Search Results for - Narrowed by: Computer networks -- Security measures. - Electronic books. -- local.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Electronic$002bbooks.$002b--$002blocal.$002509Electronic$002bbooks.$002b--$002blocal.$0026ps$003d300$0026isd$003dtrue?2024-06-23T16:32:53ZImplementing SSL / TLS Using Cryptography and PKI.ent://SD_ILS/0/SD_ILS:12289192024-06-23T16:32:53Z2024-06-23T16:32:53Zby Davies, Joshua.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=706899">Click to View</a><br/>Format: Electronic Resources<br/>Security Risk Management : Building an Information Security Risk Management Program from the Ground Up.ent://SD_ILS/0/SD_ILS:12269432024-06-23T16:32:53Z2024-06-23T16:32:53Zby Wheeler, Evan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=685406">Click to View</a><br/>Format: Electronic Resources<br/>Microsoft Forefront UAG 2010 Administrator's Handbook.ent://SD_ILS/0/SD_ILS:12457062024-06-23T16:32:53Z2024-06-23T16:32:53Zby Ben-Ari, Erez.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=948568">Click to View</a><br/>Format: Electronic Resources<br/>Moodle Security.ent://SD_ILS/0/SD_ILS:12451342024-06-23T16:32:53Z2024-06-23T16:32:53Zby Miletic, Darko.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=943988">Click to View</a><br/>Format: Electronic Resources<br/>IBM WebSphere Application Server v7.0 Security.ent://SD_ILS/0/SD_ILS:12451292024-06-23T16:32:53Z2024-06-23T16:32:53Zby Siliceo, Omar.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=943983">Click to View</a><br/>Format: Electronic Resources<br/>BackTrack 4 Assuring Security by Penetration Testing : Assuring Security by Penetration Testing.ent://SD_ILS/0/SD_ILS:12458232024-06-23T16:32:53Z2024-06-23T16:32:53Zby Ali, Shakeel.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=950518">Click to View</a><br/>Format: Electronic Resources<br/>Identity Management : Concepts, Technologies, and Systems.ent://SD_ILS/0/SD_ILS:12226882024-06-23T16:32:53Z2024-06-23T16:32:53Zby Takahashi, Kenji.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=634511">Click to View</a><br/>Format: Electronic Resources<br/>Developer's Guide to Web Application Security.ent://SD_ILS/0/SD_ILS:11910742024-06-23T16:32:53Z2024-06-23T16:32:53Zby Cross, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=289735">Click to View</a><br/>Format: Electronic Resources<br/>Integrated Security Systems Design : Concepts, Specifications, and Implementation.ent://SD_ILS/0/SD_ILS:11908652024-06-23T16:32:53Z2024-06-23T16:32:53Zby Norman, Thomas L.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=287955">Click to View</a><br/>Format: Electronic Resources<br/>Practical Embedded Security : Building Secure Resource-Constrained Systems.ent://SD_ILS/0/SD_ILS:11950042024-06-23T16:32:53Z2024-06-23T16:32:53Zby Stapko, Timothy.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=312846">Click to View</a><br/>Format: Electronic Resources<br/>Securing the Cloud : Cloud Computer Security Techniques and Tactics.ent://SD_ILS/0/SD_ILS:12271702024-06-23T16:32:53Z2024-06-23T16:32:53Zby Winkler, Vic (J.R.).<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=686827">Click to View</a><br/>Format: Electronic Resources<br/>Spring Security 3.ent://SD_ILS/0/SD_ILS:12451972024-06-23T16:32:53Z2024-06-23T16:32:53Zby Mularien, Peter.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=944051">Click to View</a><br/>Format: Electronic Resources<br/>IT Audit, Control, and Security.ent://SD_ILS/0/SD_ILS:12222742024-06-23T16:32:53Z2024-06-23T16:32:53Zby Moeller, Robert R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=624573">Click to View</a><br/>Format: Electronic Resources<br/>SSL and TLS : Theory and Practice.ent://SD_ILS/0/SD_ILS:12454552024-06-23T16:32:53Z2024-06-23T16:32:53Zby Oppliger, Rolf.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=946557">Click to View</a><br/>Format: Electronic Resources<br/>Protecting Games : A Security Handbook for Game Developers and Publishers.ent://SD_ILS/0/SD_ILS:13048772024-06-23T16:32:53Z2024-06-23T16:32:53Zby Davis, Steven B.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3136139">Click to View</a><br/>Format: Electronic Resources<br/>Mac Security Bible.ent://SD_ILS/0/SD_ILS:12115662024-06-23T16:32:53Z2024-06-23T16:32:53Zby Kissell, Joe.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=477803">Click to View</a><br/>Format: Electronic Resources<br/>Unauthorised Access : Physical Penetration Testing for IT Security Teams.ent://SD_ILS/0/SD_ILS:12099032024-06-23T16:32:53Z2024-06-23T16:32:53Zby Allsopp, Wil.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=470412">Click to View</a><br/>Format: Electronic Resources<br/>Joomla! Web Security.ent://SD_ILS/0/SD_ILS:12467012024-06-23T16:32:53Z2024-06-23T16:32:53Zby Canavan, Tom.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=978105">Click to View</a><br/>Format: Electronic Resources<br/>Picture Yourself Networking Your Home or Small Office.ent://SD_ILS/0/SD_ILS:13048602024-06-23T16:32:53Z2024-06-23T16:32:53Zby Brewer, Dennis C.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3136119">Click to View</a><br/>Format: Electronic Resources<br/>Securing Information and Communications Systems : Principles, Technologies, and Applications.ent://SD_ILS/0/SD_ILS:12077132024-06-23T16:32:53Z2024-06-23T16:32:53Zby Lopez, Javier.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=456881">Click to View</a><br/>Format: Electronic Resources<br/>Fuzzing for Software Security Testing and Quality Assurance.ent://SD_ILS/0/SD_ILS:12077162024-06-23T16:32:53Z2024-06-23T16:32:53Zby Takanen, Ari.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=456884">Click to View</a><br/>Format: Electronic Resources<br/>IT Compliance and Controls : Best Practices for Implementation.ent://SD_ILS/0/SD_ILS:11973672024-06-23T16:32:53Z2024-06-23T16:32:53Zby DeLuccia, James J.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=335724">Click to View</a><br/>Format: Electronic Resources<br/>Implementing 802.1X Security Solutions for Wired and Wireless Networks.ent://SD_ILS/0/SD_ILS:11987922024-06-23T16:32:53Z2024-06-23T16:32:53Zby Geier, Jim.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=353449">Click to View</a><br/>Format: Electronic Resources<br/>Aspects of Network and Information Security.ent://SD_ILS/0/SD_ILS:11992802024-06-23T16:32:53Z2024-06-23T16:32:53Zby Kranakis, E.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=363205">Click to View</a><br/>Format: Electronic Resources<br/>Implementing NAP and NAC Security Technologies : The Complete Guide to Network Access Control.ent://SD_ILS/0/SD_ILS:11987982024-06-23T16:32:53Z2024-06-23T16:32:53Zby Hoffman, Daniel V.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=353459">Click to View</a><br/>Format: Electronic Resources<br/>How to Cheat at Configuring ISA Server 2004.ent://SD_ILS/0/SD_ILS:11860652024-06-23T16:32:53Z2024-06-23T16:32:53Zby Littlejohn Shinder, Debra.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254853">Click to View</a><br/>Format: Electronic Resources<br/>Configuring SonicWALL Firewalls.ent://SD_ILS/0/SD_ILS:11862332024-06-23T16:32:53Z2024-06-23T16:32:53Zby Bendell, Dan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=256369">Click to View</a><br/>Format: Electronic Resources<br/>How to Cheat at Managing Information Security.ent://SD_ILS/0/SD_ILS:11868282024-06-23T16:32:53Z2024-06-23T16:32:53Zby Osborne, Mark.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=266207">Click to View</a><br/>Format: Electronic Resources<br/>Penetration Tester's Open Source Toolkit.ent://SD_ILS/0/SD_ILS:11860462024-06-23T16:32:53Z2024-06-23T16:32:53Zby Faircloth, Jeremy.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254834">Click to View</a><br/>Format: Electronic Resources<br/>Network Security Foundations : Technology Fundamentals for IT Success.ent://SD_ILS/0/SD_ILS:11871342024-06-23T16:32:53Z2024-06-23T16:32:53Zby Strebe, Matthew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=267332">Click to View</a><br/>Format: Electronic Resources<br/>Network Security Assessment : From Vulnerability to Patch.ent://SD_ILS/0/SD_ILS:11895942024-06-23T16:32:53Z2024-06-23T16:32:53Zby Manzuik, Steve.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=280219">Click to View</a><br/>Format: Electronic Resources<br/>Firewall Policies and VPN Configurations.ent://SD_ILS/0/SD_ILS:11883022024-06-23T16:32:53Z2024-06-23T16:32:53Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=272100">Click to View</a><br/>Format: Electronic Resources<br/>Designing and Building Enterprise DMZs.ent://SD_ILS/0/SD_ILS:11958442024-06-23T16:32:53Z2024-06-23T16:32:53Zby Flynn, Hal.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=319198">Click to View</a><br/>Format: Electronic Resources<br/>Enemy at the Water Cooler : True Stories of Insider Threats and Enterprise Security Management Countermeasures.ent://SD_ILS/0/SD_ILS:11920262024-06-23T16:32:53Z2024-06-23T16:32:53Zby Contos, Brian T.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294116">Click to View</a><br/>Format: Electronic Resources<br/>Host Integrity Monitoring Using Osiris and Samhain : Using Osiris and Samhain.ent://SD_ILS/0/SD_ILS:11839532024-06-23T16:32:53Z2024-06-23T16:32:53Zby Wotring, Brian.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=233599">Click to View</a><br/>Format: Electronic Resources<br/>WebSphere Application Server for z/OS V5 and J2EE 1.3 Security Handbook.ent://SD_ILS/0/SD_ILS:13097732024-06-23T16:32:53Z2024-06-23T16:32:53Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306382">Click to View</a><br/>Format: Electronic Resources<br/>IBM System z9 109 Technical Introduction.ent://SD_ILS/0/SD_ILS:13099732024-06-23T16:32:53Z2024-06-23T16:32:53Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306582">Click to View</a><br/>Format: Electronic Resources<br/>z/OS Diagnostic Data : Collection and Analysis.ent://SD_ILS/0/SD_ILS:13101612024-06-23T16:32:53Z2024-06-23T16:32:53Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306770">Click to View</a><br/>Format: Electronic Resources<br/>Distributed Security and High Availability with Tivoli Access Manager and WebSphere Application Server for z/OS.ent://SD_ILS/0/SD_ILS:13099932024-06-23T16:32:53Z2024-06-23T16:32:53Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306602">Click to View</a><br/>Format: Electronic Resources<br/>z/OS 1.6 Security Services Update.ent://SD_ILS/0/SD_ILS:13098442024-06-23T16:32:53Z2024-06-23T16:32:53Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306453">Click to View</a><br/>Format: Electronic Resources<br/>Identity and Access Management Solutions Using WebSphere Portal V5.1, Tivoli Identity Manager V4.5.1, and Tivoli Access Manager V5.1.ent://SD_ILS/0/SD_ILS:13099372024-06-23T16:32:53Z2024-06-23T16:32:53Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306546">Click to View</a><br/>Format: Electronic Resources<br/>Secure Production Deployment of B2B Solutions using WebSphere Business Integration Connect.ent://SD_ILS/0/SD_ILS:13098472024-06-23T16:32:53Z2024-06-23T16:32:53Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306456">Click to View</a><br/>Format: Electronic Resources<br/>Nessus, Snort, & Ethereal Power Tools : Customizing Open Source Security Applications.ent://SD_ILS/0/SD_ILS:11860512024-06-23T16:32:53Z2024-06-23T16:32:53Zby Caswell, Brian.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254839">Click to View</a><br/>Format: Electronic Resources<br/>Securing IM and P2P Applications for the Enterprise.ent://SD_ILS/0/SD_ILS:11860592024-06-23T16:32:53Z2024-06-23T16:32:53Zby Sachs, Marcus.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254847">Click to View</a><br/>Format: Electronic Resources<br/>Buffer Overflow Attacks : Detect, Exploit, Prevent.ent://SD_ILS/0/SD_ILS:11825002024-06-23T16:32:53Z2024-06-23T16:32:53Zby Deckard, Jason.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=222803">Click to View</a><br/>Format: Electronic Resources<br/>Insider Threat : Protecting the Enterprise from Sabotage, Spying, and Theft.ent://SD_ILS/0/SD_ILS:11860612024-06-23T16:32:53Z2024-06-23T16:32:53Zby Cole, Eric.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254849">Click to View</a><br/>Format: Electronic Resources<br/>Intrusion Prevention and Active Response : Deploying Network and Host IPS.ent://SD_ILS/0/SD_ILS:11831112024-06-23T16:32:53Z2024-06-23T16:32:53Zby Rash, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=226578">Click to View</a><br/>Format: Electronic Resources<br/>How to Cheat at Designing Security for a Windows Server 2003 Network.ent://SD_ILS/0/SD_ILS:11860442024-06-23T16:32:53Z2024-06-23T16:32:53Zby Ruston, Chris.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254832">Click to View</a><br/>Format: Electronic Resources<br/>Cisco PIX Firewalls : Configure / Manage / Troubleshoot.ent://SD_ILS/0/SD_ILS:11860472024-06-23T16:32:53Z2024-06-23T16:32:53Zby Browne, Brian.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254835">Click to View</a><br/>Format: Electronic Resources<br/>Network Security Evaluation Using the NSA IEM : Using the NSA IEM.ent://SD_ILS/0/SD_ILS:11860542024-06-23T16:32:53Z2024-06-23T16:32:53Zby Rogers, Russ.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254842">Click to View</a><br/>Format: Electronic Resources<br/>Virtual Private Networking : A Construction, Operation and Utilization Guide.ent://SD_ILS/0/SD_ILS:12099242024-06-23T16:32:53Z2024-06-23T16:32:53Zby Held, Gilbert.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=470565">Click to View</a><br/>Format: Electronic Resources<br/>Implementing SSH : Strategies for Optimizing the Secure Shell.ent://SD_ILS/0/SD_ILS:11820032024-06-23T16:32:53Z2024-06-23T16:32:53Zby Dwivedi, Himanshu.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=215119">Click to View</a><br/>Format: Electronic Resources<br/>Implementing PKI Services on z/OS.ent://SD_ILS/0/SD_ILS:13102682024-06-23T16:32:53Z2024-06-23T16:32:53Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306877">Click to View</a><br/>Format: Electronic Resources<br/>Internet Applications : The Emerging Global Computer.ent://SD_ILS/0/SD_ILS:13267472024-06-23T16:32:53Z2024-06-23T16:32:53Zby Patch, Kimberly.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3411450">Click to View</a><br/>Format: Electronic Resources<br/>MCSE Designing Security for a Windows Server 2003 Network (Exam 70-298) : Study Guide and DVD Training System.ent://SD_ILS/0/SD_ILS:11920722024-06-23T16:32:53Z2024-06-23T16:32:53Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294253">Click to View</a><br/>Format: Electronic Resources<br/>Computer Forensics JumpStart.ent://SD_ILS/0/SD_ILS:11871092024-06-23T16:32:53Z2024-06-23T16:32:53Zby Solomon, Micah.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=267268">Click to View</a><br/>Format: Electronic Resources<br/>Network and security issues.ent://SD_ILS/0/SD_ILS:11911492024-06-23T16:32:53Z2024-06-23T16:32:53Zby Raitt, Dr. David.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=289848">Click to View</a><br/>Format: Electronic Resources<br/>Configuring NetScreen Firewalls.ent://SD_ILS/0/SD_ILS:11920052024-06-23T16:32:53Z2024-06-23T16:32:53Z<a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294055">Click to View</a><br/>Format: Electronic Resources<br/>Hacking the Code : Auditor's Guide to Writing Secure Code for the Web.ent://SD_ILS/0/SD_ILS:11920482024-06-23T16:32:53Z2024-06-23T16:32:53Zby Burnett, Mark.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294160">Click to View</a><br/>Format: Electronic Resources<br/>Dr. Tom Shinder's Configuring ISA Server 2004.ent://SD_ILS/0/SD_ILS:11920222024-06-23T16:32:53Z2024-06-23T16:32:53Zby Littlejohn Shinder, Debra.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294094">Click to View</a><br/>Format: Electronic Resources<br/>Ethereal Packet Sniffing.ent://SD_ILS/0/SD_ILS:11920282024-06-23T16:32:53Z2024-06-23T16:32:53Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294122">Click to View</a><br/>Format: Electronic Resources<br/>Cyber Adversary Characterization : Auditing the Hacker Mind.ent://SD_ILS/0/SD_ILS:11920122024-06-23T16:32:53Z2024-06-23T16:32:53Zby Parker, Tom.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294071">Click to View</a><br/>Format: Electronic Resources<br/>Nessus Network Auditing : Jay Beale Open Source Security Series.ent://SD_ILS/0/SD_ILS:11920792024-06-23T16:32:53Z2024-06-23T16:32:53Zby Beale, Jay.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294281">Click to View</a><br/>Format: Electronic Resources<br/>Security Sage's Guide to Hardening the Network Infrastructure.ent://SD_ILS/0/SD_ILS:11921082024-06-23T16:32:53Z2024-06-23T16:32:53Zby Andres, Steven.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294359">Click to View</a><br/>Format: Electronic Resources<br/>Code Hacking : A Developer's Guide to Network Security.ent://SD_ILS/0/SD_ILS:13044362024-06-23T16:32:53Z2024-06-23T16:32:53Zby Conway, Richard.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3135681">Click to View</a><br/>Format: Electronic Resources<br/>Security Configuration in a TCP/IP Sysplex Environment.ent://SD_ILS/0/SD_ILS:13100522024-06-23T16:32:53Z2024-06-23T16:32:53Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306661">Click to View</a><br/>Format: Electronic Resources<br/>Security : Secrets, Intruders and ID Tags.ent://SD_ILS/0/SD_ILS:13267442024-06-23T16:32:53Z2024-06-23T16:32:53Zby Patch, Kimberly.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3411447">Click to View</a><br/>Format: Electronic Resources<br/>Enterprise Business Portals II with IBM Tivoli Access Manager.ent://SD_ILS/0/SD_ILS:13101482024-06-23T16:32:53Z2024-06-23T16:32:53Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306757">Click to View</a><br/>Format: Electronic Resources<br/>z/OS WebSphere and J2EE Security Handbook.ent://SD_ILS/0/SD_ILS:13100112024-06-23T16:32:53Z2024-06-23T16:32:53Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306620">Click to View</a><br/>Format: Electronic Resources<br/>Configuring Symantec AntiVirus Enterprise Edition.ent://SD_ILS/0/SD_ILS:11920062024-06-23T16:32:53Z2024-06-23T16:32:53Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294056">Click to View</a><br/>Format: Electronic Resources<br/>Defense and Detection Strategies against Internet Worms.ent://SD_ILS/0/SD_ILS:11833692024-06-23T16:32:53Z2024-06-23T16:32:53Zby Nazario, Jose.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227660">Click to View</a><br/>Format: Electronic Resources<br/>The Best Damn Firewall Book Period.ent://SD_ILS/0/SD_ILS:11921212024-06-23T16:32:53Z2024-06-23T16:32:53Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294396">Click to View</a><br/>Format: Electronic Resources<br/>Special Ops : Host and Network Security for Microsoft Unix and Oracle.ent://SD_ILS/0/SD_ILS:11921132024-06-23T16:32:53Z2024-06-23T16:32:53Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294373">Click to View</a><br/>Format: Electronic Resources<br/>Building DMZs For Enterprise Networks.ent://SD_ILS/0/SD_ILS:11919882024-06-23T16:32:53Z2024-06-23T16:32:53Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294015">Click to View</a><br/>Format: Electronic Resources<br/>Cisco Security Professional's Guide to Secure Intrusion Detection Systems.ent://SD_ILS/0/SD_ILS:11919952024-06-23T16:32:53Z2024-06-23T16:32:53Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294035">Click to View</a><br/>Format: Electronic Resources<br/>Invasion of Privacy : Big Brother and the Company Hackers.ent://SD_ILS/0/SD_ILS:13043802024-06-23T16:32:53Z2024-06-23T16:32:53Zby Weber, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3135625">Click to View</a><br/>Format: Electronic Resources<br/>Internet Under Crisis Conditions : Learning from September 11.ent://SD_ILS/0/SD_ILS:13174602024-06-23T16:32:53Z2024-06-23T16:32:53Zby Conditions, Committee on the Internet Under Crisis.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3375369">Click to View</a><br/>Format: Electronic Resources<br/>ExamWise For CIW Security Profefssional Certification : Exam 1D0-470.ent://SD_ILS/0/SD_ILS:13266552024-06-23T16:32:53Z2024-06-23T16:32:53Zby Bayer, Chad.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3410580">Click to View</a><br/>Format: Electronic Resources<br/>Introduction to Communication Electronic Warfare Systems.ent://SD_ILS/0/SD_ILS:11833292024-06-23T16:32:53Z2024-06-23T16:32:53Zby Poisel, Richard.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227618">Click to View</a><br/>Format: Electronic Resources<br/>Hack Proofing ColdFusion : The Only Way to Stop a Hacker Is to Think Like One.ent://SD_ILS/0/SD_ILS:11920402024-06-23T16:32:53Z2024-06-23T16:32:53Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294151">Click to View</a><br/>Format: Electronic Resources<br/>Hackproofing Your Wireless Network.ent://SD_ILS/0/SD_ILS:11920492024-06-23T16:32:53Z2024-06-23T16:32:53Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294161">Click to View</a><br/>Format: Electronic Resources<br/>Cisco Security Specialists Guide to PIX Firewall.ent://SD_ILS/0/SD_ILS:11919962024-06-23T16:32:53Z2024-06-23T16:32:53Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294036">Click to View</a><br/>Format: Electronic Resources<br/>Nokia Network Security Solutions Handbook.ent://SD_ILS/0/SD_ILS:11920812024-06-23T16:32:53Z2024-06-23T16:32:53Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294289">Click to View</a><br/>Format: Electronic Resources<br/>Internet Security and Firewalls.ent://SD_ILS/0/SD_ILS:13044872024-06-23T16:32:53Z2024-06-23T16:32:53Zby Preetham, V.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3135734">Click to View</a><br/>Format: Electronic Resources<br/>