Search Results for - Narrowed by: Computer networks -- Security measures. - 2009 SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092009$0025092009$0026ps$003d300? 2024-06-06T20:59:42Z SQL Injection Attacks and Defense. ent://SD_ILS/0/SD_ILS:1246118 2024-06-06T20:59:42Z 2024-06-06T20:59:42Z by&#160;Clarke-Salt, Justin.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=953188">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Unauthorised Access : Physical Penetration Testing for IT Security Teams. ent://SD_ILS/0/SD_ILS:1209903 2024-06-06T20:59:42Z 2024-06-06T20:59:42Z by&#160;Allsopp, Wil.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=470412">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mac Security Bible. ent://SD_ILS/0/SD_ILS:1211566 2024-06-06T20:59:42Z 2024-06-06T20:59:42Z by&#160;Kissell, Joe.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=477803">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security in Ad-Hoc and Sensor Networks. ent://SD_ILS/0/SD_ILS:1270687 2024-06-06T20:59:42Z 2024-06-06T20:59:42Z by&#160;Beyah, Raheem.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1679353">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Protecting Games : A Security Handbook for Game Developers and Publishers. ent://SD_ILS/0/SD_ILS:1304877 2024-06-06T20:59:42Z 2024-06-06T20:59:42Z by&#160;Davis, Steven B.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3136139">Click to View</a><br/>Format:&#160;Electronic Resources<br/> SSL and TLS : Theory and Practice. ent://SD_ILS/0/SD_ILS:1245455 2024-06-06T20:59:42Z 2024-06-06T20:59:42Z by&#160;Oppliger, Rolf.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=946557">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:2048378 2024-06-06T20:59:42Z 2024-06-06T20:59:42Z by&#160;Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=453166">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Disappearing cryptography : information hiding, steganography &amp; watermarking ent://SD_ILS/0/SD_ILS:2287580 2024-06-06T20:59:42Z 2024-06-06T20:59:42Z by&#160;Wayner, Peter, 1964-<br/><a href="https://learning.oreilly.com/library/view/~/9780123744791/?ar">https://learning.oreilly.com/library/view/~/9780123744791/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780123744791/?ar">https://go.oreilly.com/library-access/library/view/-/9780123744791/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network security bible ent://SD_ILS/0/SD_ILS:2288476 2024-06-06T20:59:42Z 2024-06-06T20:59:42Z by&#160;Cole, Eric.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470502495/?ar">https://go.oreilly.com/library-access/library/view/-/9780470502495/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470502495/?ar">https://learning.oreilly.com/library/view/~/9780470502495/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network access control for dummies ent://SD_ILS/0/SD_ILS:2288733 2024-06-06T20:59:42Z 2024-06-06T20:59:42Z by&#160;Kelley, Jay.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470398678/?ar">https://go.oreilly.com/library-access/library/view/-/9780470398678/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470398678/?ar">https://learning.oreilly.com/library/view/~/9780470398678/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470398678">https://learning.oreilly.com/library/view/~/9780470398678</a><br/>Format:&#160;Electronic Resources<br/> Apache : receptury ent://SD_ILS/0/SD_ILS:2296868 2024-06-06T20:59:42Z 2024-06-06T20:59:42Z by&#160;Bowen, Richard Cooper, 1971-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457176425/?ar">https://go.oreilly.com/library-access/library/view/-/9781457176425/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457176425/?ar">https://learning.oreilly.com/library/view/~/9781457176425/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457176425">https://learning.oreilly.com/library/view/~/9781457176425</a><br/>Format:&#160;Electronic Resources<br/> Statistical techniques for network security modern statistically-based intrusion detection and protection ent://SD_ILS/0/SD_ILS:2261939 2024-06-06T20:59:42Z 2024-06-06T20:59:42Z by&#160;Wang, Yun.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-708-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-708-9</a><br/>Format:&#160;Electronic Resources<br/> Socioeconomic and legal implications of electronic intrusion ent://SD_ILS/0/SD_ILS:2261928 2024-06-06T20:59:42Z 2024-06-06T20:59:42Z by&#160;Politis, Dionysios.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-204-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-204-6</a><br/>Format:&#160;Electronic Resources<br/> Cyber-security and global information assurance threat analysis and response solutions ent://SD_ILS/0/SD_ILS:2261272 2024-06-06T20:59:42Z 2024-06-06T20:59:42Z by&#160;Knapp, Kenneth J.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-326-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-326-5</a><br/>Format:&#160;Electronic Resources<br/> CCSP SNAF quick reference ent://SD_ILS/0/SD_ILS:2285270 2024-06-06T20:59:42Z 2024-06-06T20:59:42Z by&#160;Mason, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9781587058691/?ar">https://learning.oreilly.com/library/view/~/9781587058691/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781587058691">https://learning.oreilly.com/library/view/~/9781587058691</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781587058691/?ar">https://go.oreilly.com/library-access/library/view/-/9781587058691/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cisco router and switch forensics : investigating and analyzing malicious network activity ent://SD_ILS/0/SD_ILS:2287180 2024-06-06T20:59:42Z 2024-06-06T20:59:42Z by&#160;Liu, Dale.<br/><a href="https://learning.oreilly.com/library/view/~/9781597494182">https://learning.oreilly.com/library/view/~/9781597494182</a> <a href="https://learning.oreilly.com/library/view/~/9781597494182/?ar">https://learning.oreilly.com/library/view/~/9781597494182/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597494182/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494182/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows lockdown! : your XP and Vista guide against hacks, attacks, and other Internet mayhem ent://SD_ILS/0/SD_ILS:2285580 2024-06-06T20:59:42Z 2024-06-06T20:59:42Z by&#160;Walker, Andy (Andy G.), 1967-<br/><a href="https://learning.oreilly.com/library/view/~/9780789736727">https://learning.oreilly.com/library/view/~/9780789736727</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780789736727/?ar">https://go.oreilly.com/library-access/library/view/-/9780789736727/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780789736727/?ar">https://learning.oreilly.com/library/view/~/9780789736727/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking VoIP ent://SD_ILS/0/SD_ILS:2285825 2024-06-06T20:59:42Z 2024-06-06T20:59:42Z by&#160;Dwivedi, Himanshu.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781593271633/?ar">https://go.oreilly.com/library-access/library/view/-/9781593271633/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781593271633/?ar">https://learning.oreilly.com/library/view/~/9781593271633/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows forensic analysis DVD toolkit 2E ent://SD_ILS/0/SD_ILS:2287802 2024-06-06T20:59:42Z 2024-06-06T20:59:42Z by&#160;Carvey, Harlan A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494229/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494229/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597494229/?ar">https://learning.oreilly.com/library/view/~/9781597494229/?ar</a><br/>Format:&#160;Electronic Resources<br/> Unauthorised access : physical penetration testing for IT security teams ent://SD_ILS/0/SD_ILS:2288452 2024-06-06T20:59:42Z 2024-06-06T20:59:42Z by&#160;Allsopp, Wil.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470747612/?ar">https://go.oreilly.com/library-access/library/view/-/9780470747612/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470747612/?ar">https://learning.oreilly.com/library/view/~/9780470747612/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470747612">https://learning.oreilly.com/library/view/~/9780470747612</a><br/>Format:&#160;Electronic Resources<br/> GFI network security and PCI compliance power tools ent://SD_ILS/0/SD_ILS:2286159 2024-06-06T20:59:42Z 2024-06-06T20:59:42Z by&#160;Posey, Brien.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492850/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492850/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492850/?ar">https://learning.oreilly.com/library/view/~/9781597492850/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud security and privacy ent://SD_ILS/0/SD_ILS:2287451 2024-06-06T20:59:42Z 2024-06-06T20:59:42Z by&#160;Mather, Tim.<br/><a href="https://learning.oreilly.com/library/view/~/9780596806453/?ar">https://learning.oreilly.com/library/view/~/9780596806453/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780596806453/?ar">https://go.oreilly.com/library-access/library/view/-/9780596806453/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780596806453">https://learning.oreilly.com/library/view/~/9780596806453</a><br/>Format:&#160;Electronic Resources<br/> Hacking : the next generation ent://SD_ILS/0/SD_ILS:2286898 2024-06-06T20:59:42Z 2024-06-06T20:59:42Z by&#160;Dhanjani, Nitesh.<br/><a href="https://learning.oreilly.com/library/view/~/9780596806309">https://learning.oreilly.com/library/view/~/9780596806309</a> <a href="https://learning.oreilly.com/library/view/~/9780596806309/?ar">https://learning.oreilly.com/library/view/~/9780596806309/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780596806309/?ar">https://go.oreilly.com/library-access/library/view/-/9780596806309/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:2286804 2024-06-06T20:59:42Z 2024-06-06T20:59:42Z by&#160;Vacca, John R.<br/><a href="https://learning.oreilly.com/library/view/~/9780080921945">https://learning.oreilly.com/library/view/~/9780080921945</a> <a href="https://learning.oreilly.com/library/view/~/9780080921945/?ar">https://learning.oreilly.com/library/view/~/9780080921945/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780080921945/?ar">https://go.oreilly.com/library-access/library/view/-/9780080921945/?ar</a><br/>Format:&#160;Electronic Resources<br/> Chained exploits : advanced hacking attacks from start to finish ent://SD_ILS/0/SD_ILS:2286103 2024-06-06T20:59:42Z 2024-06-06T20:59:42Z by&#160;Whitaker, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9780321620637">https://learning.oreilly.com/library/view/~/9780321620637</a> <a href="https://learning.oreilly.com/library/view/~/9780321620637/?ar">https://learning.oreilly.com/library/view/~/9780321620637/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321620637/?ar">https://go.oreilly.com/library-access/library/view/-/9780321620637/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cisco CCSP SNRS quick reference ent://SD_ILS/0/SD_ILS:2287704 2024-06-06T20:59:42Z 2024-06-06T20:59:42Z by&#160;Mason, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9781587059063/?ar">https://learning.oreilly.com/library/view/~/9781587059063/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781587059063">https://learning.oreilly.com/library/view/~/9781587059063</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781587059063/?ar">https://go.oreilly.com/library-access/library/view/-/9781587059063/?ar</a><br/>Format:&#160;Electronic Resources<br/> Applied security visualization ent://SD_ILS/0/SD_ILS:2285492 2024-06-06T20:59:42Z 2024-06-06T20:59:42Z by&#160;Marty, Raffael, 1976-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321585530/?ar">https://go.oreilly.com/library-access/library/view/-/9780321585530/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780321585530/?ar">https://learning.oreilly.com/library/view/~/9780321585530/?ar</a><br/>Format:&#160;Electronic Resources<br/> CCSP SNAA quick reference ent://SD_ILS/0/SD_ILS:2285830 2024-06-06T20:59:42Z 2024-06-06T20:59:42Z by&#160;Lindfield, Ryan.<br/><a href="https://learning.oreilly.com/library/view/~/9781587058943/?ar">https://learning.oreilly.com/library/view/~/9781587058943/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781587058943/?ar">https://go.oreilly.com/library-access/library/view/-/9781587058943/?ar</a><br/>Format:&#160;Electronic Resources<br/> Next generation SSH2 implementation : securing data in motion ent://SD_ILS/0/SD_ILS:2285986 2024-06-06T20:59:42Z 2024-06-06T20:59:42Z by&#160;Liu, Dale.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492836/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492836/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492836/?ar">https://learning.oreilly.com/library/view/~/9781597492836/?ar</a><br/>Format:&#160;Electronic Resources<br/> Implementing Cisco IOS network security (IINS) ent://SD_ILS/0/SD_ILS:2286761 2024-06-06T20:59:42Z 2024-06-06T20:59:42Z by&#160;Paquet, Catherine.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781587058813/?ar">https://go.oreilly.com/library-access/library/view/-/9781587058813/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781587058813/?ar">https://learning.oreilly.com/library/view/~/9781587058813/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781587058813">https://learning.oreilly.com/library/view/~/9781587058813</a><br/>Format:&#160;Electronic Resources<br/> IPv6 security ent://SD_ILS/0/SD_ILS:2286769 2024-06-06T20:59:42Z 2024-06-06T20:59:42Z by&#160;Hogg, Scott.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781587058387/?ar">https://go.oreilly.com/library-access/library/view/-/9781587058387/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781587058387/?ar">https://learning.oreilly.com/library/view/~/9781587058387/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781587058387">https://learning.oreilly.com/library/view/~/9781587058387</a><br/>Format:&#160;Electronic Resources<br/> Googling security : how much does Google know about you? ent://SD_ILS/0/SD_ILS:2285350 2024-06-06T20:59:42Z 2024-06-06T20:59:42Z by&#160;Conti, Greg.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321591265/?ar">https://go.oreilly.com/library-access/library/view/-/9780321591265/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780321591265/?ar">https://learning.oreilly.com/library/view/~/9780321591265/?ar</a><br/>Format:&#160;Electronic Resources<br/> Beautiful security ent://SD_ILS/0/SD_ILS:2286888 2024-06-06T20:59:42Z 2024-06-06T20:59:42Z by&#160;Oram, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9780596801786/?ar">https://learning.oreilly.com/library/view/~/9780596801786/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780596801786">https://learning.oreilly.com/library/view/~/9780596801786</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780596801786/?ar">https://go.oreilly.com/library-access/library/view/-/9780596801786/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security in wireless ad hoc and sensor networks ent://SD_ILS/0/SD_ILS:2285854 2024-06-06T20:59:42Z 2024-06-06T20:59:42Z by&#160;&Ccedil;ayirci, E. (Erdal)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470027486/?ar">https://go.oreilly.com/library-access/library/view/-/9780470027486/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470027486/?ar">https://learning.oreilly.com/library/view/~/9780470027486/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470027486">https://learning.oreilly.com/library/view/~/9780470027486</a><br/>Format:&#160;Electronic Resources<br/> Security monitoring ent://SD_ILS/0/SD_ILS:2286050 2024-06-06T20:59:42Z 2024-06-06T20:59:42Z by&#160;Fry, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/9780596157944/?ar">https://learning.oreilly.com/library/view/~/9780596157944/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780596157944">https://learning.oreilly.com/library/view/~/9780596157944</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780596157944/?ar">https://go.oreilly.com/library-access/library/view/-/9780596157944/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cisco secure firewall services module (FWSM) ent://SD_ILS/0/SD_ILS:2285484 2024-06-06T20:59:42Z 2024-06-06T20:59:42Z by&#160;Blair, Ray, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9781587056093">https://learning.oreilly.com/library/view/~/9781587056093</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781587056093/?ar">https://go.oreilly.com/library-access/library/view/-/9781587056093/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781587056093/?ar">https://learning.oreilly.com/library/view/~/9781587056093/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Prompt Payment Act Answer Book ent://SD_ILS/0/SD_ILS:2315263 2024-06-06T20:59:42Z 2024-06-06T20:59:42Z by&#160;Arnold, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781567263336">https://learning.oreilly.com/library/view/~/9781567263336</a> <a href="https://learning.oreilly.com/library/view/~/9781567263336/?ar">https://learning.oreilly.com/library/view/~/9781567263336/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781567263336/?ar">https://go.oreilly.com/library-access/library/view/-/9781567263336/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Antideficiency Act Answer Book ent://SD_ILS/0/SD_ILS:2315273 2024-06-06T20:59:42Z 2024-06-06T20:59:42Z by&#160;Arnold, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781567263343/?ar">https://learning.oreilly.com/library/view/~/9781567263343/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781567263343">https://learning.oreilly.com/library/view/~/9781567263343</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781567263343/?ar">https://go.oreilly.com/library-access/library/view/-/9781567263343/?ar</a><br/>Format:&#160;Electronic Resources<br/> Microsoft ent://SD_ILS/0/SD_ILS:2321069 2024-06-06T20:59:42Z 2024-06-06T20:59:42Z by&#160;Miller, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780768695311">https://learning.oreilly.com/library/view/~/9780768695311</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780768695311/?ar">https://go.oreilly.com/library-access/library/view/-/9780768695311/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780768695311/?ar">https://learning.oreilly.com/library/view/~/9780768695311/?ar</a><br/>Format:&#160;Electronic Resources<br/>