Search Results for - Narrowed by: Computer networks -- Security measures. - 2009
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092009$0025092009$0026ps$003d300?
2024-06-06T20:59:42Z
SQL Injection Attacks and Defense.
ent://SD_ILS/0/SD_ILS:1246118
2024-06-06T20:59:42Z
2024-06-06T20:59:42Z
by Clarke-Salt, Justin.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=953188">Click to View</a><br/>Format: Electronic Resources<br/>
Unauthorised Access : Physical Penetration Testing for IT Security Teams.
ent://SD_ILS/0/SD_ILS:1209903
2024-06-06T20:59:42Z
2024-06-06T20:59:42Z
by Allsopp, Wil.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=470412">Click to View</a><br/>Format: Electronic Resources<br/>
Mac Security Bible.
ent://SD_ILS/0/SD_ILS:1211566
2024-06-06T20:59:42Z
2024-06-06T20:59:42Z
by Kissell, Joe.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=477803">Click to View</a><br/>Format: Electronic Resources<br/>
Security in Ad-Hoc and Sensor Networks.
ent://SD_ILS/0/SD_ILS:1270687
2024-06-06T20:59:42Z
2024-06-06T20:59:42Z
by Beyah, Raheem.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1679353">Click to View</a><br/>Format: Electronic Resources<br/>
Protecting Games : A Security Handbook for Game Developers and Publishers.
ent://SD_ILS/0/SD_ILS:1304877
2024-06-06T20:59:42Z
2024-06-06T20:59:42Z
by Davis, Steven B.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3136139">Click to View</a><br/>Format: Electronic Resources<br/>
SSL and TLS : Theory and Practice.
ent://SD_ILS/0/SD_ILS:1245455
2024-06-06T20:59:42Z
2024-06-06T20:59:42Z
by Oppliger, Rolf.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=946557">Click to View</a><br/>Format: Electronic Resources<br/>
Computer and information security handbook
ent://SD_ILS/0/SD_ILS:2048378
2024-06-06T20:59:42Z
2024-06-06T20:59:42Z
by Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=453166">Click to View</a><br/>Format: Electronic Resources<br/>
Disappearing cryptography : information hiding, steganography & watermarking
ent://SD_ILS/0/SD_ILS:2287580
2024-06-06T20:59:42Z
2024-06-06T20:59:42Z
by Wayner, Peter, 1964-<br/><a href="https://learning.oreilly.com/library/view/~/9780123744791/?ar">https://learning.oreilly.com/library/view/~/9780123744791/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780123744791/?ar">https://go.oreilly.com/library-access/library/view/-/9780123744791/?ar</a><br/>Format: Electronic Resources<br/>
Network security bible
ent://SD_ILS/0/SD_ILS:2288476
2024-06-06T20:59:42Z
2024-06-06T20:59:42Z
by Cole, Eric.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470502495/?ar">https://go.oreilly.com/library-access/library/view/-/9780470502495/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470502495/?ar">https://learning.oreilly.com/library/view/~/9780470502495/?ar</a><br/>Format: Electronic Resources<br/>
Network access control for dummies
ent://SD_ILS/0/SD_ILS:2288733
2024-06-06T20:59:42Z
2024-06-06T20:59:42Z
by Kelley, Jay.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470398678/?ar">https://go.oreilly.com/library-access/library/view/-/9780470398678/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470398678/?ar">https://learning.oreilly.com/library/view/~/9780470398678/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470398678">https://learning.oreilly.com/library/view/~/9780470398678</a><br/>Format: Electronic Resources<br/>
Apache : receptury
ent://SD_ILS/0/SD_ILS:2296868
2024-06-06T20:59:42Z
2024-06-06T20:59:42Z
by Bowen, Richard Cooper, 1971-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457176425/?ar">https://go.oreilly.com/library-access/library/view/-/9781457176425/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457176425/?ar">https://learning.oreilly.com/library/view/~/9781457176425/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457176425">https://learning.oreilly.com/library/view/~/9781457176425</a><br/>Format: Electronic Resources<br/>
Statistical techniques for network security modern statistically-based intrusion detection and protection
ent://SD_ILS/0/SD_ILS:2261939
2024-06-06T20:59:42Z
2024-06-06T20:59:42Z
by Wang, Yun.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-708-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-708-9</a><br/>Format: Electronic Resources<br/>
Socioeconomic and legal implications of electronic intrusion
ent://SD_ILS/0/SD_ILS:2261928
2024-06-06T20:59:42Z
2024-06-06T20:59:42Z
by Politis, Dionysios.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-204-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-204-6</a><br/>Format: Electronic Resources<br/>
Cyber-security and global information assurance threat analysis and response solutions
ent://SD_ILS/0/SD_ILS:2261272
2024-06-06T20:59:42Z
2024-06-06T20:59:42Z
by Knapp, Kenneth J.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-326-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-326-5</a><br/>Format: Electronic Resources<br/>
CCSP SNAF quick reference
ent://SD_ILS/0/SD_ILS:2285270
2024-06-06T20:59:42Z
2024-06-06T20:59:42Z
by Mason, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9781587058691/?ar">https://learning.oreilly.com/library/view/~/9781587058691/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781587058691">https://learning.oreilly.com/library/view/~/9781587058691</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781587058691/?ar">https://go.oreilly.com/library-access/library/view/-/9781587058691/?ar</a><br/>Format: Electronic Resources<br/>
Cisco router and switch forensics : investigating and analyzing malicious network activity
ent://SD_ILS/0/SD_ILS:2287180
2024-06-06T20:59:42Z
2024-06-06T20:59:42Z
by Liu, Dale.<br/><a href="https://learning.oreilly.com/library/view/~/9781597494182">https://learning.oreilly.com/library/view/~/9781597494182</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494182/?ar">https://learning.oreilly.com/library/view/~/9781597494182/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597494182/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494182/?ar</a><br/>Format: Electronic Resources<br/>
Windows lockdown! : your XP and Vista guide against hacks, attacks, and other Internet mayhem
ent://SD_ILS/0/SD_ILS:2285580
2024-06-06T20:59:42Z
2024-06-06T20:59:42Z
by Walker, Andy (Andy G.), 1967-<br/><a href="https://learning.oreilly.com/library/view/~/9780789736727">https://learning.oreilly.com/library/view/~/9780789736727</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780789736727/?ar">https://go.oreilly.com/library-access/library/view/-/9780789736727/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780789736727/?ar">https://learning.oreilly.com/library/view/~/9780789736727/?ar</a><br/>Format: Electronic Resources<br/>
Hacking VoIP
ent://SD_ILS/0/SD_ILS:2285825
2024-06-06T20:59:42Z
2024-06-06T20:59:42Z
by Dwivedi, Himanshu.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781593271633/?ar">https://go.oreilly.com/library-access/library/view/-/9781593271633/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781593271633/?ar">https://learning.oreilly.com/library/view/~/9781593271633/?ar</a><br/>Format: Electronic Resources<br/>
Windows forensic analysis DVD toolkit 2E
ent://SD_ILS/0/SD_ILS:2287802
2024-06-06T20:59:42Z
2024-06-06T20:59:42Z
by Carvey, Harlan A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494229/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494229/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494229/?ar">https://learning.oreilly.com/library/view/~/9781597494229/?ar</a><br/>Format: Electronic Resources<br/>
Unauthorised access : physical penetration testing for IT security teams
ent://SD_ILS/0/SD_ILS:2288452
2024-06-06T20:59:42Z
2024-06-06T20:59:42Z
by Allsopp, Wil.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470747612/?ar">https://go.oreilly.com/library-access/library/view/-/9780470747612/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470747612/?ar">https://learning.oreilly.com/library/view/~/9780470747612/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470747612">https://learning.oreilly.com/library/view/~/9780470747612</a><br/>Format: Electronic Resources<br/>
GFI network security and PCI compliance power tools
ent://SD_ILS/0/SD_ILS:2286159
2024-06-06T20:59:42Z
2024-06-06T20:59:42Z
by Posey, Brien.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492850/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492850/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492850/?ar">https://learning.oreilly.com/library/view/~/9781597492850/?ar</a><br/>Format: Electronic Resources<br/>
Cloud security and privacy
ent://SD_ILS/0/SD_ILS:2287451
2024-06-06T20:59:42Z
2024-06-06T20:59:42Z
by Mather, Tim.<br/><a href="https://learning.oreilly.com/library/view/~/9780596806453/?ar">https://learning.oreilly.com/library/view/~/9780596806453/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780596806453/?ar">https://go.oreilly.com/library-access/library/view/-/9780596806453/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596806453">https://learning.oreilly.com/library/view/~/9780596806453</a><br/>Format: Electronic Resources<br/>
Hacking : the next generation
ent://SD_ILS/0/SD_ILS:2286898
2024-06-06T20:59:42Z
2024-06-06T20:59:42Z
by Dhanjani, Nitesh.<br/><a href="https://learning.oreilly.com/library/view/~/9780596806309">https://learning.oreilly.com/library/view/~/9780596806309</a>
<a href="https://learning.oreilly.com/library/view/~/9780596806309/?ar">https://learning.oreilly.com/library/view/~/9780596806309/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780596806309/?ar">https://go.oreilly.com/library-access/library/view/-/9780596806309/?ar</a><br/>Format: Electronic Resources<br/>
Computer and information security handbook
ent://SD_ILS/0/SD_ILS:2286804
2024-06-06T20:59:42Z
2024-06-06T20:59:42Z
by Vacca, John R.<br/><a href="https://learning.oreilly.com/library/view/~/9780080921945">https://learning.oreilly.com/library/view/~/9780080921945</a>
<a href="https://learning.oreilly.com/library/view/~/9780080921945/?ar">https://learning.oreilly.com/library/view/~/9780080921945/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780080921945/?ar">https://go.oreilly.com/library-access/library/view/-/9780080921945/?ar</a><br/>Format: Electronic Resources<br/>
Chained exploits : advanced hacking attacks from start to finish
ent://SD_ILS/0/SD_ILS:2286103
2024-06-06T20:59:42Z
2024-06-06T20:59:42Z
by Whitaker, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9780321620637">https://learning.oreilly.com/library/view/~/9780321620637</a>
<a href="https://learning.oreilly.com/library/view/~/9780321620637/?ar">https://learning.oreilly.com/library/view/~/9780321620637/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321620637/?ar">https://go.oreilly.com/library-access/library/view/-/9780321620637/?ar</a><br/>Format: Electronic Resources<br/>
Cisco CCSP SNRS quick reference
ent://SD_ILS/0/SD_ILS:2287704
2024-06-06T20:59:42Z
2024-06-06T20:59:42Z
by Mason, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9781587059063/?ar">https://learning.oreilly.com/library/view/~/9781587059063/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781587059063">https://learning.oreilly.com/library/view/~/9781587059063</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781587059063/?ar">https://go.oreilly.com/library-access/library/view/-/9781587059063/?ar</a><br/>Format: Electronic Resources<br/>
Applied security visualization
ent://SD_ILS/0/SD_ILS:2285492
2024-06-06T20:59:42Z
2024-06-06T20:59:42Z
by Marty, Raffael, 1976-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321585530/?ar">https://go.oreilly.com/library-access/library/view/-/9780321585530/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321585530/?ar">https://learning.oreilly.com/library/view/~/9780321585530/?ar</a><br/>Format: Electronic Resources<br/>
CCSP SNAA quick reference
ent://SD_ILS/0/SD_ILS:2285830
2024-06-06T20:59:42Z
2024-06-06T20:59:42Z
by Lindfield, Ryan.<br/><a href="https://learning.oreilly.com/library/view/~/9781587058943/?ar">https://learning.oreilly.com/library/view/~/9781587058943/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781587058943/?ar">https://go.oreilly.com/library-access/library/view/-/9781587058943/?ar</a><br/>Format: Electronic Resources<br/>
Next generation SSH2 implementation : securing data in motion
ent://SD_ILS/0/SD_ILS:2285986
2024-06-06T20:59:42Z
2024-06-06T20:59:42Z
by Liu, Dale.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492836/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492836/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492836/?ar">https://learning.oreilly.com/library/view/~/9781597492836/?ar</a><br/>Format: Electronic Resources<br/>
Implementing Cisco IOS network security (IINS)
ent://SD_ILS/0/SD_ILS:2286761
2024-06-06T20:59:42Z
2024-06-06T20:59:42Z
by Paquet, Catherine.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781587058813/?ar">https://go.oreilly.com/library-access/library/view/-/9781587058813/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781587058813/?ar">https://learning.oreilly.com/library/view/~/9781587058813/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781587058813">https://learning.oreilly.com/library/view/~/9781587058813</a><br/>Format: Electronic Resources<br/>
IPv6 security
ent://SD_ILS/0/SD_ILS:2286769
2024-06-06T20:59:42Z
2024-06-06T20:59:42Z
by Hogg, Scott.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781587058387/?ar">https://go.oreilly.com/library-access/library/view/-/9781587058387/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781587058387/?ar">https://learning.oreilly.com/library/view/~/9781587058387/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781587058387">https://learning.oreilly.com/library/view/~/9781587058387</a><br/>Format: Electronic Resources<br/>
Googling security : how much does Google know about you?
ent://SD_ILS/0/SD_ILS:2285350
2024-06-06T20:59:42Z
2024-06-06T20:59:42Z
by Conti, Greg.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321591265/?ar">https://go.oreilly.com/library-access/library/view/-/9780321591265/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321591265/?ar">https://learning.oreilly.com/library/view/~/9780321591265/?ar</a><br/>Format: Electronic Resources<br/>
Beautiful security
ent://SD_ILS/0/SD_ILS:2286888
2024-06-06T20:59:42Z
2024-06-06T20:59:42Z
by Oram, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/9780596801786/?ar">https://learning.oreilly.com/library/view/~/9780596801786/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596801786">https://learning.oreilly.com/library/view/~/9780596801786</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780596801786/?ar">https://go.oreilly.com/library-access/library/view/-/9780596801786/?ar</a><br/>Format: Electronic Resources<br/>
Security in wireless ad hoc and sensor networks
ent://SD_ILS/0/SD_ILS:2285854
2024-06-06T20:59:42Z
2024-06-06T20:59:42Z
by Çayirci, E. (Erdal)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470027486/?ar">https://go.oreilly.com/library-access/library/view/-/9780470027486/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470027486/?ar">https://learning.oreilly.com/library/view/~/9780470027486/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470027486">https://learning.oreilly.com/library/view/~/9780470027486</a><br/>Format: Electronic Resources<br/>
Security monitoring
ent://SD_ILS/0/SD_ILS:2286050
2024-06-06T20:59:42Z
2024-06-06T20:59:42Z
by Fry, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/9780596157944/?ar">https://learning.oreilly.com/library/view/~/9780596157944/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596157944">https://learning.oreilly.com/library/view/~/9780596157944</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780596157944/?ar">https://go.oreilly.com/library-access/library/view/-/9780596157944/?ar</a><br/>Format: Electronic Resources<br/>
Cisco secure firewall services module (FWSM)
ent://SD_ILS/0/SD_ILS:2285484
2024-06-06T20:59:42Z
2024-06-06T20:59:42Z
by Blair, Ray, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9781587056093">https://learning.oreilly.com/library/view/~/9781587056093</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781587056093/?ar">https://go.oreilly.com/library-access/library/view/-/9781587056093/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781587056093/?ar">https://learning.oreilly.com/library/view/~/9781587056093/?ar</a><br/>Format: Electronic Resources<br/>
The Prompt Payment Act Answer Book
ent://SD_ILS/0/SD_ILS:2315263
2024-06-06T20:59:42Z
2024-06-06T20:59:42Z
by Arnold, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781567263336">https://learning.oreilly.com/library/view/~/9781567263336</a>
<a href="https://learning.oreilly.com/library/view/~/9781567263336/?ar">https://learning.oreilly.com/library/view/~/9781567263336/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781567263336/?ar">https://go.oreilly.com/library-access/library/view/-/9781567263336/?ar</a><br/>Format: Electronic Resources<br/>
The Antideficiency Act Answer Book
ent://SD_ILS/0/SD_ILS:2315273
2024-06-06T20:59:42Z
2024-06-06T20:59:42Z
by Arnold, William, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781567263343/?ar">https://learning.oreilly.com/library/view/~/9781567263343/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781567263343">https://learning.oreilly.com/library/view/~/9781567263343</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781567263343/?ar">https://go.oreilly.com/library-access/library/view/-/9781567263343/?ar</a><br/>Format: Electronic Resources<br/>
Microsoft
ent://SD_ILS/0/SD_ILS:2321069
2024-06-06T20:59:42Z
2024-06-06T20:59:42Z
by Miller, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780768695311">https://learning.oreilly.com/library/view/~/9780768695311</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780768695311/?ar">https://go.oreilly.com/library-access/library/view/-/9780768695311/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780768695311/?ar">https://learning.oreilly.com/library/view/~/9780768695311/?ar</a><br/>Format: Electronic Resources<br/>