Search Results for - Narrowed by: 2011 - Computer networks -- Security measures. - Hackers. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092011$0025092011$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Hackers.$002509Hackers.$0026ps$003d300? 2024-06-23T21:11:32Z Honeypot : a new paradigm to information security ent://SD_ILS/0/SD_ILS:2292506 2024-06-23T21:11:32Z 2024-06-23T21:11:32Z by&#160;Joshi, R. C.<br/><a href="https://learning.oreilly.com/library/view/~/9781578087082">https://learning.oreilly.com/library/view/~/9781578087082</a> <a href="https://learning.oreilly.com/library/view/~/9781578087082/?ar">https://learning.oreilly.com/library/view/~/9781578087082/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781578087082/?ar">https://go.oreilly.com/library-access/library/view/-/9781578087082/?ar</a><br/>Format:&#160;Electronic Resources<br/> Preventing good people from doing bad things : implementing least privilege ent://SD_ILS/0/SD_ILS:2293278 2024-06-23T21:11:32Z 2024-06-23T21:11:32Z by&#160;Mutch, John.<br/><a href="https://learning.oreilly.com/library/view/~/9781430239215/?ar">https://learning.oreilly.com/library/view/~/9781430239215/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781430239215/?ar">https://go.oreilly.com/library-access/library/view/-/9781430239215/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781430239215">https://learning.oreilly.com/library/view/~/9781430239215</a><br/>Format:&#160;Electronic Resources<br/>