Search Results for - Narrowed by: 2010 - Computer security.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092010$0025092010$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?2024-09-26T01:48:35ZAdaptive Security Management Architectureent://SD_ILS/0/SD_ILS:23260642024-09-26T01:48:35Z2024-09-26T01:48:35Zby Tiller, James S.<br/><a href="https://learning.oreilly.com/library/view/~/9781420013375">https://learning.oreilly.com/library/view/~/9781420013375</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781420013375/?ar">https://go.oreilly.com/library-access/library/view/-/9781420013375/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420013375/?ar">https://learning.oreilly.com/library/view/~/9781420013375/?ar</a><br/>Format: Electronic Resources<br/>Social Engineering : The Art of Human Hacking.ent://SD_ILS/0/SD_ILS:12288892024-09-26T01:48:35Z2024-09-26T01:48:35Zby Hadnagy, Christopher.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=706746">Click to View</a><br/>Format: Electronic Resources<br/>IT Audit, Control, and Security.ent://SD_ILS/0/SD_ILS:12222742024-09-26T01:48:35Z2024-09-26T01:48:35Zby Moeller, Robert R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=624573">Click to View</a><br/>Format: Electronic Resources<br/>Information Assurance : Dependability and Security in Networked Systems.ent://SD_ILS/0/SD_ILS:11964582024-09-26T01:48:35Z2024-09-26T01:48:35Zby Qian, Yi.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=328312">Click to View</a><br/>Format: Electronic Resources<br/>Dear Hacker : Letters to the Editor Of 2600.ent://SD_ILS/0/SD_ILS:12156712024-09-26T01:48:35Z2024-09-26T01:48:35Zby Goldstein, Emmanuel.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=537340">Click to View</a><br/>Format: Electronic Resources<br/>Hashing in Computer Science : Fifty Years of Slicing and Dicing.ent://SD_ILS/0/SD_ILS:12156732024-09-26T01:48:35Z2024-09-26T01:48:35Zby Konheim, Alan G.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=537352">Click to View</a><br/>Format: Electronic Resources<br/>Assessing Information Security : Strategies, Tactics, Logic and Framework.ent://SD_ILS/0/SD_ILS:12133662024-09-26T01:48:35Z2024-09-26T01:48:35Zby Vladimirov, Andrew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=499606">Click to View</a><br/>Format: Electronic Resources<br/>Professional Cocoa Application Security.ent://SD_ILS/0/SD_ILS:12156742024-09-26T01:48:35Z2024-09-26T01:48:35Zby Lee, Graham J.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=537355">Click to View</a><br/>Format: Electronic Resources<br/>Security 2020 : Reduce Security Risks This Decade.ent://SD_ILS/0/SD_ILS:12283162024-09-26T01:48:35Z2024-09-26T01:48:35Zby Howard, Doug.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=694289">Click to View</a><br/>Format: Electronic Resources<br/>Relation Based Access Control.ent://SD_ILS/0/SD_ILS:12660402024-09-26T01:48:35Z2024-09-26T01:48:35Zby Zhang, R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1589007">Click to View</a><br/>Format: Electronic Resources<br/>Adaptive security management architectureent://SD_ILS/0/SD_ILS:21254512024-09-26T01:48:35Z2024-09-26T01:48:35Zby Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=625004">Click to View</a><br/>Format: Electronic Resources<br/>Spring Security 3.ent://SD_ILS/0/SD_ILS:12451972024-09-26T01:48:35Z2024-09-26T01:48:35Zby Mularien, Peter.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=944051">Click to View</a><br/>Format: Electronic Resources<br/>Group Policy : Fundamentals, Security, and the Managed Desktop.ent://SD_ILS/0/SD_ILS:12143372024-09-26T01:48:35Z2024-09-26T01:48:35Zby Moskowitz, Jeremy.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=530009">Click to View</a><br/>Format: Electronic Resources<br/>Cloud Security : A Comprehensive Guide to Secure Cloud Computing.ent://SD_ILS/0/SD_ILS:12189872024-09-26T01:48:35Z2024-09-26T01:48:35Zby Krutz, Ronald L.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=589027">Click to View</a><br/>Format: Electronic Resources<br/>Logics and Languages for Reliability and Security.ent://SD_ILS/0/SD_ILS:12173012024-09-26T01:48:35Z2024-09-26T01:48:35Zby Esparza, J.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=557042">Click to View</a><br/>Format: Electronic Resources<br/>Least Privilege Security for Windows 7, Vista and XP : Implement Efficient System Security By Assigning Permissions Effectively.ent://SD_ILS/0/SD_ILS:12451842024-09-26T01:48:35Z2024-09-26T01:48:35Zby Smith, Russell.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=944038">Click to View</a><br/>Format: Electronic Resources<br/>GlassFish Security.ent://SD_ILS/0/SD_ILS:12452432024-09-26T01:48:35Z2024-09-26T01:48:35Zby Kalali, Masoud.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=944941">Click to View</a><br/>Format: Electronic Resources<br/>Risk Factors in Computer-Crime Victimization.ent://SD_ILS/0/SD_ILS:12507572024-09-26T01:48:35Z2024-09-26T01:48:35Zby Choi, Kyung-Shick.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1057793">Click to View</a><br/>Format: Electronic Resources<br/>Practical intrusion analysis : prevention and detection for the twenty-first centuryent://SD_ILS/0/SD_ILS:22860802024-09-26T01:48:35Z2024-09-26T01:48:35Zby Trost, Ryan.<br/><a href="https://learning.oreilly.com/library/view/~/9780321591890/?ar">https://learning.oreilly.com/library/view/~/9780321591890/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321591890/?ar">https://go.oreilly.com/library-access/library/view/-/9780321591890/?ar</a><br/>Format: Electronic Resources<br/>Inside cyber warfareent://SD_ILS/0/SD_ILS:22874532024-09-26T01:48:35Z2024-09-26T01:48:35Zby Carr, Jeffrey.<br/><a href="https://learning.oreilly.com/library/view/~/9781449318475">https://learning.oreilly.com/library/view/~/9781449318475</a>
<a href="https://learning.oreilly.com/library/view/~/9781449377229">https://learning.oreilly.com/library/view/~/9781449377229</a>
<a href="https://learning.oreilly.com/library/view/~/9781449377229/?ar">https://learning.oreilly.com/library/view/~/9781449377229/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781449377229/?ar">https://go.oreilly.com/library-access/library/view/-/9781449377229/?ar</a><br/>Format: Electronic Resources<br/>Hashing in computer science : fifty years of slicing and dicingent://SD_ILS/0/SD_ILS:22893602024-09-26T01:48:35Z2024-09-26T01:48:35Zby Konheim, Alan G., 1934-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118031834/?ar">https://go.oreilly.com/library-access/library/view/-/9781118031834/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118031834/?ar">https://learning.oreilly.com/library/view/~/9781118031834/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118031834">https://learning.oreilly.com/library/view/~/9781118031834</a><br/>Format: Electronic Resources<br/>Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and dataent://SD_ILS/0/SD_ILS:22891492024-09-26T01:48:35Z2024-09-26T01:48:35Zby Lillard, Terrence.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495387/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495387/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495387/?ar">https://learning.oreilly.com/library/view/~/9781597495387/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495387">https://learning.oreilly.com/library/view/~/9781597495387</a><br/>Format: Electronic Resources<br/>Professional Cocoa application securityent://SD_ILS/0/SD_ILS:22893152024-09-26T01:48:35Z2024-09-26T01:48:35Zby Lee, Graham J.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470525951/?ar">https://go.oreilly.com/library-access/library/view/-/9780470525951/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470525951/?ar">https://learning.oreilly.com/library/view/~/9780470525951/?ar</a><br/>Format: Electronic Resources<br/>E-mail Security : a Pocket Guide.ent://SD_ILS/0/SD_ILS:22906762024-09-26T01:48:35Z2024-09-26T01:48:35Zby Furnell, Steven.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280976">https://learning.oreilly.com/library/view/~/9781849280976</a>
<a href="https://learning.oreilly.com/library/view/~/9781849280976/?ar">https://learning.oreilly.com/library/view/~/9781849280976/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849280976/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280976/?ar</a><br/>Format: Electronic Resources<br/>Seven deadliest social network attacksent://SD_ILS/0/SD_ILS:22897182024-09-26T01:48:35Z2024-09-26T01:48:35Zby Timm, Carl.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495455/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495455/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495455/?ar">https://learning.oreilly.com/library/view/~/9781597495455/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495455">https://learning.oreilly.com/library/view/~/9781597495455</a><br/>Format: Electronic Resources<br/>Cisco DCUCI quick referenceent://SD_ILS/0/SD_ILS:22898582024-09-26T01:48:35Z2024-09-26T01:48:35Zby Casaletto, James.<br/><a href="https://learning.oreilly.com/library/view/~/9781587141881/?ar">https://learning.oreilly.com/library/view/~/9781587141881/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781587141881/?ar">https://go.oreilly.com/library-access/library/view/-/9781587141881/?ar</a><br/>Format: Electronic Resources<br/>IT Governance to Drive High Performance : Lessons from Accenture.ent://SD_ILS/0/SD_ILS:22886362024-09-26T01:48:35Z2024-09-26T01:48:35Zby Kress, Robert E.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281188/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281188/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281188/?ar">https://learning.oreilly.com/library/view/~/9781849281188/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281188">https://learning.oreilly.com/library/view/~/9781849281188</a><br/>Format: Electronic Resources<br/>Mac OS X security and mobility v10.6ent://SD_ILS/0/SD_ILS:22886542024-09-26T01:48:35Z2024-09-26T01:48:35Zby Kite, Robert.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321685698/?ar">https://go.oreilly.com/library-access/library/view/-/9780321685698/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321685698/?ar">https://learning.oreilly.com/library/view/~/9780321685698/?ar</a><br/>Format: Electronic Resources<br/>Seven deadliest wireless technologies attacksent://SD_ILS/0/SD_ILS:22887202024-09-26T01:48:35Z2024-09-26T01:48:35Zby Haines, Brad.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495417/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495417/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495417/?ar">https://learning.oreilly.com/library/view/~/9781597495417/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495417">https://learning.oreilly.com/library/view/~/9781597495417</a><br/>Format: Electronic Resources<br/>Dear Hacker : letters to the editor of 2600ent://SD_ILS/0/SD_ILS:22894682024-09-26T01:48:35Z2024-09-26T01:48:35Zby Goldstein, Emmanuel, 1959-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470620069/?ar">https://go.oreilly.com/library-access/library/view/-/9780470620069/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470620069/?ar">https://learning.oreilly.com/library/view/~/9780470620069/?ar</a><br/>Format: Electronic Resources<br/>Computer forensics : a pocket guideent://SD_ILS/0/SD_ILS:22896162024-09-26T01:48:35Z2024-09-26T01:48:35Zby Clarke, Nathan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281607/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281607/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281607/?ar">https://learning.oreilly.com/library/view/~/9781849281607/?ar</a><br/>Format: Electronic Resources<br/>Secure and resilient software developmentent://SD_ILS/0/SD_ILS:22898162024-09-26T01:48:35Z2024-09-26T01:48:35Zby Merkow, Mark S.<br/><a href="https://learning.oreilly.com/library/view/~/9781439826973/?ar">https://learning.oreilly.com/library/view/~/9781439826973/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439826973/?ar">https://go.oreilly.com/library-access/library/view/-/9781439826973/?ar</a><br/>Format: Electronic Resources<br/>Cloud Security and Governance : Who's on your cloud?.ent://SD_ILS/0/SD_ILS:22906712024-09-26T01:48:35Z2024-09-26T01:48:35Zby Blount, Sumner.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280983">https://learning.oreilly.com/library/view/~/9781849280983</a>
<a href="https://learning.oreilly.com/library/view/~/9781849280983/?ar">https://learning.oreilly.com/library/view/~/9781849280983/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849280983/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280983/?ar</a><br/>Format: Electronic Resources<br/>ISO27001 in a Windows Environment : the best practice handbook for a Microsoft Windows environmentent://SD_ILS/0/SD_ILS:22900262024-09-26T01:48:35Z2024-09-26T01:48:35Zby Honan, Brian.<br/><a href="https://learning.oreilly.com/library/view/~/9781849280495/?ar">https://learning.oreilly.com/library/view/~/9781849280495/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849280495/?ar">https://go.oreilly.com/library-access/library/view/-/9781849280495/?ar</a><br/>Format: Electronic Resources<br/>Virtualization and forensics : a digital forensic investigator's guide to virtual environmentsent://SD_ILS/0/SD_ILS:22900412024-09-26T01:48:35Z2024-09-26T01:48:35Zby Barrett, Diane.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495578/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495578/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495578/?ar">https://learning.oreilly.com/library/view/~/9781597495578/?ar</a><br/>Format: Electronic Resources<br/>Managing Information Security Breaches : Studies from Real Life.ent://SD_ILS/0/SD_ILS:22906742024-09-26T01:48:35Z2024-09-26T01:48:35Zby Krausz, Michael.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281539/?ar">https://learning.oreilly.com/library/view/~/9781849281539/?ar</a><br/>Format: Electronic Resources<br/>IOS forensic analysis for iPhone, iPad, and iPod Touchent://SD_ILS/0/SD_ILS:22912302024-09-26T01:48:35Z2024-09-26T01:48:35Zby Morrissey, Sean.<br/><a href="https://learning.oreilly.com/library/view/~/9781430233428">https://learning.oreilly.com/library/view/~/9781430233428</a>
<a href="https://learning.oreilly.com/library/view/~/9781430233428/?ar">https://learning.oreilly.com/library/view/~/9781430233428/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430233428/?ar">https://go.oreilly.com/library-access/library/view/-/9781430233428/?ar</a><br/>Format: Electronic Resources<br/>Dissecting the hack : the f0rb1dd3n networkent://SD_ILS/0/SD_ILS:22907002024-09-26T01:48:35Z2024-09-26T01:48:35Zby Street, Jayson E.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495684/?ar">https://learning.oreilly.com/library/view/~/9781597495684/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495684/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495684/?ar</a><br/>Format: Electronic Resources<br/>Deploying Microsoft Forefront Protection 2010 for Exchange Serverent://SD_ILS/0/SD_ILS:22907012024-09-26T01:48:35Z2024-09-26T01:48:35Zby Diogenes, Yuri.<br/><a href="https://learning.oreilly.com/library/view/~/9780735656734/?ar">https://learning.oreilly.com/library/view/~/9780735656734/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780735656734/?ar">https://go.oreilly.com/library-access/library/view/-/9780735656734/?ar</a><br/>Format: Electronic Resources<br/>Microsoft Forefront threat management gateway (TMG) : administrator's companionent://SD_ILS/0/SD_ILS:22877472024-09-26T01:48:35Z2024-09-26T01:48:35Zby Harrison, Jim.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780735640535/?ar">https://go.oreilly.com/library-access/library/view/-/9780735640535/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780735640535/?ar">https://learning.oreilly.com/library/view/~/9780735640535/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780735640535">https://learning.oreilly.com/library/view/~/9780735640535</a><br/>Format: Electronic Resources<br/>Applied Oracle security : developing secure database and middleware environmentsent://SD_ILS/0/SD_ILS:22873032024-09-26T01:48:35Z2024-09-26T01:48:35Zby Knox, David (David C.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071613705/?ar">https://go.oreilly.com/library-access/library/view/-/9780071613705/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071613705/?ar">https://learning.oreilly.com/library/view/~/9780071613705/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071613705">https://learning.oreilly.com/library/view/~/9780071613705</a><br/>Format: Electronic Resources<br/>Internet fraud casebook : the World Wide Web of deceitent://SD_ILS/0/SD_ILS:22893842024-09-26T01:48:35Z2024-09-26T01:48:35Zby Wells, Joseph T.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470643631/?ar">https://go.oreilly.com/library-access/library/view/-/9780470643631/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470643631/?ar">https://learning.oreilly.com/library/view/~/9780470643631/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470643631">https://learning.oreilly.com/library/view/~/9780470643631</a><br/>Format: Electronic Resources<br/>Group policy : fundamentals, security, and the managed desktopent://SD_ILS/0/SD_ILS:22888912024-09-26T01:48:35Z2024-09-26T01:48:35Zby Moskowitz, Jeremy.<br/><a href="https://learning.oreilly.com/library/view/~/9780470581858/?ar">https://learning.oreilly.com/library/view/~/9780470581858/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470769805/?ar">https://learning.oreilly.com/library/view/~/9780470769805/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470581858/?ar">https://go.oreilly.com/library-access/library/view/-/9780470581858/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470769805/?ar">https://go.oreilly.com/library-access/library/view/-/9780470769805/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470769805">https://learning.oreilly.com/library/view/~/9780470769805</a><br/>Format: Electronic Resources<br/>Seven deadliest USB attacksent://SD_ILS/0/SD_ILS:22887212024-09-26T01:48:35Z2024-09-26T01:48:35Zby Anderson, Brian (Brian James)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495547/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495547/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495547/?ar">https://learning.oreilly.com/library/view/~/9781597495547/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495547">https://learning.oreilly.com/library/view/~/9781597495547</a><br/>Format: Electronic Resources<br/>24 deadly sins of software security : programming flaws and how to fix thement://SD_ILS/0/SD_ILS:22871762024-09-26T01:48:35Z2024-09-26T01:48:35Zby Howard, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9780071626750/?ar">https://learning.oreilly.com/library/view/~/9780071626750/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071626750/?ar">https://go.oreilly.com/library-access/library/view/-/9780071626750/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071626750">https://learning.oreilly.com/library/view/~/9780071626750</a><br/>Format: Electronic Resources<br/>Hacking for dummiesent://SD_ILS/0/SD_ILS:22879722024-09-26T01:48:35Z2024-09-26T01:48:35Zby Beaver, Kevin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470550939/?ar">https://go.oreilly.com/library-access/library/view/-/9780470550939/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470550939/?ar">https://learning.oreilly.com/library/view/~/9780470550939/?ar</a><br/>Format: Electronic Resources<br/>Secure and resilient software developmentent://SD_ILS/0/SD_ILS:21313812024-09-26T01:48:35Z2024-09-26T01:48:35Zby Merkow, Mark S., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1446770">Click to View</a><br/>Format: Electronic Resources<br/>Collaborative computer security and trust managementent://SD_ILS/0/SD_ILS:22612152024-09-26T01:48:35Z2024-09-26T01:48:35Zby Seigneur, Jean-Marc.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-414-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-414-9</a><br/>Format: Electronic Resources<br/>Web services research for emerging applications discoveries and trendsent://SD_ILS/0/SD_ILS:22621232024-09-26T01:48:35Z2024-09-26T01:48:35Zby Zhang, Liang-Jie.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61520-684-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61520-684-1</a><br/>Format: Electronic Resources<br/>Handbook of research on computational forensics, digital crime, and investigation methods and solutionsent://SD_ILS/0/SD_ILS:22614832024-09-26T01:48:35Z2024-09-26T01:48:35Zby Li, Chang-Tsun.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-836-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-836-9</a><br/>Format: Electronic Resources<br/>Aus dem Tagebuch eines Bughunters : wie man Softwareschwachstellen aufspürt und behebtent://SD_ILS/0/SD_ILS:22977432024-09-26T01:48:35Z2024-09-26T01:48:35Zby Klein, Tobias.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457169670/?ar">https://go.oreilly.com/library-access/library/view/-/9781457169670/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457169670/?ar">https://learning.oreilly.com/library/view/~/9781457169670/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457169670">https://learning.oreilly.com/library/view/~/9781457169670</a><br/>Format: Electronic Resources<br/>Vulnerability managementent://SD_ILS/0/SD_ILS:22938422024-09-26T01:48:35Z2024-09-26T01:48:35Zby Foreman, Park.<br/><a href="https://learning.oreilly.com/library/view/~/9781439801512">https://learning.oreilly.com/library/view/~/9781439801512</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439801512/?ar">https://go.oreilly.com/library-access/library/view/-/9781439801512/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439801512/?ar">https://learning.oreilly.com/library/view/~/9781439801512/?ar</a><br/>Format: Electronic Resources<br/>ISO27000 and information security : a combined glossaryent://SD_ILS/0/SD_ILS:22999242024-09-26T01:48:35Z2024-09-26T01:48:35Zby Calder, Alan, 1957-<br/><a href="https://learning.oreilly.com/library/view/~/9781849281652/?ar">https://learning.oreilly.com/library/view/~/9781849281652/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849281652/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281652/?ar</a><br/>Format: Electronic Resources<br/>IT induction and information security awareness : a pocket guideent://SD_ILS/0/SD_ILS:22922432024-09-26T01:48:35Z2024-09-26T01:48:35Zby Maddock, Valerie.<br/><a href="https://learning.oreilly.com/library/view/~/9781849281195">https://learning.oreilly.com/library/view/~/9781849281195</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849281195/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281195/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281195/?ar">https://learning.oreilly.com/library/view/~/9781849281195/?ar</a><br/>Format: Electronic Resources<br/>Mac Security Bible.ent://SD_ILS/0/SD_ILS:22877222024-09-26T01:48:35Z2024-09-26T01:48:35Zby Kissell, Joe.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470474198/?ar">https://go.oreilly.com/library-access/library/view/-/9780470474198/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470474198/?ar">https://learning.oreilly.com/library/view/~/9780470474198/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470474198">https://learning.oreilly.com/library/view/~/9780470474198</a><br/>Format: Electronic Resources<br/>Surreptitious software : obfuscation, watermarking, and tamperproofing for software protectionent://SD_ILS/0/SD_ILS:22869822024-09-26T01:48:35Z2024-09-26T01:48:35Zby Collberg, Christian.<br/><a href="https://learning.oreilly.com/library/view/~/9780321591258/?ar">https://learning.oreilly.com/library/view/~/9780321591258/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321591258/?ar">https://go.oreilly.com/library-access/library/view/-/9780321591258/?ar</a><br/>Format: Electronic Resources<br/>System assurance : beyond detecting vulnerabilitiesent://SD_ILS/0/SD_ILS:22903692024-09-26T01:48:35Z2024-09-26T01:48:35Zby Mansourov, Nikolai.<br/><a href="https://learning.oreilly.com/library/view/~/9780123814142">https://learning.oreilly.com/library/view/~/9780123814142</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780123814142/?ar">https://go.oreilly.com/library-access/library/view/-/9780123814142/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780123814142/?ar">https://learning.oreilly.com/library/view/~/9780123814142/?ar</a><br/>Format: Electronic Resources<br/>Seven deadliest Microsoft attacksent://SD_ILS/0/SD_ILS:22898492024-09-26T01:48:35Z2024-09-26T01:48:35Zby Kraus, Rob.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495516/?ar">https://learning.oreilly.com/library/view/~/9781597495516/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495516/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495516/?ar</a><br/>Format: Electronic Resources<br/>Enterprise Mac security : MAC OS X Snow Leopardent://SD_ILS/0/SD_ILS:22904212024-09-26T01:48:35Z2024-09-26T01:48:35Zby Edge, Charles S., Jr.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781430227304/?ar">https://go.oreilly.com/library-access/library/view/-/9781430227304/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430227304/?ar">https://learning.oreilly.com/library/view/~/9781430227304/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430227304">https://learning.oreilly.com/library/view/~/9781430227304</a><br/>Format: Electronic Resources<br/>Cloud security : a comprehensive guide to secure cloud computingent://SD_ILS/0/SD_ILS:22897082024-09-26T01:48:35Z2024-09-26T01:48:35Zby Krutz, Ronald L., 1938-<br/><a href="https://learning.oreilly.com/library/view/~/9780470589878/?ar">https://learning.oreilly.com/library/view/~/9780470589878/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470589878/?ar">https://go.oreilly.com/library-access/library/view/-/9780470589878/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470589878">https://learning.oreilly.com/library/view/~/9780470589878</a><br/>Format: Electronic Resources<br/>