Search Results for - Narrowed by: Computer networks -- Security measures. - 2004SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092004$0025092004$0026ps$003d300?2024-05-31T19:08:11ZWireless operational securityent://SD_ILS/0/SD_ILS:660872024-05-31T19:08:11Z2024-05-31T19:08:11Zby Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583170">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Policy-based network management solutions for the next generationent://SD_ILS/0/SD_ILS:659142024-05-31T19:08:11Z2024-05-31T19:08:11Zby Strassner, John C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558608597">An electronic book accessible through the World Wide Web; click for information</a>
Publisher description <a href="http://www.loc.gov/catdir/description/els031/2003107477.html">http://www.loc.gov/catdir/description/els031/2003107477.html</a><br/>Format: Electronic Resources<br/>Ethereal packet sniffingent://SD_ILS/0/SD_ILS:656452024-05-31T19:08:11Z2024-05-31T19:08:11Zby Orebaugh, Angela.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266825">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>HIGH-TECH CRIMES REVEALED : CYBERWAR STORIES FROM THE DIGITAL FRONTent://SD_ILS/0/SD_ILS:23206882024-05-31T19:08:11Z2024-05-31T19:08:11Zby Branigan, Steven, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321218736/?ar">https://go.oreilly.com/library-access/library/view/-/0321218736/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321218736/?ar">https://learning.oreilly.com/library/view/~/0321218736/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321218736">https://learning.oreilly.com/library/view/~/0321218736</a><br/>Format: Electronic Resources<br/>Internet Denial of Service: Attack and Defense Mechanismsent://SD_ILS/0/SD_ILS:23267952024-05-31T19:08:11Z2024-05-31T19:08:11Zby Mirkovic, Jelena, author.<br/><a href="https://learning.oreilly.com/library/view/~/0131475738/?ar">https://learning.oreilly.com/library/view/~/0131475738/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0131475738/?ar">https://go.oreilly.com/library-access/library/view/-/0131475738/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0131475738">https://learning.oreilly.com/library/view/~/0131475738</a><br/>Format: Electronic Resources<br/>Ethical Hackent://SD_ILS/0/SD_ILS:23262262024-05-31T19:08:11Z2024-05-31T19:08:11Zby Tiller, James S.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780203495414/?ar">https://go.oreilly.com/library-access/library/view/-/9780203495414/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780203495414/?ar">https://learning.oreilly.com/library/view/~/9780203495414/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780203495414">https://learning.oreilly.com/library/view/~/9780203495414</a><br/>Format: Electronic Resources<br/>Mapping security : the corporate security sourcebook for today's global economyent://SD_ILS/0/SD_ILS:23151912024-05-31T19:08:11Z2024-05-31T19:08:11Zby Patterson, Tom.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321304527/?ar">https://go.oreilly.com/library-access/library/view/-/0321304527/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321304527/?ar">https://learning.oreilly.com/library/view/~/0321304527/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321304527">https://learning.oreilly.com/library/view/~/0321304527</a><br/>Format: Electronic Resources<br/>The Tao of Network Security Monitoring Beyond Intrusion Detectionent://SD_ILS/0/SD_ILS:23197682024-05-31T19:08:11Z2024-05-31T19:08:11Zby Bejtlich, Richard, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321246772/?ar">https://go.oreilly.com/library-access/library/view/-/0321246772/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321246772/?ar">https://learning.oreilly.com/library/view/~/0321246772/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321246772">https://learning.oreilly.com/library/view/~/0321246772</a><br/>Format: Electronic Resources<br/>Implementing PKI Services on z/OS.ent://SD_ILS/0/SD_ILS:13102682024-05-31T19:08:11Z2024-05-31T19:08:11Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306877">Click to View</a><br/>Format: Electronic Resources<br/>Code Hacking : A Developer's Guide to Network Security.ent://SD_ILS/0/SD_ILS:13044362024-05-31T19:08:11Z2024-05-31T19:08:11Zby Conway, Richard.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3135681">Click to View</a><br/>Format: Electronic Resources<br/>Managing and securing a Cisco structured wireless-aware networkent://SD_ILS/0/SD_ILS:656852024-05-31T19:08:11Z2024-05-31T19:08:11Zby Wall, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266917">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Hacking the code ASP.NET web application securityent://SD_ILS/0/SD_ILS:657772024-05-31T19:08:11Z2024-05-31T19:08:11Zby Burnett, Mark M.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266658">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Internet Applications : The Emerging Global Computer.ent://SD_ILS/0/SD_ILS:13267472024-05-31T19:08:11Z2024-05-31T19:08:11Zby Patch, Kimberly.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3411450">Click to View</a><br/>Format: Electronic Resources<br/>Ethereal : packet sniffingent://SD_ILS/0/SD_ILS:22813312024-05-31T19:08:11Z2024-05-31T19:08:11Zby Orebaugh, Angela.<br/><a href="https://learning.oreilly.com/library/view/~/9781932266825">https://learning.oreilly.com/library/view/~/9781932266825</a>
<a href="https://www.sciencedirect.com/science/book/9781932266825">https://www.sciencedirect.com/science/book/9781932266825</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781932266825/?ar">https://go.oreilly.com/library-access/library/view/-/9781932266825/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781932266825/?ar">https://learning.oreilly.com/library/view/~/9781932266825/?ar</a><br/>Format: Electronic Resources<br/>Security warriorent://SD_ILS/0/SD_ILS:22839032024-05-31T19:08:11Z2024-05-31T19:08:11Zby Peikari, Cyrus.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596005458/?ar">https://go.oreilly.com/library-access/library/view/-/0596005458/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596005458/?ar">https://learning.oreilly.com/library/view/~/0596005458/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596005458">https://learning.oreilly.com/library/view/~/0596005458</a><br/>Format: Electronic Resources<br/>Securing Web services with WS-Security : demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryptionent://SD_ILS/0/SD_ILS:22816702024-05-31T19:08:11Z2024-05-31T19:08:11Zby Rosenberg, Jonathan B., 1956-<br/><a href="https://go.oreilly.com/library-access/library/view/-/0672326515/?ar">https://go.oreilly.com/library-access/library/view/-/0672326515/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672326515/?ar">https://learning.oreilly.com/library/view/~/0672326515/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672326515">https://learning.oreilly.com/library/view/~/0672326515</a><br/>Format: Electronic Resources<br/>Assessing network securityent://SD_ILS/0/SD_ILS:22817592024-05-31T19:08:11Z2024-05-31T19:08:11Zby Lam, Kevin.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0735620334/?ar">https://go.oreilly.com/library-access/library/view/-/0735620334/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0735620334/?ar">https://learning.oreilly.com/library/view/~/0735620334/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0735620334">https://learning.oreilly.com/library/view/~/0735620334</a><br/>Format: Electronic Resources<br/>Snort 2.1 intrusion detectionent://SD_ILS/0/SD_ILS:22836402024-05-31T19:08:11Z2024-05-31T19:08:11Zby Beale, Jay.<br/><a href="https://www.sciencedirect.com/science/book/9781931836043">https://www.sciencedirect.com/science/book/9781931836043</a>
<a href="https://learning.oreilly.com/library/view/~/9781931836043/?ar">https://learning.oreilly.com/library/view/~/9781931836043/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781931836043/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836043/?ar</a><br/>Format: Electronic Resources<br/>Apache cookbookent://SD_ILS/0/SD_ILS:22843372024-05-31T19:08:11Z2024-05-31T19:08:11Zby Coar, Ken A. L.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596001916/?ar">https://go.oreilly.com/library-access/library/view/-/0596001916/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596001916/?ar">https://learning.oreilly.com/library/view/~/0596001916/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596001916">https://learning.oreilly.com/library/view/~/0596001916</a><br/>Format: Electronic Resources<br/>Network security first-stepent://SD_ILS/0/SD_ILS:22869222024-05-31T19:08:11Z2024-05-31T19:08:11Zby Thomas, Thomas M.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781587203206/?ar">https://go.oreilly.com/library-access/library/view/-/9781587203206/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781587203206/?ar">https://learning.oreilly.com/library/view/~/9781587203206/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781587203206">https://learning.oreilly.com/library/view/~/9781587203206</a><br/>Format: Electronic Resources<br/>Defend I.T. : security by exampleent://SD_ILS/0/SD_ILS:22814962024-05-31T19:08:11Z2024-05-31T19:08:11Zby Gupta, Ajay.<br/><a href="https://learning.oreilly.com/library/view/~/0321197674">https://learning.oreilly.com/library/view/~/0321197674</a>
<a href="https://learning.oreilly.com/library/view/~/0321197674/?ar">https://learning.oreilly.com/library/view/~/0321197674/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0321197674/?ar">https://go.oreilly.com/library-access/library/view/-/0321197674/?ar</a><br/>Format: Electronic Resources<br/>Hacking the code : ASP.NET web application securityent://SD_ILS/0/SD_ILS:22813712024-05-31T19:08:11Z2024-05-31T19:08:11Zby Burnett, Mark (Mark M.)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781932266658/?ar">https://go.oreilly.com/library-access/library/view/-/9781932266658/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781932266658">https://learning.oreilly.com/library/view/~/9781932266658</a>
<a href="https://learning.oreilly.com/library/view/~/9781932266658/?ar">https://learning.oreilly.com/library/view/~/9781932266658/?ar</a>
<a href="https://www.sciencedirect.com/science/book/9781932266658">https://www.sciencedirect.com/science/book/9781932266658</a><br/>Format: Electronic Resources<br/>Network security hacksent://SD_ILS/0/SD_ILS:22813772024-05-31T19:08:11Z2024-05-31T19:08:11Zby Lockhart, Andrew.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596006438/?ar">https://go.oreilly.com/library-access/library/view/-/0596006438/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596006438/?ar">https://learning.oreilly.com/library/view/~/0596006438/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596006438">https://learning.oreilly.com/library/view/~/0596006438</a><br/>Format: Electronic Resources<br/>Network security architecturesent://SD_ILS/0/SD_ILS:22817192024-05-31T19:08:11Z2024-05-31T19:08:11Zby Convery, Sean.<br/><a href="https://learning.oreilly.com/library/view/~/158705115X">https://learning.oreilly.com/library/view/~/158705115X</a>
<a href="https://learning.oreilly.com/library/view/~/158705115X/?ar">https://learning.oreilly.com/library/view/~/158705115X/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/158705115X/?ar">https://go.oreilly.com/library-access/library/view/-/158705115X/?ar</a><br/>Format: Electronic Resources<br/>Securing Windows server 2003ent://SD_ILS/0/SD_ILS:22825522024-05-31T19:08:11Z2024-05-31T19:08:11Zby Danseglio, Mike.<br/><a href="https://learning.oreilly.com/library/view/~/0596006853">https://learning.oreilly.com/library/view/~/0596006853</a>
<a href="https://learning.oreilly.com/library/view/~/0596006853/?ar">https://learning.oreilly.com/library/view/~/0596006853/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596006853/?ar">https://go.oreilly.com/library-access/library/view/-/0596006853/?ar</a><br/>Format: Electronic Resources<br/>CCSP self-study : Cisco secure intrusion detection system (CSIDS)ent://SD_ILS/0/SD_ILS:22831882024-05-31T19:08:11Z2024-05-31T19:08:11Zby Carter, Earl.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1587051443/?ar">https://go.oreilly.com/library-access/library/view/-/1587051443/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587051443/?ar">https://learning.oreilly.com/library/view/~/1587051443/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587051443">https://learning.oreilly.com/library/view/~/1587051443</a><br/>Format: Electronic Resources<br/>Managing security with Snort and IDS toolsent://SD_ILS/0/SD_ILS:22914502024-05-31T19:08:11Z2024-05-31T19:08:11Zby Cox, Kerry.<br/><a href="https://learning.oreilly.com/library/view/~/0596006616">https://learning.oreilly.com/library/view/~/0596006616</a>
<a href="https://learning.oreilly.com/library/view/~/0596006616/?ar">https://learning.oreilly.com/library/view/~/0596006616/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596006616/?ar">https://go.oreilly.com/library-access/library/view/-/0596006616/?ar</a><br/>Format: Electronic Resources<br/>Implementing homeland security for enterprise ITent://SD_ILS/0/SD_ILS:656212024-05-31T19:08:11Z2024-05-31T19:08:11Zby Erbschloe, Michael, 1951-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">An electronic book accessible through the World Wide Web; click for information</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/els051/2003062590.html">http://www.loc.gov/catdir/toc/els051/2003062590.html</a>
Publisher description <a href="http://www.loc.gov/catdir/description/els041/2003062590.html">http://www.loc.gov/catdir/description/els041/2003062590.html</a><br/>Format: Electronic Resources<br/>CYA securing Exchange Server 2003 and Outlook Web Access : cover your a** by getting it right the first timeent://SD_ILS/0/SD_ILS:655782024-05-31T19:08:11Z2024-05-31T19:08:11Zby Walther, Henrik.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836258">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Cyber adversary characterization auditing the hacker mindent://SD_ILS/0/SD_ILS:655792024-05-31T19:08:11Z2024-05-31T19:08:11Zby Parker, Tom, 1982-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836111">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Snort 2.1 intrusion detectionent://SD_ILS/0/SD_ILS:659072024-05-31T19:08:11Z2024-05-31T19:08:11Zby Beale, Jay.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836043">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Security Sage's guide to hardening the network infrastructureent://SD_ILS/0/SD_ILS:659502024-05-31T19:08:11Z2024-05-31T19:08:11Zby Andrâes, Steven.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836012">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>CYA securing Exchange Server 2003 and Outlook Web Access : cover your a** by getting it right the first timeent://SD_ILS/0/SD_ILS:657662024-05-31T19:08:11Z2024-05-31T19:08:11Zby Walther, Henrik.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836241">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Analysis of intrusion prevention methodsent://SD_ILS/0/SD_ILS:474612024-05-31T19:08:11Z2024-05-31T19:08:11Zby Semerci, Hakan.<br/><a href="http://hdl.handle.net/11147/3695">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Security Sage's Guide to Hardening the Network Infrastructure.ent://SD_ILS/0/SD_ILS:11921082024-05-31T19:08:11Z2024-05-31T19:08:11Zby Andres, Steven.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294359">Click to View</a><br/>Format: Electronic Resources<br/>Innocent Code : A Security Wake-Up Call for Web Programmers.ent://SD_ILS/0/SD_ILS:11819202024-05-31T19:08:11Z2024-05-31T19:08:11Zby Huseby, Sverre H.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=210558">Click to View</a><br/>Format: Electronic Resources<br/>Computer Forensics JumpStart.ent://SD_ILS/0/SD_ILS:11871092024-05-31T19:08:11Z2024-05-31T19:08:11Zby Solomon, Micah.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=267268">Click to View</a><br/>Format: Electronic Resources<br/>Implementing SSH : Strategies for Optimizing the Secure Shell.ent://SD_ILS/0/SD_ILS:11820032024-05-31T19:08:11Z2024-05-31T19:08:11Zby Dwivedi, Himanshu.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=215119">Click to View</a><br/>Format: Electronic Resources<br/>Network and security issues.ent://SD_ILS/0/SD_ILS:11911492024-05-31T19:08:11Z2024-05-31T19:08:11Zby Raitt, Dr. David.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=289848">Click to View</a><br/>Format: Electronic Resources<br/>Hacking the Code : Auditor's Guide to Writing Secure Code for the Web.ent://SD_ILS/0/SD_ILS:11920482024-05-31T19:08:11Z2024-05-31T19:08:11Zby Burnett, Mark.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294160">Click to View</a><br/>Format: Electronic Resources<br/>Ethereal Packet Sniffing.ent://SD_ILS/0/SD_ILS:11920282024-05-31T19:08:11Z2024-05-31T19:08:11Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294122">Click to View</a><br/>Format: Electronic Resources<br/>MCSE Designing Security for a Windows Server 2003 Network (Exam 70-298) : Study Guide and DVD Training System.ent://SD_ILS/0/SD_ILS:11920722024-05-31T19:08:11Z2024-05-31T19:08:11Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294253">Click to View</a><br/>Format: Electronic Resources<br/>Configuring NetScreen Firewalls.ent://SD_ILS/0/SD_ILS:11920052024-05-31T19:08:11Z2024-05-31T19:08:11Z<a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294055">Click to View</a><br/>Format: Electronic Resources<br/>Cyber Adversary Characterization : Auditing the Hacker Mind.ent://SD_ILS/0/SD_ILS:11920122024-05-31T19:08:11Z2024-05-31T19:08:11Zby Parker, Tom.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294071">Click to View</a><br/>Format: Electronic Resources<br/>Dr. Tom Shinder's Configuring ISA Server 2004.ent://SD_ILS/0/SD_ILS:11920222024-05-31T19:08:11Z2024-05-31T19:08:11Zby Littlejohn Shinder, Debra.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294094">Click to View</a><br/>Format: Electronic Resources<br/>Nessus Network Auditing : Jay Beale Open Source Security Series.ent://SD_ILS/0/SD_ILS:11920792024-05-31T19:08:11Z2024-05-31T19:08:11Zby Beale, Jay.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294281">Click to View</a><br/>Format: Electronic Resources<br/>