Search Results for - Narrowed by: Computer security. - Online SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AONLINE$002509Online$0026ps$003d300? 2024-06-01T12:25:28Z Cyber blockades ent://SD_ILS/0/SD_ILS:527906 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Russell, Alison Lawlor, author.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=860030">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=860030</a><br/>Format:&#160;Electronic Resources<br/> IT-Sicherheit Konzepte - Verfahren - Protokolle. ent://SD_ILS/0/SD_ILS:528105 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Eckert, Claudia.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=757549">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=757549</a><br/>Format:&#160;Electronic Resources<br/> Information security policy, processes, and practices ent://SD_ILS/0/SD_ILS:293000 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Straub, Detmar W.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=275513">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=275513</a><br/>Format:&#160;Electronic Resources<br/> Infosecurity 2008 threat analysis ent://SD_ILS/0/SD_ILS:343739 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Clark, Champ, III.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=227542">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=227542</a><br/>Format:&#160;Electronic Resources<br/> Microsoft windows security fundamentals ent://SD_ILS/0/SD_ILS:64221 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Clercq, Jan de, 1968-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583408">An electronic book accessible through the World Wide Web; click for information</a> Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0707/2007270083-d.html">http://www.loc.gov/catdir/enhancements/fy0707/2007270083-d.html</a><br/>Format:&#160;Electronic Resources<br/> Security convergence managing enterprise security risk ent://SD_ILS/0/SD_ILS:64245 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Tyson, Dave.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750684255">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Windows forensic analysis DVD toolkit ent://SD_ILS/0/SD_ILS:64246 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Carvey, Harlan A.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491563">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at securing sql server 2005 ent://SD_ILS/0/SD_ILS:64282 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;ScienceDirect (Online service)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491969">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Open source fuzzing tools ent://SD_ILS/0/SD_ILS:64307 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Rathaus, Noam<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491952">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Zen and the art of information security ent://SD_ILS/0/SD_ILS:64336 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Winkler, Ira.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Developer's guide to web application security ent://SD_ILS/0/SD_ILS:64238 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Metasploit Toolkit for Penetration Testing, Exploit Development, And Vulnerabiity Research ent://SD_ILS/0/SD_ILS:64176 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;ScienceDirect (Online service)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Botnets the killer web app ent://SD_ILS/0/SD_ILS:64257 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Schiller, Craig A.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491358">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Techno Security's guide to managing risks for IT managers, auditors, and investigators ent://SD_ILS/0/SD_ILS:64259 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Wiles, Jack.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> FISMA certification &amp; accreditation handbook ent://SD_ILS/0/SD_ILS:64190 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Taylor, Laura.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> The official CHFI study guide (Exam 312-49) for computer hacking forensic investigator. ent://SD_ILS/0/SD_ILS:64300 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Kleiman, Dave.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491976">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> WarDriving &amp; wireless penetration testing ent://SD_ILS/0/SD_ILS:64317 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Hurley, Chris.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491112">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Vista for IT security professionals ent://SD_ILS/0/SD_ILS:64208 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Piltzecker, Tony, 1975-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491396">An electronic book accessible through the World Wide Web; click for information</a> Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0713/2007296500-d.html">http://www.loc.gov/catdir/enhancements/fy0713/2007296500-d.html</a><br/>Format:&#160;Electronic Resources<br/> FISMA certification &amp; accreditation handbook ent://SD_ILS/0/SD_ILS:341700 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Taylor, Laura.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179012">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179012</a><br/>Format:&#160;Electronic Resources<br/> Botnets the killer web app ent://SD_ILS/0/SD_ILS:340160 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Schiller, Craig A.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=184406">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=184406</a><br/>Format:&#160;Electronic Resources<br/> Techno security's guide to e-discovery and digital forensics ent://SD_ILS/0/SD_ILS:343201 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Wiles, Jack.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=239209">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=239209</a><br/>Format:&#160;Electronic Resources<br/> Hack the stack using snort and ethereal to master the 8 layers of an insecure network ent://SD_ILS/0/SD_ILS:64227 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Gregg, Michael (Michael C.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> BigNum math implementing cryptographic multiple precision arithmetic ent://SD_ILS/0/SD_ILS:65438 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;St. Denis, Tom.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491129">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Securing IM and P2P applications for the enterprise ent://SD_ILS/0/SD_ILS:65918 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Piccard, Paul L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490177">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Penetration tester's open source toolkit. ent://SD_ILS/0/SD_ILS:65797 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490214">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Insider threat protecting the enterprise from sabotage, spying, and theft ent://SD_ILS/0/SD_ILS:65691 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Cole, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490481">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Trusted platform module basics using TPM in embedded systems ent://SD_ILS/0/SD_ILS:65538 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Kinney, Steven L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679602">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Essential computer security everyone's guide to e-mail, Internet, and wireless security ent://SD_ILS/0/SD_ILS:64324 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Bradley, Tony, 1969-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491143">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Securing HP NonStop servers in an open systems world TCP/IP, OSS &amp; SQL ent://SD_ILS/0/SD_ILS:65906 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;XYPRO Technology Corporation.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583446">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Combating spyware in the enterprise ent://SD_ILS/0/SD_ILS:65748 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Baskin, Brian.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490641">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at Windows System Administration using command line scripts ent://SD_ILS/0/SD_ILS:64261 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Bhardwaj, Pawan K.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491051">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasures ent://SD_ILS/0/SD_ILS:64270 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Contos, Brian T.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491297">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Multimedia security technologies for digital rights management ent://SD_ILS/0/SD_ILS:65272 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Zeng, Wenjun, 1967-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123694768">An electronic book accessible through the World Wide Web; click for information</a> Table of contents <a href="http://www.loc.gov/catdir/toc/ecip067/2006003179.html">http://www.loc.gov/catdir/toc/ecip067/2006003179.html</a> Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0629/2006003179-d.html">http://www.loc.gov/catdir/enhancements/fy0629/2006003179-d.html</a><br/>Format:&#160;Electronic Resources<br/> The secure online business handbook a practical guide to risk management and business continuity ent://SD_ILS/0/SD_ILS:280629 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Reuvid, Jonathan.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=165969">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=165969</a><br/>Format:&#160;Electronic Resources<br/> Syngress force emerging threat analysis from mischief to malicious ent://SD_ILS/0/SD_ILS:21358 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Syngress force emerging threat analysis from mischief to malicious ent://SD_ILS/0/SD_ILS:340202 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Maynor, David.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174833">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174833</a><br/>Format:&#160;Electronic Resources<br/> Combating spyware in the enterprise ent://SD_ILS/0/SD_ILS:339975 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Baskin, Brian.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=173423">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=173423</a><br/>Format:&#160;Electronic Resources<br/> Hack the stack using snort and ethereal to master the 8 layers of an insecure network ent://SD_ILS/0/SD_ILS:339985 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Gregg, Michael (Michael C.)<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174832">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=174832</a><br/>Format:&#160;Electronic Resources<br/> Aggressive network self-defense ent://SD_ILS/0/SD_ILS:65437 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Archibald, Neil.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Buffer overflow attacks detect, exploit, prevent ent://SD_ILS/0/SD_ILS:65543 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266672">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Implementing database security and auditing a guide for DBAs, information security administrators and auditors ent://SD_ILS/0/SD_ILS:65675 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Ben-Natan, Ron.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> IM, instant messaging, security ent://SD_ILS/0/SD_ILS:65778 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583385">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Software piracy exposed ent://SD_ILS/0/SD_ILS:65965 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Craig, Paul.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266986">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> The art of intrusion the real stories behind the exploits of hackers, intruders &amp; deceivers ent://SD_ILS/0/SD_ILS:334708 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Mitnick, Kevin D. (Kevin David), 1963-<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=127892">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=127892</a><br/>Format:&#160;Electronic Resources<br/> Reversing the hacker's guide to reverse engineering ent://SD_ILS/0/SD_ILS:334743 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Eilam, Eldad.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=130978">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=130978</a><br/>Format:&#160;Electronic Resources<br/> Nessus network auditing ent://SD_ILS/0/SD_ILS:65985 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Deraison, Renaud.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836081">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Cyber adversary characterization auditing the hacker mind ent://SD_ILS/0/SD_ILS:65579 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Parker, Tom, 1982-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836111">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Security assessment case studies for implementing the NSA IAM ent://SD_ILS/0/SD_ILS:65938 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Rogers, Russ.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266962">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> HP Nonstop server securit a practical handbook ent://SD_ILS/0/SD_ILS:65762 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Hill, Terri.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583149">An electronic book accessible through the World Wide Web; click for information</a> Table of contents <a href="http://www.loc.gov/catdir/toc/els051/2004296150.html">http://www.loc.gov/catdir/toc/els051/2004296150.html</a> Publisher description <a href="http://www.loc.gov/catdir/description/els051/2004296150.html">http://www.loc.gov/catdir/description/els051/2004296150.html</a><br/>Format:&#160;Electronic Resources<br/> Implementing homeland security for enterprise IT ent://SD_ILS/0/SD_ILS:65621 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Erbschloe, Michael, 1951-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">An electronic book accessible through the World Wide Web; click for information</a> Table of contents <a href="http://www.loc.gov/catdir/toc/els051/2003062590.html">http://www.loc.gov/catdir/toc/els051/2003062590.html</a> Publisher description <a href="http://www.loc.gov/catdir/description/els041/2003062590.html">http://www.loc.gov/catdir/description/els041/2003062590.html</a><br/>Format:&#160;Electronic Resources<br/> Snort 2.1 intrusion detection ent://SD_ILS/0/SD_ILS:65907 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Beale, Jay.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836043">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Windows Server 2003 security infrastructures ent://SD_ILS/0/SD_ILS:66019 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Clercq, Jan de, 1968-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582838">An electronic book accessible through the World Wide Web; click for information</a> Publisher description <a href="http://www.loc.gov/catdir/description/els051/2004273211.html">http://www.loc.gov/catdir/description/els051/2004273211.html</a><br/>Format:&#160;Electronic Resources<br/> WarDriving drive, detect, defend : a guide to wireless security ent://SD_ILS/0/SD_ILS:65805 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Hurley, Chris.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836036">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Wireless operational security ent://SD_ILS/0/SD_ILS:66087 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583170">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity operations handbook ent://SD_ILS/0/SD_ILS:65626 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583064">An electronic book accessible through the World Wide Web; click for information</a> Publisher description <a href="http://www.loc.gov/catdir/description/els031/2003051481.html">http://www.loc.gov/catdir/description/els031/2003051481.html</a> Table of contents <a href="http://www.loc.gov/catdir/toc/els031/2003051481.html">http://www.loc.gov/catdir/toc/els031/2003051481.html</a><br/>Format:&#160;Electronic Resources<br/> Snort 2.0 intrusion detection ent://SD_ILS/0/SD_ILS:65919 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Beale, Jay.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836746">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Internet security a jumpstart for systems administrators and IT managers ent://SD_ILS/0/SD_ILS:65631 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Speed, Tim.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582982">An electronic book accessible through the World Wide Web; click for information</a> Publisher description <a href="http://www.loc.gov/catdir/description/els041/2003279708.html">http://www.loc.gov/catdir/description/els041/2003279708.html</a> Table of contents <a href="http://www.loc.gov/catdir/toc/els041/2003279708.html">http://www.loc.gov/catdir/toc/els041/2003279708.html</a><br/>Format:&#160;Electronic Resources<br/> Cisco security professional's guide to secure intrusion detection systems ent://SD_ILS/0/SD_ILS:65728 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Burton, James.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266696">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity operations handbook ent://SD_ILS/0/SD_ILS:341554 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Rittinghouse, John W.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=207316">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=207316</a><br/>Format:&#160;Electronic Resources<br/> Scene of the cybercrime computer forensics handbook ent://SD_ILS/0/SD_ILS:65871 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Shinder, Debra Littlejohn.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836654">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing XML ent://SD_ILS/0/SD_ILS:65723 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;'ken'@ftu.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836500">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing ColdFusion ent://SD_ILS/0/SD_ILS:65646 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Meyer, Greg.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994770">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Information security best practices 205 basic rules ent://SD_ILS/0/SD_ILS:65092 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Stefanek, George L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781878707963">An electronic book accessible through the World Wide Web; click for information</a> Publisher description <a href="http://www.loc.gov/catdir/description/els031/2002016635.html">http://www.loc.gov/catdir/description/els031/2002016635.html</a> Table of contents <a href="http://www.loc.gov/catdir/toc/els031/2002016635.html">http://www.loc.gov/catdir/toc/els031/2002016635.html</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing Linux a guide to open source security ent://SD_ILS/0/SD_ILS:65665 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Stanger, James.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994343">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing Windows 2000 Server ent://SD_ILS/0/SD_ILS:65689 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Todd, Chad.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836494">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Digital watermarking ent://SD_ILS/0/SD_ILS:65654 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Cox, I. J. (Ingemar J.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607149">An electronic book accessible through the World Wide Web; click for information</a> Publisher description <a href="http://www.loc.gov/catdir/description/els031/2001094368.html">http://www.loc.gov/catdir/description/els031/2001094368.html</a> Table of contents <a href="http://www.loc.gov/catdir/toc/els031/2001094368.html">http://www.loc.gov/catdir/toc/els031/2001094368.html</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing Sun Solaris 8 ent://SD_ILS/0/SD_ILS:65673 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Miles, Wyman.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994442">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing your Web applications ent://SD_ILS/0/SD_ILS:65761 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Traxler, Julie.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994312">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Data privacy in the information age ent://SD_ILS/0/SD_ILS:265140 2024-06-01T12:25:28Z 2024-06-01T12:25:28Z by&#160;Klosek, Jacqueline, 1972-<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=69194">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=69194</a><br/>Format:&#160;Electronic Resources<br/>