Search Results for - Narrowed by: Computer networks -- Security measures. - Computersicherheit SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Computersicherheit$002509Computersicherheit$0026ps$003d300$0026isd$003dtrue? 2024-06-20T05:37:25Z Computer and information security handbook ent://SD_ILS/0/SD_ILS:2313301 2024-06-20T05:37:25Z 2024-06-20T05:37:25Z by&#160;Vacca, John R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128039298">https://learning.oreilly.com/library/view/~/9780128039298</a> <a href="https://learning.oreilly.com/library/view/~/9780128039298/?ar">https://learning.oreilly.com/library/view/~/9780128039298/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128039298/?ar">https://go.oreilly.com/library-access/library/view/-/9780128039298/?ar</a><br/>Format:&#160;Electronic Resources<br/> Threat modeling : designing for security ent://SD_ILS/0/SD_ILS:2302626 2024-06-20T05:37:25Z 2024-06-20T05:37:25Z by&#160;Shostack, Adam, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar">https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118810057/?ar">https://learning.oreilly.com/library/view/~/9781118810057/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118810057">https://learning.oreilly.com/library/view/~/9781118810057</a><br/>Format:&#160;Electronic Resources<br/> The tangled Web : a guide to securing modern Web applications ent://SD_ILS/0/SD_ILS:2293949 2024-06-20T05:37:25Z 2024-06-20T05:37:25Z by&#160;Zalewski, Michal.<br/><a href="https://learning.oreilly.com/library/view/~/9781593273880">https://learning.oreilly.com/library/view/~/9781593273880</a> <a href="https://learning.oreilly.com/library/view/~/9781593273880/?ar">https://learning.oreilly.com/library/view/~/9781593273880/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781593273880/?ar">https://go.oreilly.com/library-access/library/view/-/9781593273880/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud security and privacy ent://SD_ILS/0/SD_ILS:2287451 2024-06-20T05:37:25Z 2024-06-20T05:37:25Z by&#160;Mather, Tim.<br/><a href="https://learning.oreilly.com/library/view/~/9780596806453/?ar">https://learning.oreilly.com/library/view/~/9780596806453/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780596806453/?ar">https://go.oreilly.com/library-access/library/view/-/9780596806453/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780596806453">https://learning.oreilly.com/library/view/~/9780596806453</a><br/>Format:&#160;Electronic Resources<br/> Googling security : how much does Google know about you? ent://SD_ILS/0/SD_ILS:2285350 2024-06-20T05:37:25Z 2024-06-20T05:37:25Z by&#160;Conti, Greg.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321591265/?ar">https://go.oreilly.com/library-access/library/view/-/9780321591265/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780321591265/?ar">https://learning.oreilly.com/library/view/~/9780321591265/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:2286804 2024-06-20T05:37:25Z 2024-06-20T05:37:25Z by&#160;Vacca, John R.<br/><a href="https://learning.oreilly.com/library/view/~/9780080921945">https://learning.oreilly.com/library/view/~/9780080921945</a> <a href="https://learning.oreilly.com/library/view/~/9780080921945/?ar">https://learning.oreilly.com/library/view/~/9780080921945/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780080921945/?ar">https://go.oreilly.com/library-access/library/view/-/9780080921945/?ar</a><br/>Format:&#160;Electronic Resources<br/> Software security engineering : a guide for project managers ent://SD_ILS/0/SD_ILS:2284470 2024-06-20T05:37:25Z 2024-06-20T05:37:25Z by&#160;Allen, Julia H.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321559685/?ar">https://go.oreilly.com/library-access/library/view/-/9780321559685/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780321559685/?ar">https://learning.oreilly.com/library/view/~/9780321559685/?ar</a><br/>Format:&#160;Electronic Resources<br/> Fuzzing : brute force vulnerabilty discovery ent://SD_ILS/0/SD_ILS:2283451 2024-06-20T05:37:25Z 2024-06-20T05:37:25Z by&#160;Sutton, Michael, 1973-<br/><a href="https://learning.oreilly.com/library/view/~/9780321446114">https://learning.oreilly.com/library/view/~/9780321446114</a> <a href="https://learning.oreilly.com/library/view/~/9780321446114/?ar">https://learning.oreilly.com/library/view/~/9780321446114/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321446114/?ar">https://go.oreilly.com/library-access/library/view/-/9780321446114/?ar</a><br/>Format:&#160;Electronic Resources<br/> How to break Web software : functional and security testing of Web applications and Web services ent://SD_ILS/0/SD_ILS:2286432 2024-06-20T05:37:25Z 2024-06-20T05:37:25Z by&#160;Andrews, Mike.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321657497/?ar">https://go.oreilly.com/library-access/library/view/-/9780321657497/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780321657497/?ar">https://learning.oreilly.com/library/view/~/9780321657497/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hunting security bugs ent://SD_ILS/0/SD_ILS:2282720 2024-06-20T05:37:25Z 2024-06-20T05:37:25Z by&#160;Gallagher, Tom.<br/><a href="https://learning.oreilly.com/library/view/~/073562187X">https://learning.oreilly.com/library/view/~/073562187X</a> <a href="https://learning.oreilly.com/library/view/~/073562187X/?ar">https://learning.oreilly.com/library/view/~/073562187X/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/073562187X/?ar">https://go.oreilly.com/library-access/library/view/-/073562187X/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network security hacks ent://SD_ILS/0/SD_ILS:2282983 2024-06-20T05:37:25Z 2024-06-20T05:37:25Z by&#160;Lockhart, Andrew.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596527632/?ar">https://go.oreilly.com/library-access/library/view/-/0596527632/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596527632">https://learning.oreilly.com/library/view/~/0596527632</a> <a href="https://learning.oreilly.com/library/view/~/0596527632/?ar">https://learning.oreilly.com/library/view/~/0596527632/?ar</a><br/>Format:&#160;Electronic Resources<br/> Silence on the wire : a field guide to passive reconnaissance and indirect attacks ent://SD_ILS/0/SD_ILS:2287377 2024-06-20T05:37:25Z 2024-06-20T05:37:25Z by&#160;Zalewski, Michal, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1593270461/?ar">https://go.oreilly.com/library-access/library/view/-/1593270461/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1593270461/?ar">https://learning.oreilly.com/library/view/~/1593270461/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1593270461">https://learning.oreilly.com/library/view/~/1593270461</a><br/>Format:&#160;Electronic Resources<br/> Host integrity monitoring : using Osiris and Samhain ent://SD_ILS/0/SD_ILS:2282620 2024-06-20T05:37:25Z 2024-06-20T05:37:25Z by&#160;Wotring, Brian.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490184">https://learning.oreilly.com/library/view/~/9781597490184</a> <a href="https://learning.oreilly.com/library/view/~/9781597490184/?ar">https://learning.oreilly.com/library/view/~/9781597490184/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597490184/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490184/?ar</a> <a href="https://www.sciencedirect.com/science/book/9781597490184">https://www.sciencedirect.com/science/book/9781597490184</a><br/>Format:&#160;Electronic Resources<br/> The business case for network security : advocacy, governance, and ROI ent://SD_ILS/0/SD_ILS:2281646 2024-06-20T05:37:25Z 2024-06-20T05:37:25Z by&#160;Paquet, Catherine.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1587201216/?ar">https://go.oreilly.com/library-access/library/view/-/1587201216/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1587201216/?ar">https://learning.oreilly.com/library/view/~/1587201216/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1587201216">https://learning.oreilly.com/library/view/~/1587201216</a><br/>Format:&#160;Electronic Resources<br/> Linux security cookbook ent://SD_ILS/0/SD_ILS:2281262 2024-06-20T05:37:25Z 2024-06-20T05:37:25Z by&#160;Barrett, Daniel J.<br/><a href="https://learning.oreilly.com/library/view/~/0596003919/?ar">https://learning.oreilly.com/library/view/~/0596003919/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596003919/?ar">https://go.oreilly.com/library-access/library/view/-/0596003919/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596003919">https://learning.oreilly.com/library/view/~/0596003919</a><br/>Format:&#160;Electronic Resources<br/> Wireless hacks ent://SD_ILS/0/SD_ILS:2289321 2024-06-20T05:37:25Z 2024-06-20T05:37:25Z by&#160;Flickenger, Rob.<br/><a href="https://learning.oreilly.com/library/view/~/0596005598/?ar">https://learning.oreilly.com/library/view/~/0596005598/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596005598/?ar">https://go.oreilly.com/library-access/library/view/-/0596005598/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596005598">https://learning.oreilly.com/library/view/~/0596005598</a><br/>Format:&#160;Electronic Resources<br/>