Search Results for - Narrowed by: Computer networks -- Security measures. - Electronic books. -- local. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Electronic$002bbooks.$002b--$002blocal.$002509Electronic$002bbooks.$002b--$002blocal.$0026ps$003d300$0026isd$003dtrue? 2024-06-23T16:32:53Z Implementing SSL / TLS Using Cryptography and PKI. ent://SD_ILS/0/SD_ILS:1228919 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Davies, Joshua.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=706899">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security Risk Management : Building an Information Security Risk Management Program from the Ground Up. ent://SD_ILS/0/SD_ILS:1226943 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Wheeler, Evan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=685406">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Forefront UAG 2010 Administrator's Handbook. ent://SD_ILS/0/SD_ILS:1245706 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Ben-Ari, Erez.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=948568">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Moodle Security. ent://SD_ILS/0/SD_ILS:1245134 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Miletic, Darko.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=943988">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IBM WebSphere Application Server v7.0 Security. ent://SD_ILS/0/SD_ILS:1245129 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Siliceo, Omar.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=943983">Click to View</a><br/>Format:&#160;Electronic Resources<br/> BackTrack 4 Assuring Security by Penetration Testing : Assuring Security by Penetration Testing. ent://SD_ILS/0/SD_ILS:1245823 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Ali, Shakeel.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=950518">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Identity Management : Concepts, Technologies, and Systems. ent://SD_ILS/0/SD_ILS:1222688 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Takahashi, Kenji.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=634511">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Developer's Guide to Web Application Security. ent://SD_ILS/0/SD_ILS:1191074 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Cross, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=289735">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Integrated Security Systems Design : Concepts, Specifications, and Implementation. ent://SD_ILS/0/SD_ILS:1190865 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Norman, Thomas L.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=287955">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Practical Embedded Security : Building Secure Resource-Constrained Systems. ent://SD_ILS/0/SD_ILS:1195004 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Stapko, Timothy.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=312846">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing the Cloud : Cloud Computer Security Techniques and Tactics. ent://SD_ILS/0/SD_ILS:1227170 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Winkler, Vic (J.R.).<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=686827">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Spring Security 3. ent://SD_ILS/0/SD_ILS:1245197 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Mularien, Peter.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=944051">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IT Audit, Control, and Security. ent://SD_ILS/0/SD_ILS:1222274 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Moeller, Robert R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=624573">Click to View</a><br/>Format:&#160;Electronic Resources<br/> SSL and TLS : Theory and Practice. ent://SD_ILS/0/SD_ILS:1245455 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Oppliger, Rolf.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=946557">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Protecting Games : A Security Handbook for Game Developers and Publishers. ent://SD_ILS/0/SD_ILS:1304877 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Davis, Steven B.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3136139">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mac Security Bible. ent://SD_ILS/0/SD_ILS:1211566 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Kissell, Joe.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=477803">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Unauthorised Access : Physical Penetration Testing for IT Security Teams. ent://SD_ILS/0/SD_ILS:1209903 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Allsopp, Wil.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=470412">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Joomla! Web Security. ent://SD_ILS/0/SD_ILS:1246701 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Canavan, Tom.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=978105">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Picture Yourself Networking Your Home or Small Office. ent://SD_ILS/0/SD_ILS:1304860 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Brewer, Dennis C.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3136119">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing Information and Communications Systems : Principles, Technologies, and Applications. ent://SD_ILS/0/SD_ILS:1207713 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Lopez, Javier.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=456881">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Fuzzing for Software Security Testing and Quality Assurance. ent://SD_ILS/0/SD_ILS:1207716 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Takanen, Ari.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=456884">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IT Compliance and Controls : Best Practices for Implementation. ent://SD_ILS/0/SD_ILS:1197367 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;DeLuccia, James J.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=335724">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Implementing 802.1X Security Solutions for Wired and Wireless Networks. ent://SD_ILS/0/SD_ILS:1198792 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Geier, Jim.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=353449">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Aspects of Network and Information Security. ent://SD_ILS/0/SD_ILS:1199280 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Kranakis, E.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=363205">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Implementing NAP and NAC Security Technologies : The Complete Guide to Network Access Control. ent://SD_ILS/0/SD_ILS:1198798 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Hoffman, Daniel V.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=353459">Click to View</a><br/>Format:&#160;Electronic Resources<br/> How to Cheat at Configuring ISA Server 2004. ent://SD_ILS/0/SD_ILS:1186065 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Littlejohn Shinder, Debra.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254853">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Configuring SonicWALL Firewalls. ent://SD_ILS/0/SD_ILS:1186233 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Bendell, Dan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=256369">Click to View</a><br/>Format:&#160;Electronic Resources<br/> How to Cheat at Managing Information Security. ent://SD_ILS/0/SD_ILS:1186828 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Osborne, Mark.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=266207">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Penetration Tester's Open Source Toolkit. ent://SD_ILS/0/SD_ILS:1186046 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Faircloth, Jeremy.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254834">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network Security Foundations : Technology Fundamentals for IT Success. ent://SD_ILS/0/SD_ILS:1187134 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Strebe, Matthew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=267332">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network Security Assessment : From Vulnerability to Patch. ent://SD_ILS/0/SD_ILS:1189594 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Manzuik, Steve.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=280219">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Firewall Policies and VPN Configurations. ent://SD_ILS/0/SD_ILS:1188302 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=272100">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Designing and Building Enterprise DMZs. ent://SD_ILS/0/SD_ILS:1195844 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Flynn, Hal.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=319198">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Enemy at the Water Cooler : True Stories of Insider Threats and Enterprise Security Management Countermeasures. ent://SD_ILS/0/SD_ILS:1192026 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Contos, Brian T.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294116">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Host Integrity Monitoring Using Osiris and Samhain : Using Osiris and Samhain. ent://SD_ILS/0/SD_ILS:1183953 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Wotring, Brian.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=233599">Click to View</a><br/>Format:&#160;Electronic Resources<br/> WebSphere Application Server for z/OS V5 and J2EE 1.3 Security Handbook. ent://SD_ILS/0/SD_ILS:1309773 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306382">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IBM System z9 109 Technical Introduction. ent://SD_ILS/0/SD_ILS:1309973 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306582">Click to View</a><br/>Format:&#160;Electronic Resources<br/> z/OS Diagnostic Data : Collection and Analysis. ent://SD_ILS/0/SD_ILS:1310161 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306770">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Distributed Security and High Availability with Tivoli Access Manager and WebSphere Application Server for z/OS. ent://SD_ILS/0/SD_ILS:1309993 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306602">Click to View</a><br/>Format:&#160;Electronic Resources<br/> z/OS 1.6 Security Services Update. ent://SD_ILS/0/SD_ILS:1309844 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306453">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Identity and Access Management Solutions Using WebSphere Portal V5.1, Tivoli Identity Manager V4.5.1, and Tivoli Access Manager V5.1. ent://SD_ILS/0/SD_ILS:1309937 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306546">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Secure Production Deployment of B2B Solutions using WebSphere Business Integration Connect. ent://SD_ILS/0/SD_ILS:1309847 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306456">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Nessus, Snort, &amp; Ethereal Power Tools : Customizing Open Source Security Applications. ent://SD_ILS/0/SD_ILS:1186051 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Caswell, Brian.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254839">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing IM and P2P Applications for the Enterprise. ent://SD_ILS/0/SD_ILS:1186059 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Sachs, Marcus.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254847">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Buffer Overflow Attacks : Detect, Exploit, Prevent. ent://SD_ILS/0/SD_ILS:1182500 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Deckard, Jason.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=222803">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Insider Threat : Protecting the Enterprise from Sabotage, Spying, and Theft. ent://SD_ILS/0/SD_ILS:1186061 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Cole, Eric.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254849">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Intrusion Prevention and Active Response : Deploying Network and Host IPS. ent://SD_ILS/0/SD_ILS:1183111 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Rash, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=226578">Click to View</a><br/>Format:&#160;Electronic Resources<br/> How to Cheat at Designing Security for a Windows Server 2003 Network. ent://SD_ILS/0/SD_ILS:1186044 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Ruston, Chris.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254832">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cisco PIX Firewalls : Configure / Manage / Troubleshoot. ent://SD_ILS/0/SD_ILS:1186047 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Browne, Brian.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254835">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network Security Evaluation Using the NSA IEM : Using the NSA IEM. ent://SD_ILS/0/SD_ILS:1186054 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Rogers, Russ.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254842">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Virtual Private Networking : A Construction, Operation and Utilization Guide. ent://SD_ILS/0/SD_ILS:1209924 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Held, Gilbert.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=470565">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Implementing SSH : Strategies for Optimizing the Secure Shell. ent://SD_ILS/0/SD_ILS:1182003 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Dwivedi, Himanshu.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=215119">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Implementing PKI Services on z/OS. ent://SD_ILS/0/SD_ILS:1310268 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306877">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Internet Applications : The Emerging Global Computer. ent://SD_ILS/0/SD_ILS:1326747 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Patch, Kimberly.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3411450">Click to View</a><br/>Format:&#160;Electronic Resources<br/> MCSE Designing Security for a Windows Server 2003 Network (Exam 70-298) : Study Guide and DVD Training System. ent://SD_ILS/0/SD_ILS:1192072 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294253">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer Forensics JumpStart. ent://SD_ILS/0/SD_ILS:1187109 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Solomon, Micah.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=267268">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network and security issues. ent://SD_ILS/0/SD_ILS:1191149 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Raitt, Dr. David.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=289848">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Configuring NetScreen Firewalls. ent://SD_ILS/0/SD_ILS:1192005 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z <a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294055">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking the Code : Auditor's Guide to Writing Secure Code for the Web. ent://SD_ILS/0/SD_ILS:1192048 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Burnett, Mark.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294160">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Dr. Tom Shinder's Configuring ISA Server 2004. ent://SD_ILS/0/SD_ILS:1192022 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Littlejohn Shinder, Debra.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294094">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Ethereal Packet Sniffing. ent://SD_ILS/0/SD_ILS:1192028 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294122">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber Adversary Characterization : Auditing the Hacker Mind. ent://SD_ILS/0/SD_ILS:1192012 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Parker, Tom.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294071">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Nessus Network Auditing : Jay Beale Open Source Security Series. ent://SD_ILS/0/SD_ILS:1192079 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Beale, Jay.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294281">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security Sage's Guide to Hardening the Network Infrastructure. ent://SD_ILS/0/SD_ILS:1192108 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Andres, Steven.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294359">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Code Hacking : A Developer's Guide to Network Security. ent://SD_ILS/0/SD_ILS:1304436 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Conway, Richard.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3135681">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security Configuration in a TCP/IP Sysplex Environment. ent://SD_ILS/0/SD_ILS:1310052 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306661">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security : Secrets, Intruders and ID Tags. ent://SD_ILS/0/SD_ILS:1326744 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Patch, Kimberly.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3411447">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Business Portals II with IBM Tivoli Access Manager. ent://SD_ILS/0/SD_ILS:1310148 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306757">Click to View</a><br/>Format:&#160;Electronic Resources<br/> z/OS WebSphere and J2EE Security Handbook. ent://SD_ILS/0/SD_ILS:1310011 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306620">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Configuring Symantec AntiVirus Enterprise Edition. ent://SD_ILS/0/SD_ILS:1192006 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294056">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Defense and Detection Strategies against Internet Worms. ent://SD_ILS/0/SD_ILS:1183369 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Nazario, Jose.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227660">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The Best Damn Firewall Book Period. ent://SD_ILS/0/SD_ILS:1192121 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294396">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Special Ops : Host and Network Security for Microsoft Unix and Oracle. ent://SD_ILS/0/SD_ILS:1192113 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294373">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Building DMZs For Enterprise Networks. ent://SD_ILS/0/SD_ILS:1191988 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294015">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cisco Security Professional's Guide to Secure Intrusion Detection Systems. ent://SD_ILS/0/SD_ILS:1191995 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294035">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Invasion of Privacy : Big Brother and the Company Hackers. ent://SD_ILS/0/SD_ILS:1304380 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Weber, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3135625">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Internet Under Crisis Conditions : Learning from September 11. ent://SD_ILS/0/SD_ILS:1317460 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Conditions, Committee on the Internet Under Crisis.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3375369">Click to View</a><br/>Format:&#160;Electronic Resources<br/> ExamWise For CIW Security Profefssional Certification : Exam 1D0-470. ent://SD_ILS/0/SD_ILS:1326655 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Bayer, Chad.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3410580">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Communication Electronic Warfare Systems. ent://SD_ILS/0/SD_ILS:1183329 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Poisel, Richard.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227618">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hack Proofing ColdFusion : The Only Way to Stop a Hacker Is to Think Like One. ent://SD_ILS/0/SD_ILS:1192040 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294151">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hackproofing Your Wireless Network. ent://SD_ILS/0/SD_ILS:1192049 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294161">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cisco Security Specialists Guide to PIX Firewall. ent://SD_ILS/0/SD_ILS:1191996 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294036">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Nokia Network Security Solutions Handbook. ent://SD_ILS/0/SD_ILS:1192081 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294289">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Internet Security and Firewalls. ent://SD_ILS/0/SD_ILS:1304487 2024-06-23T16:32:53Z 2024-06-23T16:32:53Z by&#160;Preetham, V.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3135734">Click to View</a><br/>Format:&#160;Electronic Resources<br/>