Search Results for - Narrowed by: Computer networks -- Security measures. - Computer security -- Evaluation.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002b--$002bEvaluation.$002509Computer$002bsecurity$002b--$002bEvaluation.$0026ps$003d300$0026isd$003dtrue?
2024-06-16T16:49:05Z
The network security test lab : a step-by-step guide
ent://SD_ILS/0/SD_ILS:2308043
2024-06-16T16:49:05Z
2024-06-16T16:49:05Z
by Gregg, Michael (Michael C.), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781118987056/?ar">https://learning.oreilly.com/library/view/~/9781118987056/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118987056/?ar">https://go.oreilly.com/library-access/library/view/-/9781118987056/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118987056">https://learning.oreilly.com/library/view/~/9781118987056</a><br/>Format: Electronic Resources<br/>
Penetration testing : protecting networks and systems
ent://SD_ILS/0/SD_ILS:2295898
2024-06-16T16:49:05Z
2024-06-16T16:49:05Z
by Henry, Kevin M., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849283731">https://learning.oreilly.com/library/view/~/9781849283731</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849283731/?ar">https://go.oreilly.com/library-access/library/view/-/9781849283731/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849283731/?ar">https://learning.oreilly.com/library/view/~/9781849283731/?ar</a><br/>Format: Electronic Resources<br/>
BackTrack 4 Assuring Security by Penetration Testing : Assuring Security by Penetration Testing.
ent://SD_ILS/0/SD_ILS:1245823
2024-06-16T16:49:05Z
2024-06-16T16:49:05Z
by Ali, Shakeel.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=950518">Click to View</a><br/>Format: Electronic Resources<br/>
Security monitoring with Cisco security MARS
ent://SD_ILS/0/SD_ILS:2283784
2024-06-16T16:49:05Z
2024-06-16T16:49:05Z
by Halleen, Gary.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781587052705/?ar">https://go.oreilly.com/library-access/library/view/-/9781587052705/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781587052705/?ar">https://learning.oreilly.com/library/view/~/9781587052705/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781587052705">https://learning.oreilly.com/library/view/~/9781587052705</a><br/>Format: Electronic Resources<br/>
Penetration testing and network defense
ent://SD_ILS/0/SD_ILS:2282015
2024-06-16T16:49:05Z
2024-06-16T16:49:05Z
by Whitaker, Andrew.<br/><a href="https://learning.oreilly.com/library/view/~/1587052083/?ar">https://learning.oreilly.com/library/view/~/1587052083/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587052083">https://learning.oreilly.com/library/view/~/1587052083</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1587052083/?ar">https://go.oreilly.com/library-access/library/view/-/1587052083/?ar</a><br/>Format: Electronic Resources<br/>
Security threat mitigation and response : understanding Cisco security MARS
ent://SD_ILS/0/SD_ILS:2282999
2024-06-16T16:49:05Z
2024-06-16T16:49:05Z
by Tesch, Dale.<br/><a href="https://learning.oreilly.com/library/view/~/1587052601">https://learning.oreilly.com/library/view/~/1587052601</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1587052601/?ar">https://go.oreilly.com/library-access/library/view/-/1587052601/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587052601/?ar">https://learning.oreilly.com/library/view/~/1587052601/?ar</a><br/>Format: Electronic Resources<br/>