Search Results for - Narrowed by: Computer networks -- Security measures. - Computer security -- Evaluation. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002b--$002bEvaluation.$002509Computer$002bsecurity$002b--$002bEvaluation.$0026ps$003d300$0026isd$003dtrue? 2024-06-16T16:49:05Z The network security test lab : a step-by-step guide ent://SD_ILS/0/SD_ILS:2308043 2024-06-16T16:49:05Z 2024-06-16T16:49:05Z by&#160;Gregg, Michael (Michael C.), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118987056/?ar">https://learning.oreilly.com/library/view/~/9781118987056/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118987056/?ar">https://go.oreilly.com/library-access/library/view/-/9781118987056/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118987056">https://learning.oreilly.com/library/view/~/9781118987056</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing : protecting networks and systems ent://SD_ILS/0/SD_ILS:2295898 2024-06-16T16:49:05Z 2024-06-16T16:49:05Z by&#160;Henry, Kevin M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849283731">https://learning.oreilly.com/library/view/~/9781849283731</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849283731/?ar">https://go.oreilly.com/library-access/library/view/-/9781849283731/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849283731/?ar">https://learning.oreilly.com/library/view/~/9781849283731/?ar</a><br/>Format:&#160;Electronic Resources<br/> BackTrack 4 Assuring Security by Penetration Testing : Assuring Security by Penetration Testing. ent://SD_ILS/0/SD_ILS:1245823 2024-06-16T16:49:05Z 2024-06-16T16:49:05Z by&#160;Ali, Shakeel.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=950518">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security monitoring with Cisco security MARS ent://SD_ILS/0/SD_ILS:2283784 2024-06-16T16:49:05Z 2024-06-16T16:49:05Z by&#160;Halleen, Gary.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781587052705/?ar">https://go.oreilly.com/library-access/library/view/-/9781587052705/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781587052705/?ar">https://learning.oreilly.com/library/view/~/9781587052705/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781587052705">https://learning.oreilly.com/library/view/~/9781587052705</a><br/>Format:&#160;Electronic Resources<br/> Penetration testing and network defense ent://SD_ILS/0/SD_ILS:2282015 2024-06-16T16:49:05Z 2024-06-16T16:49:05Z by&#160;Whitaker, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/1587052083/?ar">https://learning.oreilly.com/library/view/~/1587052083/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1587052083">https://learning.oreilly.com/library/view/~/1587052083</a> <a href="https://go.oreilly.com/library-access/library/view/-/1587052083/?ar">https://go.oreilly.com/library-access/library/view/-/1587052083/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security threat mitigation and response : understanding Cisco security MARS ent://SD_ILS/0/SD_ILS:2282999 2024-06-16T16:49:05Z 2024-06-16T16:49:05Z by&#160;Tesch, Dale.<br/><a href="https://learning.oreilly.com/library/view/~/1587052601">https://learning.oreilly.com/library/view/~/1587052601</a> <a href="https://go.oreilly.com/library-access/library/view/-/1587052601/?ar">https://go.oreilly.com/library-access/library/view/-/1587052601/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1587052601/?ar">https://learning.oreilly.com/library/view/~/1587052601/?ar</a><br/>Format:&#160;Electronic Resources<br/>