Search Results for - Narrowed by: 2010 - COMPUTERS -- Networking -- Security.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092010$0025092010$0026qf$003dSUBJECT$002509Subject$002509COMPUTERS$002b--$002bNetworking$002b--$002bSecurity.$002509COMPUTERS$002b--$002bNetworking$002b--$002bSecurity.$0026ps$003d300$0026isd$003dtrue?
2024-09-22T17:55:05Z
Applied Oracle security : developing secure database and middleware environments
ent://SD_ILS/0/SD_ILS:2287303
2024-09-22T17:55:05Z
2024-09-22T17:55:05Z
by Knox, David (David C.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071613705/?ar">https://go.oreilly.com/library-access/library/view/-/9780071613705/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071613705/?ar">https://learning.oreilly.com/library/view/~/9780071613705/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071613705">https://learning.oreilly.com/library/view/~/9780071613705</a><br/>Format: Electronic Resources<br/>
CCNA security study guide
ent://SD_ILS/0/SD_ILS:2288728
2024-09-22T17:55:05Z
2024-09-22T17:55:05Z
by Boyles, Tim.<br/><a href="https://learning.oreilly.com/library/view/~/9780470527672/?ar">https://learning.oreilly.com/library/view/~/9780470527672/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470527672/?ar">https://go.oreilly.com/library-access/library/view/-/9780470527672/?ar</a><br/>Format: Electronic Resources<br/>
Eleventh hour network+ : exam N10-004 study guide
ent://SD_ILS/0/SD_ILS:2287181
2024-09-22T17:55:05Z
2024-09-22T17:55:05Z
by Alpern, Naomi J.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494281/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494281/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494281/?ar">https://learning.oreilly.com/library/view/~/9781597494281/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494281">https://learning.oreilly.com/library/view/~/9781597494281</a><br/>Format: Electronic Resources<br/>
IT security metrics : a practical framework for measuring security & protecting data
ent://SD_ILS/0/SD_ILS:2289448
2024-09-22T17:55:05Z
2024-09-22T17:55:05Z
by Hayden, Lance.<br/><a href="https://learning.oreilly.com/library/view/~/9780071713405">https://learning.oreilly.com/library/view/~/9780071713405</a>
<a href="https://learning.oreilly.com/library/view/~/9780071713405/?ar">https://learning.oreilly.com/library/view/~/9780071713405/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071713405/?ar">https://go.oreilly.com/library-access/library/view/-/9780071713405/?ar</a><br/>Format: Electronic Resources<br/>
Deploying Microsoft Forefront Threat Management Gateway 2010
ent://SD_ILS/0/SD_ILS:2290730
2024-09-22T17:55:05Z
2024-09-22T17:55:05Z
by Diogenes, Yuri.<br/><a href="https://learning.oreilly.com/library/view/~/9780735656741/?ar">https://learning.oreilly.com/library/view/~/9780735656741/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780735656741/?ar">https://go.oreilly.com/library-access/library/view/-/9780735656741/?ar</a><br/>Format: Electronic Resources<br/>
Eleventh hour security+ : exam SYO-201 study guide
ent://SD_ILS/0/SD_ILS:2294477
2024-09-22T17:55:05Z
2024-09-22T17:55:05Z
by Dubrawsky, Ido.<br/><a href="https://learning.oreilly.com/library/view/~/9781597494274/?ar">https://learning.oreilly.com/library/view/~/9781597494274/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597494274/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494274/?ar</a><br/>Format: Electronic Resources<br/>
Professional penetration testing : creating and operating a formal hacking lab
ent://SD_ILS/0/SD_ILS:2287538
2024-09-22T17:55:05Z
2024-09-22T17:55:05Z
by Wilhelm, Thomas.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494250/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494250/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494250/?ar">https://learning.oreilly.com/library/view/~/9781597494250/?ar</a><br/>Format: Electronic Resources<br/>
Information security for management
ent://SD_ILS/0/SD_ILS:309255
2024-09-22T17:55:05Z
2024-09-22T17:55:05Z
by Iyengar, Venugopal.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=342178">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=342178</a><br/>Format: Electronic Resources<br/>
Mac Security Bible.
ent://SD_ILS/0/SD_ILS:2287722
2024-09-22T17:55:05Z
2024-09-22T17:55:05Z
by Kissell, Joe.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470474198/?ar">https://go.oreilly.com/library-access/library/view/-/9780470474198/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470474198/?ar">https://learning.oreilly.com/library/view/~/9780470474198/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470474198">https://learning.oreilly.com/library/view/~/9780470474198</a><br/>Format: Electronic Resources<br/>
24 deadly sins of software security : programming flaws and how to fix them
ent://SD_ILS/0/SD_ILS:2287176
2024-09-22T17:55:05Z
2024-09-22T17:55:05Z
by Howard, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9780071626750/?ar">https://learning.oreilly.com/library/view/~/9780071626750/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071626750/?ar">https://go.oreilly.com/library-access/library/view/-/9780071626750/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071626750">https://learning.oreilly.com/library/view/~/9780071626750</a><br/>Format: Electronic Resources<br/>
Secure and resilient software development
ent://SD_ILS/0/SD_ILS:2289816
2024-09-22T17:55:05Z
2024-09-22T17:55:05Z
by Merkow, Mark S.<br/><a href="https://learning.oreilly.com/library/view/~/9781439826973/?ar">https://learning.oreilly.com/library/view/~/9781439826973/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439826973/?ar">https://go.oreilly.com/library-access/library/view/-/9781439826973/?ar</a><br/>Format: Electronic Resources<br/>
Designing an IAM framework with Oracle Identity and access management suite
ent://SD_ILS/0/SD_ILS:2289729
2024-09-22T17:55:05Z
2024-09-22T17:55:05Z
by Scheidel, Jeff.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071741378/?ar">https://go.oreilly.com/library-access/library/view/-/9780071741378/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071741378/?ar">https://learning.oreilly.com/library/view/~/9780071741378/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071741378">https://learning.oreilly.com/library/view/~/9780071741378</a><br/>Format: Electronic Resources<br/>
IT induction and information security awareness : a pocket guide
ent://SD_ILS/0/SD_ILS:2292243
2024-09-22T17:55:05Z
2024-09-22T17:55:05Z
by Maddock, Valerie.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281195">https://learning.oreilly.com/library/view/~/9781849281195</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849281195/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281195/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281195/?ar">https://learning.oreilly.com/library/view/~/9781849281195/?ar</a><br/>Format: Electronic Resources<br/>
Hacking exposed wireless : wireless security secrets & solutions
ent://SD_ILS/0/SD_ILS:2289376
2024-09-22T17:55:05Z
2024-09-22T17:55:05Z
by Cache, Johnny.<br/><a href="https://learning.oreilly.com/library/view/~/9780071666619/?ar">https://learning.oreilly.com/library/view/~/9780071666619/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071666619/?ar">https://go.oreilly.com/library-access/library/view/-/9780071666619/?ar</a><br/>Format: Electronic Resources<br/>
Hacking for dummies
ent://SD_ILS/0/SD_ILS:2287972
2024-09-22T17:55:05Z
2024-09-22T17:55:05Z
by Beaver, Kevin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470550939/?ar">https://go.oreilly.com/library-access/library/view/-/9780470550939/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470550939/?ar">https://learning.oreilly.com/library/view/~/9780470550939/?ar</a><br/>Format: Electronic Resources<br/>
CWSP : certified wireless security professional official study guide
ent://SD_ILS/0/SD_ILS:2288340
2024-09-22T17:55:05Z
2024-09-22T17:55:05Z
by Coleman, David D.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470438916/?ar">https://go.oreilly.com/library-access/library/view/-/9780470438916/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470438916/?ar">https://learning.oreilly.com/library/view/~/9780470438916/?ar</a><br/>Format: Electronic Resources<br/>
Cloud Security and Governance : Who's on your cloud?.
ent://SD_ILS/0/SD_ILS:2290671
2024-09-22T17:55:05Z
2024-09-22T17:55:05Z
by Blount, Sumner.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280983">https://learning.oreilly.com/library/view/~/9781849280983</a>
<a href="https://learning.oreilly.com/library/view/~/9781849280983/?ar">https://learning.oreilly.com/library/view/~/9781849280983/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849280983/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280983/?ar</a><br/>Format: Electronic Resources<br/>
Information security risk management for ISO27001/ISO27002
ent://SD_ILS/0/SD_ILS:2291936
2024-09-22T17:55:05Z
2024-09-22T17:55:05Z
by Calder, Alan, 1957-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281492/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281492/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281492/?ar">https://learning.oreilly.com/library/view/~/9781849281492/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281492">https://learning.oreilly.com/library/view/~/9781849281492</a><br/>Format: Electronic Resources<br/>
Computer forensics : a pocket guide
ent://SD_ILS/0/SD_ILS:2289616
2024-09-22T17:55:05Z
2024-09-22T17:55:05Z
by Clarke, Nathan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281607/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281607/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281607/?ar">https://learning.oreilly.com/library/view/~/9781849281607/?ar</a><br/>Format: Electronic Resources<br/>
Managing Information Security Breaches : Studies from Real Life.
ent://SD_ILS/0/SD_ILS:2290674
2024-09-22T17:55:05Z
2024-09-22T17:55:05Z
by Krausz, Michael.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281539/?ar">https://learning.oreilly.com/library/view/~/9781849281539/?ar</a><br/>Format: Electronic Resources<br/>
Security : the Human Factor.
ent://SD_ILS/0/SD_ILS:2290675
2024-09-22T17:55:05Z
2024-09-22T17:55:05Z
by Kearney, Paul.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281843/?ar">https://learning.oreilly.com/library/view/~/9781849281843/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849281843/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281843/?ar</a><br/>Format: Electronic Resources<br/>
E-mail Security : a Pocket Guide.
ent://SD_ILS/0/SD_ILS:2290676
2024-09-22T17:55:05Z
2024-09-22T17:55:05Z
by Furnell, Steven.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280976">https://learning.oreilly.com/library/view/~/9781849280976</a>
<a href="https://learning.oreilly.com/library/view/~/9781849280976/?ar">https://learning.oreilly.com/library/view/~/9781849280976/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849280976/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280976/?ar</a><br/>Format: Electronic Resources<br/>
Mobile application security
ent://SD_ILS/0/SD_ILS:2288045
2024-09-22T17:55:05Z
2024-09-22T17:55:05Z
by Dwivedi, Himanshu.<br/><a href="https://learning.oreilly.com/library/view/~/9780071633567/?ar">https://learning.oreilly.com/library/view/~/9780071633567/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071633567/?ar">https://go.oreilly.com/library-access/library/view/-/9780071633567/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071633567">https://learning.oreilly.com/library/view/~/9780071633567</a><br/>Format: Electronic Resources<br/>
Network and system security
ent://SD_ILS/0/SD_ILS:2288837
2024-09-22T17:55:05Z
2024-09-22T17:55:05Z
by Vacca, John R.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495356">https://learning.oreilly.com/library/view/~/9781597495356</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495356/?ar">https://learning.oreilly.com/library/view/~/9781597495356/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495356/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495356/?ar</a><br/>Format: Electronic Resources<br/>
Seven deadliest web application attacks
ent://SD_ILS/0/SD_ILS:2289552
2024-09-22T17:55:05Z
2024-09-22T17:55:05Z
by Shema, Mike.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495431/?ar">https://learning.oreilly.com/library/view/~/9781597495431/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495431/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495431/?ar</a><br/>Format: Electronic Resources<br/>
Enterprise Mac security : MAC OS X Snow Leopard
ent://SD_ILS/0/SD_ILS:2290421
2024-09-22T17:55:05Z
2024-09-22T17:55:05Z
by Edge, Charles S., Jr.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781430227304/?ar">https://go.oreilly.com/library-access/library/view/-/9781430227304/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430227304/?ar">https://learning.oreilly.com/library/view/~/9781430227304/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430227304">https://learning.oreilly.com/library/view/~/9781430227304</a><br/>Format: Electronic Resources<br/>
Deploying Microsoft Forefront Unified Access Gateway 2010
ent://SD_ILS/0/SD_ILS:2290710
2024-09-22T17:55:05Z
2024-09-22T17:55:05Z
by Diogenes, Yuri.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780735656758/?ar">https://go.oreilly.com/library-access/library/view/-/9780735656758/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780735656758/?ar">https://learning.oreilly.com/library/view/~/9780735656758/?ar</a><br/>Format: Electronic Resources<br/>
Deploying Microsoft Forefront Protection 2010 for Exchange Server
ent://SD_ILS/0/SD_ILS:2290701
2024-09-22T17:55:05Z
2024-09-22T17:55:05Z
by Diogenes, Yuri.<br/><a href="https://learning.oreilly.com/library/view/~/9780735656734/?ar">https://learning.oreilly.com/library/view/~/9780735656734/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780735656734/?ar">https://go.oreilly.com/library-access/library/view/-/9780735656734/?ar</a><br/>Format: Electronic Resources<br/>
Assessing information security : strategies, tactics, logic and framework
ent://SD_ILS/0/SD_ILS:2288634
2024-09-22T17:55:05Z
2024-09-22T17:55:05Z
by Vladimirov, Andrew A.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280358">https://learning.oreilly.com/library/view/~/9781849280358</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849280358/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280358/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849280358/?ar">https://learning.oreilly.com/library/view/~/9781849280358/?ar</a><br/>Format: Electronic Resources<br/>
IT Governance to Drive High Performance : Lessons from Accenture.
ent://SD_ILS/0/SD_ILS:2288636
2024-09-22T17:55:05Z
2024-09-22T17:55:05Z
by Kress, Robert E.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281188/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281188/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281188/?ar">https://learning.oreilly.com/library/view/~/9781849281188/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281188">https://learning.oreilly.com/library/view/~/9781849281188</a><br/>Format: Electronic Resources<br/>
Seven deadliest wireless technologies attacks
ent://SD_ILS/0/SD_ILS:2288720
2024-09-22T17:55:05Z
2024-09-22T17:55:05Z
by Haines, Brad.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495417/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495417/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495417/?ar">https://learning.oreilly.com/library/view/~/9781597495417/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495417">https://learning.oreilly.com/library/view/~/9781597495417</a><br/>Format: Electronic Resources<br/>
Seven deadliest USB attacks
ent://SD_ILS/0/SD_ILS:2288721
2024-09-22T17:55:05Z
2024-09-22T17:55:05Z
by Anderson, Brian (Brian James)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495547/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495547/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495547/?ar">https://learning.oreilly.com/library/view/~/9781597495547/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495547">https://learning.oreilly.com/library/view/~/9781597495547</a><br/>Format: Electronic Resources<br/>
Cloud security : a comprehensive guide to secure cloud computing
ent://SD_ILS/0/SD_ILS:2289708
2024-09-22T17:55:05Z
2024-09-22T17:55:05Z
by Krutz, Ronald L., 1938-<br/><a href="https://learning.oreilly.com/library/view/~/9780470589878/?ar">https://learning.oreilly.com/library/view/~/9780470589878/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470589878/?ar">https://go.oreilly.com/library-access/library/view/-/9780470589878/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470589878">https://learning.oreilly.com/library/view/~/9780470589878</a><br/>Format: Electronic Resources<br/>