Search Results for - Narrowed by: Computer security. - OnlineSirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AONLINE$002509Online$0026ps$003d300?2024-06-01T12:25:28ZCyber blockadesent://SD_ILS/0/SD_ILS:5279062024-06-01T12:25:28Z2024-06-01T12:25:28Zby Russell, Alison Lawlor, author.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=860030">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=860030</a><br/>Format: Electronic Resources<br/>IT-Sicherheit Konzepte - Verfahren - Protokolle.ent://SD_ILS/0/SD_ILS:5281052024-06-01T12:25:28Z2024-06-01T12:25:28Zby Eckert, Claudia.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=757549">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=757549</a><br/>Format: Electronic Resources<br/>Information security policy, processes, and practicesent://SD_ILS/0/SD_ILS:2930002024-06-01T12:25:28Z2024-06-01T12:25:28Zby Straub, Detmar W.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=275513">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=275513</a><br/>Format: Electronic Resources<br/>Infosecurity 2008 threat analysisent://SD_ILS/0/SD_ILS:3437392024-06-01T12:25:28Z2024-06-01T12:25:28Zby Clark, Champ, III.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=227542">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=227542</a><br/>Format: Electronic Resources<br/>Microsoft windows security fundamentalsent://SD_ILS/0/SD_ILS:642212024-06-01T12:25:28Z2024-06-01T12:25:28Zby Clercq, Jan de, 1968-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583408">An electronic book accessible through the World Wide Web; click for information</a>
Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0707/2007270083-d.html">http://www.loc.gov/catdir/enhancements/fy0707/2007270083-d.html</a><br/>Format: Electronic Resources<br/>Security convergence managing enterprise security riskent://SD_ILS/0/SD_ILS:642452024-06-01T12:25:28Z2024-06-01T12:25:28Zby Tyson, Dave.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750684255">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Windows forensic analysis DVD toolkitent://SD_ILS/0/SD_ILS:642462024-06-01T12:25:28Z2024-06-01T12:25:28Zby Carvey, Harlan A.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491563">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>How to cheat at securing sql server 2005ent://SD_ILS/0/SD_ILS:642822024-06-01T12:25:28Z2024-06-01T12:25:28Zby ScienceDirect (Online service)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491969">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Open source fuzzing toolsent://SD_ILS/0/SD_ILS:643072024-06-01T12:25:28Z2024-06-01T12:25:28Zby Rathaus, Noam<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491952">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:643362024-06-01T12:25:28Z2024-06-01T12:25:28Zby Winkler, Ira.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Developer's guide to web application securityent://SD_ILS/0/SD_ILS:642382024-06-01T12:25:28Z2024-06-01T12:25:28Zby Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Metasploit Toolkit for Penetration Testing, Exploit Development, And Vulnerabiity Researchent://SD_ILS/0/SD_ILS:641762024-06-01T12:25:28Z2024-06-01T12:25:28Zby ScienceDirect (Online service)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Botnets the killer web appent://SD_ILS/0/SD_ILS:642572024-06-01T12:25:28Z2024-06-01T12:25:28Zby Schiller, Craig A.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491358">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Techno Security's guide to managing risks for IT managers, auditors, and investigatorsent://SD_ILS/0/SD_ILS:642592024-06-01T12:25:28Z2024-06-01T12:25:28Zby Wiles, Jack.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>FISMA certification & accreditation handbookent://SD_ILS/0/SD_ILS:641902024-06-01T12:25:28Z2024-06-01T12:25:28Zby Taylor, Laura.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>The official CHFI study guide (Exam 312-49) for computer hacking forensic investigator.ent://SD_ILS/0/SD_ILS:643002024-06-01T12:25:28Z2024-06-01T12:25:28Zby Kleiman, Dave.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491976">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>WarDriving & wireless penetration testingent://SD_ILS/0/SD_ILS:643172024-06-01T12:25:28Z2024-06-01T12:25:28Zby Hurley, Chris.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491112">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Microsoft Vista for IT security professionalsent://SD_ILS/0/SD_ILS:642082024-06-01T12:25:28Z2024-06-01T12:25:28Zby Piltzecker, Tony, 1975-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491396">An electronic book accessible through the World Wide Web; click for information</a>
Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0713/2007296500-d.html">http://www.loc.gov/catdir/enhancements/fy0713/2007296500-d.html</a><br/>Format: Electronic Resources<br/>FISMA certification & accreditation handbookent://SD_ILS/0/SD_ILS:3417002024-06-01T12:25:28Z2024-06-01T12:25:28Zby Taylor, Laura.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179012">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179012</a><br/>Format: Electronic Resources<br/>Botnets the killer web appent://SD_ILS/0/SD_ILS:3401602024-06-01T12:25:28Z2024-06-01T12:25:28Zby Schiller, Craig A.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=184406">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=184406</a><br/>Format: Electronic Resources<br/>Techno security's guide to e-discovery and digital forensicsent://SD_ILS/0/SD_ILS:3432012024-06-01T12:25:28Z2024-06-01T12:25:28Zby Wiles, Jack.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=239209">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=239209</a><br/>Format: Electronic Resources<br/>Hack the stack using snort and ethereal to master the 8 layers of an insecure networkent://SD_ILS/0/SD_ILS:642272024-06-01T12:25:28Z2024-06-01T12:25:28Zby Gregg, Michael (Michael C.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>BigNum math implementing cryptographic multiple precision arithmeticent://SD_ILS/0/SD_ILS:654382024-06-01T12:25:28Z2024-06-01T12:25:28Zby St. Denis, Tom.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491129">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Securing IM and P2P applications for the enterpriseent://SD_ILS/0/SD_ILS:659182024-06-01T12:25:28Z2024-06-01T12:25:28Zby Piccard, Paul L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490177">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Penetration tester's open source toolkit.ent://SD_ILS/0/SD_ILS:657972024-06-01T12:25:28Z2024-06-01T12:25:28Zby Long, Johnny.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490214">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Insider threat protecting the enterprise from sabotage, spying, and theftent://SD_ILS/0/SD_ILS:656912024-06-01T12:25:28Z2024-06-01T12:25:28Zby Cole, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490481">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Trusted platform module basics using TPM in embedded systemsent://SD_ILS/0/SD_ILS:655382024-06-01T12:25:28Z2024-06-01T12:25:28Zby Kinney, Steven L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679602">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Essential computer security everyone's guide to e-mail, Internet, and wireless securityent://SD_ILS/0/SD_ILS:643242024-06-01T12:25:28Z2024-06-01T12:25:28Zby Bradley, Tony, 1969-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491143">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Securing HP NonStop servers in an open systems world TCP/IP, OSS & SQLent://SD_ILS/0/SD_ILS:659062024-06-01T12:25:28Z2024-06-01T12:25:28Zby XYPRO Technology Corporation.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583446">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Combating spyware in the enterpriseent://SD_ILS/0/SD_ILS:657482024-06-01T12:25:28Z2024-06-01T12:25:28Zby Baskin, Brian.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490641">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>How to cheat at Windows System Administration using command line scriptsent://SD_ILS/0/SD_ILS:642612024-06-01T12:25:28Z2024-06-01T12:25:28Zby Bhardwaj, Pawan K.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491051">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasuresent://SD_ILS/0/SD_ILS:642702024-06-01T12:25:28Z2024-06-01T12:25:28Zby Contos, Brian T.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491297">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Multimedia security technologies for digital rights managementent://SD_ILS/0/SD_ILS:652722024-06-01T12:25:28Z2024-06-01T12:25:28Zby Zeng, Wenjun, 1967-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123694768">An electronic book accessible through the World Wide Web; click for information</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/ecip067/2006003179.html">http://www.loc.gov/catdir/toc/ecip067/2006003179.html</a>
Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0629/2006003179-d.html">http://www.loc.gov/catdir/enhancements/fy0629/2006003179-d.html</a><br/>Format: Electronic Resources<br/>The secure online business handbook a practical guide to risk management and business continuityent://SD_ILS/0/SD_ILS:2806292024-06-01T12:25:28Z2024-06-01T12:25:28Zby Reuvid, Jonathan.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=165969">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=165969</a><br/>Format: Electronic Resources<br/>Syngress force emerging threat analysis from mischief to maliciousent://SD_ILS/0/SD_ILS:213582024-06-01T12:25:28Z2024-06-01T12:25:28Zby Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Syngress force emerging threat analysis from mischief to maliciousent://SD_ILS/0/SD_ILS:3402022024-06-01T12:25:28Z2024-06-01T12:25:28Zby Maynor, David.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174833">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174833</a><br/>Format: Electronic Resources<br/>Combating spyware in the enterpriseent://SD_ILS/0/SD_ILS:3399752024-06-01T12:25:28Z2024-06-01T12:25:28Zby Baskin, Brian.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=173423">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=173423</a><br/>Format: Electronic Resources<br/>Hack the stack using snort and ethereal to master the 8 layers of an insecure networkent://SD_ILS/0/SD_ILS:3399852024-06-01T12:25:28Z2024-06-01T12:25:28Zby Gregg, Michael (Michael C.)<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174832">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174832</a><br/>Format: Electronic Resources<br/>Aggressive network self-defenseent://SD_ILS/0/SD_ILS:654372024-06-01T12:25:28Z2024-06-01T12:25:28Zby Archibald, Neil.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Buffer overflow attacks detect, exploit, preventent://SD_ILS/0/SD_ILS:655432024-06-01T12:25:28Z2024-06-01T12:25:28Zby Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266672">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Implementing database security and auditing a guide for DBAs, information security administrators and auditorsent://SD_ILS/0/SD_ILS:656752024-06-01T12:25:28Z2024-06-01T12:25:28Zby Ben-Natan, Ron.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>IM, instant messaging, securityent://SD_ILS/0/SD_ILS:657782024-06-01T12:25:28Z2024-06-01T12:25:28Zby Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583385">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Software piracy exposedent://SD_ILS/0/SD_ILS:659652024-06-01T12:25:28Z2024-06-01T12:25:28Zby Craig, Paul.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266986">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>The art of intrusion the real stories behind the exploits of hackers, intruders & deceiversent://SD_ILS/0/SD_ILS:3347082024-06-01T12:25:28Z2024-06-01T12:25:28Zby Mitnick, Kevin D. (Kevin David), 1963-<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=127892">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=127892</a><br/>Format: Electronic Resources<br/>Reversing the hacker's guide to reverse engineeringent://SD_ILS/0/SD_ILS:3347432024-06-01T12:25:28Z2024-06-01T12:25:28Zby Eilam, Eldad.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=130978">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=130978</a><br/>Format: Electronic Resources<br/>Nessus network auditingent://SD_ILS/0/SD_ILS:659852024-06-01T12:25:28Z2024-06-01T12:25:28Zby Deraison, Renaud.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836081">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Cyber adversary characterization auditing the hacker mindent://SD_ILS/0/SD_ILS:655792024-06-01T12:25:28Z2024-06-01T12:25:28Zby Parker, Tom, 1982-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836111">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Security assessment case studies for implementing the NSA IAMent://SD_ILS/0/SD_ILS:659382024-06-01T12:25:28Z2024-06-01T12:25:28Zby Rogers, Russ.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266962">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>HP Nonstop server securit a practical handbookent://SD_ILS/0/SD_ILS:657622024-06-01T12:25:28Z2024-06-01T12:25:28Zby Hill, Terri.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583149">An electronic book accessible through the World Wide Web; click for information</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/els051/2004296150.html">http://www.loc.gov/catdir/toc/els051/2004296150.html</a>
Publisher description <a href="http://www.loc.gov/catdir/description/els051/2004296150.html">http://www.loc.gov/catdir/description/els051/2004296150.html</a><br/>Format: Electronic Resources<br/>Implementing homeland security for enterprise ITent://SD_ILS/0/SD_ILS:656212024-06-01T12:25:28Z2024-06-01T12:25:28Zby Erbschloe, Michael, 1951-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">An electronic book accessible through the World Wide Web; click for information</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/els051/2003062590.html">http://www.loc.gov/catdir/toc/els051/2003062590.html</a>
Publisher description <a href="http://www.loc.gov/catdir/description/els041/2003062590.html">http://www.loc.gov/catdir/description/els041/2003062590.html</a><br/>Format: Electronic Resources<br/>Snort 2.1 intrusion detectionent://SD_ILS/0/SD_ILS:659072024-06-01T12:25:28Z2024-06-01T12:25:28Zby Beale, Jay.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836043">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Windows Server 2003 security infrastructuresent://SD_ILS/0/SD_ILS:660192024-06-01T12:25:28Z2024-06-01T12:25:28Zby Clercq, Jan de, 1968-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582838">An electronic book accessible through the World Wide Web; click for information</a>
Publisher description <a href="http://www.loc.gov/catdir/description/els051/2004273211.html">http://www.loc.gov/catdir/description/els051/2004273211.html</a><br/>Format: Electronic Resources<br/>WarDriving drive, detect, defend : a guide to wireless securityent://SD_ILS/0/SD_ILS:658052024-06-01T12:25:28Z2024-06-01T12:25:28Zby Hurley, Chris.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836036">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Wireless operational securityent://SD_ILS/0/SD_ILS:660872024-06-01T12:25:28Z2024-06-01T12:25:28Zby Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583170">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Cybersecurity operations handbookent://SD_ILS/0/SD_ILS:656262024-06-01T12:25:28Z2024-06-01T12:25:28Zby Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583064">An electronic book accessible through the World Wide Web; click for information</a>
Publisher description <a href="http://www.loc.gov/catdir/description/els031/2003051481.html">http://www.loc.gov/catdir/description/els031/2003051481.html</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/els031/2003051481.html">http://www.loc.gov/catdir/toc/els031/2003051481.html</a><br/>Format: Electronic Resources<br/>Snort 2.0 intrusion detectionent://SD_ILS/0/SD_ILS:659192024-06-01T12:25:28Z2024-06-01T12:25:28Zby Beale, Jay.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836746">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Internet security a jumpstart for systems administrators and IT managersent://SD_ILS/0/SD_ILS:656312024-06-01T12:25:28Z2024-06-01T12:25:28Zby Speed, Tim.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582982">An electronic book accessible through the World Wide Web; click for information</a>
Publisher description <a href="http://www.loc.gov/catdir/description/els041/2003279708.html">http://www.loc.gov/catdir/description/els041/2003279708.html</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/els041/2003279708.html">http://www.loc.gov/catdir/toc/els041/2003279708.html</a><br/>Format: Electronic Resources<br/>Cisco security professional's guide to secure intrusion detection systemsent://SD_ILS/0/SD_ILS:657282024-06-01T12:25:28Z2024-06-01T12:25:28Zby Burton, James.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266696">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Cybersecurity operations handbookent://SD_ILS/0/SD_ILS:3415542024-06-01T12:25:28Z2024-06-01T12:25:28Zby Rittinghouse, John W.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=207316">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=207316</a><br/>Format: Electronic Resources<br/>Scene of the cybercrime computer forensics handbookent://SD_ILS/0/SD_ILS:658712024-06-01T12:25:28Z2024-06-01T12:25:28Zby Shinder, Debra Littlejohn.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836654">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Hack proofing XMLent://SD_ILS/0/SD_ILS:657232024-06-01T12:25:28Z2024-06-01T12:25:28Zby 'ken'@ftu.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836500">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Hack proofing ColdFusionent://SD_ILS/0/SD_ILS:656462024-06-01T12:25:28Z2024-06-01T12:25:28Zby Meyer, Greg.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994770">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Information security best practices 205 basic rulesent://SD_ILS/0/SD_ILS:650922024-06-01T12:25:28Z2024-06-01T12:25:28Zby Stefanek, George L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781878707963">An electronic book accessible through the World Wide Web; click for information</a>
Publisher description <a href="http://www.loc.gov/catdir/description/els031/2002016635.html">http://www.loc.gov/catdir/description/els031/2002016635.html</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/els031/2002016635.html">http://www.loc.gov/catdir/toc/els031/2002016635.html</a><br/>Format: Electronic Resources<br/>Hack proofing Linux a guide to open source securityent://SD_ILS/0/SD_ILS:656652024-06-01T12:25:28Z2024-06-01T12:25:28Zby Stanger, James.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994343">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Hack proofing Windows 2000 Serverent://SD_ILS/0/SD_ILS:656892024-06-01T12:25:28Z2024-06-01T12:25:28Zby Todd, Chad.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836494">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Digital watermarkingent://SD_ILS/0/SD_ILS:656542024-06-01T12:25:28Z2024-06-01T12:25:28Zby Cox, I. J. (Ingemar J.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607149">An electronic book accessible through the World Wide Web; click for information</a>
Publisher description <a href="http://www.loc.gov/catdir/description/els031/2001094368.html">http://www.loc.gov/catdir/description/els031/2001094368.html</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/els031/2001094368.html">http://www.loc.gov/catdir/toc/els031/2001094368.html</a><br/>Format: Electronic Resources<br/>Hack proofing Sun Solaris 8ent://SD_ILS/0/SD_ILS:656732024-06-01T12:25:28Z2024-06-01T12:25:28Zby Miles, Wyman.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994442">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Hack proofing your Web applicationsent://SD_ILS/0/SD_ILS:657612024-06-01T12:25:28Z2024-06-01T12:25:28Zby Traxler, Julie.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994312">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Data privacy in the information ageent://SD_ILS/0/SD_ILS:2651402024-06-01T12:25:28Z2024-06-01T12:25:28Zby Klosek, Jacqueline, 1972-<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=69194">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=69194</a><br/>Format: Electronic Resources<br/>