD_ILS/0/SD_ILS:2290421 2024-09-22T17:55:05Z 2024-09-22T17:55:05Z by&#160;Edge, Charles S., Jr.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781430227304/?ar">https://go.oreilly.com/library-access/library/view/-/9781430227304/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430227304/?ar">https://learning.oreilly.com/library/view/~/9781430227304/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430227304">https://learning.oreilly.com/library/view/~/9781430227304</a><br/>Format:&#160;Electronic Resources<br/> Deploying Microsoft Forefront Unified Access Gateway 2010 ent://SD_ILS/0/SD_ILS:2290710 2024-09-22T17:55:05Z 2024-09-22T17:55:05Z by&#160;Diogenes, Yuri.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780735656758/?ar">https://go.oreilly.com/library-access/library/view/-/9780735656758/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780735656758/?ar">https://learning.oreilly.com/library/view/~/9780735656758/?ar</a><br/>Format:&#160;Electronic Resources<br/> Deploying Microsoft Forefront Protection 2010 for Exchange Server ent://SD_ILS/0/SD_ILS:2290701 2024-09-22T17:55:05Z 2024-09-22T17:55:05Z by&#160;Diogenes, Yuri.<br/><a href="https://learning.oreilly.com/library/view/~/9780735656734/?ar">https://learning.oreilly.com/library/view/~/9780735656734/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780735656734/?ar">https://go.oreilly.com/library-access/library/view/-/9780735656734/?ar</a><br/>Format:&#160;Electronic Resources<br/> Assessing information security : strategies, tactics, logic and framework ent://SD_ILS/0/SD_ILS:2288634 2024-09-22T17:55:05Z 2024-09-22T17:55:05Z by&#160;Vladimirov, Andrew A.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280358">https://learning.oreilly.com/library/view/~/9781849280358</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849280358/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280358/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849280358/?ar">https://learning.oreilly.com/library/view/~/9781849280358/?ar</a><br/>Format:&#160;Electronic Resources<br/> IT Governance to Drive High Performance : Lessons from Accenture. ent://SD_ILS/0/SD_ILS:2288636 2024-09-22T17:55:05Z 2024-09-22T17:55:05Z by&#160;Kress, Robert E.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281188/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281188/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281188/?ar">https://learning.oreilly.com/library/view/~/9781849281188/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281188">https://learning.oreilly.com/library/view/~/9781849281188</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest wireless technologies attacks ent://SD_ILS/0/SD_ILS:2288720 2024-09-22T17:55:05Z 2024-09-22T17:55:05Z by&#160;Haines, Brad.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495417/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495417/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495417/?ar">https://learning.oreilly.com/library/view/~/9781597495417/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495417">https://learning.oreilly.com/library/view/~/9781597495417</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest USB attacks ent://SD_ILS/0/SD_ILS:2288721 2024-09-22T17:55:05Z 2024-09-22T17:55:05Z by&#160;Anderson, Brian (Brian James)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495547/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495547/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495547/?ar">https://learning.oreilly.com/library/view/~/9781597495547/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495547">https://learning.oreilly.com/library/view/~/9781597495547</a><br/>Format:&#160;Electronic Resources<br/> Cloud security : a comprehensive guide to secure cloud computing ent://SD_ILS/0/SD_ILS:2289708 2024-09-22T17:55:05Z 2024-09-22T17:55:05Z by&#160;Krutz, Ronald L., 1938-<br/><a href="https://learning.oreilly.com/library/view/~/9780470589878/?ar">https://learning.oreilly.com/library/view/~/9780470589878/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470589878/?ar">https://go.oreilly.com/library-access/library/view/-/9780470589878/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470589878">https://learning.oreilly.com/library/view/~/9780470589878</a><br/>Format:&#160;Electronic Resources<br/>