Search Results for - Narrowed by: Computer networks -- Security measures. - Computersicherheit
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Computersicherheit$002509Computersicherheit$0026ps$003d300$0026isd$003dtrue?
2024-06-20T05:37:25Z
Computer and information security handbook
ent://SD_ILS/0/SD_ILS:2313301
2024-06-20T05:37:25Z
2024-06-20T05:37:25Z
by Vacca, John R., editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128039298">https://learning.oreilly.com/library/view/~/9780128039298</a>
<a href="https://learning.oreilly.com/library/view/~/9780128039298/?ar">https://learning.oreilly.com/library/view/~/9780128039298/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128039298/?ar">https://go.oreilly.com/library-access/library/view/-/9780128039298/?ar</a><br/>Format: Electronic Resources<br/>
Threat modeling : designing for security
ent://SD_ILS/0/SD_ILS:2302626
2024-06-20T05:37:25Z
2024-06-20T05:37:25Z
by Shostack, Adam, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar">https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118810057/?ar">https://learning.oreilly.com/library/view/~/9781118810057/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118810057">https://learning.oreilly.com/library/view/~/9781118810057</a><br/>Format: Electronic Resources<br/>
The tangled Web : a guide to securing modern Web applications
ent://SD_ILS/0/SD_ILS:2293949
2024-06-20T05:37:25Z
2024-06-20T05:37:25Z
by Zalewski, Michal.<br/><a href="https://learning.oreilly.com/library/view/~/9781593273880">https://learning.oreilly.com/library/view/~/9781593273880</a>
<a href="https://learning.oreilly.com/library/view/~/9781593273880/?ar">https://learning.oreilly.com/library/view/~/9781593273880/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781593273880/?ar">https://go.oreilly.com/library-access/library/view/-/9781593273880/?ar</a><br/>Format: Electronic Resources<br/>
Cloud security and privacy
ent://SD_ILS/0/SD_ILS:2287451
2024-06-20T05:37:25Z
2024-06-20T05:37:25Z
by Mather, Tim.<br/><a href="https://learning.oreilly.com/library/view/~/9780596806453/?ar">https://learning.oreilly.com/library/view/~/9780596806453/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780596806453/?ar">https://go.oreilly.com/library-access/library/view/-/9780596806453/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780596806453">https://learning.oreilly.com/library/view/~/9780596806453</a><br/>Format: Electronic Resources<br/>
Googling security : how much does Google know about you?
ent://SD_ILS/0/SD_ILS:2285350
2024-06-20T05:37:25Z
2024-06-20T05:37:25Z
by Conti, Greg.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321591265/?ar">https://go.oreilly.com/library-access/library/view/-/9780321591265/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321591265/?ar">https://learning.oreilly.com/library/view/~/9780321591265/?ar</a><br/>Format: Electronic Resources<br/>
Computer and information security handbook
ent://SD_ILS/0/SD_ILS:2286804
2024-06-20T05:37:25Z
2024-06-20T05:37:25Z
by Vacca, John R.<br/><a href="https://learning.oreilly.com/library/view/~/9780080921945">https://learning.oreilly.com/library/view/~/9780080921945</a>
<a href="https://learning.oreilly.com/library/view/~/9780080921945/?ar">https://learning.oreilly.com/library/view/~/9780080921945/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780080921945/?ar">https://go.oreilly.com/library-access/library/view/-/9780080921945/?ar</a><br/>Format: Electronic Resources<br/>
Software security engineering : a guide for project managers
ent://SD_ILS/0/SD_ILS:2284470
2024-06-20T05:37:25Z
2024-06-20T05:37:25Z
by Allen, Julia H.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321559685/?ar">https://go.oreilly.com/library-access/library/view/-/9780321559685/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321559685/?ar">https://learning.oreilly.com/library/view/~/9780321559685/?ar</a><br/>Format: Electronic Resources<br/>
Fuzzing : brute force vulnerabilty discovery
ent://SD_ILS/0/SD_ILS:2283451
2024-06-20T05:37:25Z
2024-06-20T05:37:25Z
by Sutton, Michael, 1973-<br/><a href="https://learning.oreilly.com/library/view/~/9780321446114">https://learning.oreilly.com/library/view/~/9780321446114</a>
<a href="https://learning.oreilly.com/library/view/~/9780321446114/?ar">https://learning.oreilly.com/library/view/~/9780321446114/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321446114/?ar">https://go.oreilly.com/library-access/library/view/-/9780321446114/?ar</a><br/>Format: Electronic Resources<br/>
How to break Web software : functional and security testing of Web applications and Web services
ent://SD_ILS/0/SD_ILS:2286432
2024-06-20T05:37:25Z
2024-06-20T05:37:25Z
by Andrews, Mike.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321657497/?ar">https://go.oreilly.com/library-access/library/view/-/9780321657497/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321657497/?ar">https://learning.oreilly.com/library/view/~/9780321657497/?ar</a><br/>Format: Electronic Resources<br/>
Hunting security bugs
ent://SD_ILS/0/SD_ILS:2282720
2024-06-20T05:37:25Z
2024-06-20T05:37:25Z
by Gallagher, Tom.<br/><a href="https://learning.oreilly.com/library/view/~/073562187X">https://learning.oreilly.com/library/view/~/073562187X</a>
<a href="https://learning.oreilly.com/library/view/~/073562187X/?ar">https://learning.oreilly.com/library/view/~/073562187X/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/073562187X/?ar">https://go.oreilly.com/library-access/library/view/-/073562187X/?ar</a><br/>Format: Electronic Resources<br/>
Network security hacks
ent://SD_ILS/0/SD_ILS:2282983
2024-06-20T05:37:25Z
2024-06-20T05:37:25Z
by Lockhart, Andrew.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596527632/?ar">https://go.oreilly.com/library-access/library/view/-/0596527632/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596527632">https://learning.oreilly.com/library/view/~/0596527632</a>
<a href="https://learning.oreilly.com/library/view/~/0596527632/?ar">https://learning.oreilly.com/library/view/~/0596527632/?ar</a><br/>Format: Electronic Resources<br/>
Silence on the wire : a field guide to passive reconnaissance and indirect attacks
ent://SD_ILS/0/SD_ILS:2287377
2024-06-20T05:37:25Z
2024-06-20T05:37:25Z
by Zalewski, Michal, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1593270461/?ar">https://go.oreilly.com/library-access/library/view/-/1593270461/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1593270461/?ar">https://learning.oreilly.com/library/view/~/1593270461/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1593270461">https://learning.oreilly.com/library/view/~/1593270461</a><br/>Format: Electronic Resources<br/>
Host integrity monitoring : using Osiris and Samhain
ent://SD_ILS/0/SD_ILS:2282620
2024-06-20T05:37:25Z
2024-06-20T05:37:25Z
by Wotring, Brian.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490184">https://learning.oreilly.com/library/view/~/9781597490184</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490184/?ar">https://learning.oreilly.com/library/view/~/9781597490184/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490184/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490184/?ar</a>
<a href="https://www.sciencedirect.com/science/book/9781597490184">https://www.sciencedirect.com/science/book/9781597490184</a><br/>Format: Electronic Resources<br/>
The business case for network security : advocacy, governance, and ROI
ent://SD_ILS/0/SD_ILS:2281646
2024-06-20T05:37:25Z
2024-06-20T05:37:25Z
by Paquet, Catherine.<br/><a href="https://go.oreilly.com/library-access/library/view/-/1587201216/?ar">https://go.oreilly.com/library-access/library/view/-/1587201216/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587201216/?ar">https://learning.oreilly.com/library/view/~/1587201216/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1587201216">https://learning.oreilly.com/library/view/~/1587201216</a><br/>Format: Electronic Resources<br/>
Linux security cookbook
ent://SD_ILS/0/SD_ILS:2281262
2024-06-20T05:37:25Z
2024-06-20T05:37:25Z
by Barrett, Daniel J.<br/><a href="https://learning.oreilly.com/library/view/~/0596003919/?ar">https://learning.oreilly.com/library/view/~/0596003919/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596003919/?ar">https://go.oreilly.com/library-access/library/view/-/0596003919/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596003919">https://learning.oreilly.com/library/view/~/0596003919</a><br/>Format: Electronic Resources<br/>
Wireless hacks
ent://SD_ILS/0/SD_ILS:2289321
2024-06-20T05:37:25Z
2024-06-20T05:37:25Z
by Flickenger, Rob.<br/><a href="https://learning.oreilly.com/library/view/~/0596005598/?ar">https://learning.oreilly.com/library/view/~/0596005598/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0596005598/?ar">https://go.oreilly.com/library-access/library/view/-/0596005598/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596005598">https://learning.oreilly.com/library/view/~/0596005598</a><br/>Format: Electronic Resources<br/>