Search Results for - Narrowed by: Computer security. - 2004 SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092004$0025092004$0026ps$003d300? 2024-06-08T23:04:28Z zSeries Trusted Key Entry (TKE) V4.2 Update. ent://SD_ILS/0/SD_ILS:1310067 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306676">Click to View</a><br/>Format:&#160;Electronic Resources<br/> iSeries Access for Windows V5R2 Hot Topics : Tailored Images, Application Administration, SSL, and Kerberos. ent://SD_ILS/0/SD_ILS:1310090 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306699">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Click, Click, Who's There? : A Family-Based, Non-Technical Approach to Help Parents Protect Their Children Online. ent://SD_ILS/0/SD_ILS:1197587 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Koh, Lisa.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=338852">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IT security advice from experts ent://SD_ILS/0/SD_ILS:2261685 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Oliva, Lawrence M.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-247-3">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-247-3</a><br/>Format:&#160;Electronic Resources<br/> Information security policies and actions in modern integrated systems ent://SD_ILS/0/SD_ILS:2261599 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Fugini, Mariagrazia, 1957-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-186-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-186-5</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Java security : building secure J2EE applications ent://SD_ILS/0/SD_ILS:2281355 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Pistoia, Marco.<br/><a href="https://learning.oreilly.com/library/view/~/0321118898">https://learning.oreilly.com/library/view/~/0321118898</a> <a href="https://learning.oreilly.com/library/view/~/0321118898/?ar">https://learning.oreilly.com/library/view/~/0321118898/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0321118898/?ar">https://go.oreilly.com/library-access/library/view/-/0321118898/?ar</a><br/>Format:&#160;Electronic Resources<br/> Snort 2.1 intrusion detection ent://SD_ILS/0/SD_ILS:2283640 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Beale, Jay.<br/><a href="https://www.sciencedirect.com/science/book/9781931836043">https://www.sciencedirect.com/science/book/9781931836043</a> <a href="https://learning.oreilly.com/library/view/~/9781931836043/?ar">https://learning.oreilly.com/library/view/~/9781931836043/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781931836043/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836043/?ar</a><br/>Format:&#160;Electronic Resources<br/> Effective Oracle Database 10g security by design ent://SD_ILS/0/SD_ILS:2285082 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Knox, David (David C.)<br/><a href="https://learning.oreilly.com/library/view/~/9780072231304/?ar">https://learning.oreilly.com/library/view/~/9780072231304/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780072231304/?ar">https://go.oreilly.com/library-access/library/view/-/9780072231304/?ar</a><br/>Format:&#160;Electronic Resources<br/> IBM eserver zSeries 990 (z990) cryptography implementation ent://SD_ILS/0/SD_ILS:2283292 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Rayns, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/0738490369">https://learning.oreilly.com/library/view/~/0738490369</a> <a href="https://learning.oreilly.com/library/view/~/0738490369/?ar">https://learning.oreilly.com/library/view/~/0738490369/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0738490369/?ar">https://go.oreilly.com/library-access/library/view/-/0738490369/?ar</a><br/>Format:&#160;Electronic Resources<br/> The effective incident response team ent://SD_ILS/0/SD_ILS:2284736 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Lucas, Julie, 1964-<br/><a href="https://learning.oreilly.com/library/view/~/0201761750">https://learning.oreilly.com/library/view/~/0201761750</a> <a href="https://learning.oreilly.com/library/view/~/0201761750/?ar">https://learning.oreilly.com/library/view/~/0201761750/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0201761750/?ar">https://go.oreilly.com/library-access/library/view/-/0201761750/?ar</a><br/>Format:&#160;Electronic Resources<br/> The shellcoder's handbook : discovering and exploiting security holes ent://SD_ILS/0/SD_ILS:2281833 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Koziol, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/9780764544682">https://learning.oreilly.com/library/view/~/9780764544682</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780764544682/?ar">https://go.oreilly.com/library-access/library/view/-/9780764544682/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780764544682/?ar">https://learning.oreilly.com/library/view/~/9780764544682/?ar</a><br/>Format:&#160;Electronic Resources<br/> Buffer-Overflows und Format-String-Schwachstellen : Funktionsweisen, Exploits und Gegenmassnahmen ent://SD_ILS/0/SD_ILS:2286451 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Klein, Tobias.<br/><a href="https://learning.oreilly.com/library/view/~/9783898641920/?ar">https://learning.oreilly.com/library/view/~/9783898641920/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783898641920/?ar">https://go.oreilly.com/library-access/library/view/-/9783898641920/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783898641920">https://learning.oreilly.com/library/view/~/9783898641920</a><br/>Format:&#160;Electronic Resources<br/> Managing security with Snort and IDS tools ent://SD_ILS/0/SD_ILS:2291450 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Cox, Kerry.<br/><a href="https://learning.oreilly.com/library/view/~/0596006616">https://learning.oreilly.com/library/view/~/0596006616</a> <a href="https://learning.oreilly.com/library/view/~/0596006616/?ar">https://learning.oreilly.com/library/view/~/0596006616/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596006616/?ar">https://go.oreilly.com/library-access/library/view/-/0596006616/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network security hacks ent://SD_ILS/0/SD_ILS:2281377 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Lockhart, Andrew.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596006438/?ar">https://go.oreilly.com/library-access/library/view/-/0596006438/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596006438/?ar">https://learning.oreilly.com/library/view/~/0596006438/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0596006438">https://learning.oreilly.com/library/view/~/0596006438</a><br/>Format:&#160;Electronic Resources<br/> Defend I.T. : security by example ent://SD_ILS/0/SD_ILS:2281496 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Gupta, Ajay.<br/><a href="https://learning.oreilly.com/library/view/~/0321197674">https://learning.oreilly.com/library/view/~/0321197674</a> <a href="https://learning.oreilly.com/library/view/~/0321197674/?ar">https://learning.oreilly.com/library/view/~/0321197674/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0321197674/?ar">https://go.oreilly.com/library-access/library/view/-/0321197674/?ar</a><br/>Format:&#160;Electronic Resources<br/> HP Nonstop server security : a practical handbook ent://SD_ILS/0/SD_ILS:2281922 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Hill, Terri.<br/><a href="https://learning.oreilly.com/library/view/~/9781555583149">https://learning.oreilly.com/library/view/~/9781555583149</a> <a href="https://learning.oreilly.com/library/view/~/9781555583149/?ar">https://learning.oreilly.com/library/view/~/9781555583149/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781555583149/?ar">https://go.oreilly.com/library-access/library/view/-/9781555583149/?ar</a> <a href="https://www.sciencedirect.com/science/book/9781555583149">https://www.sciencedirect.com/science/book/9781555583149</a><br/>Format:&#160;Electronic Resources<br/> Security assessment case studies for implementing the NSA IAM ent://SD_ILS/0/SD_ILS:65938 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Rogers, Russ.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266962">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Implementing homeland security for enterprise IT ent://SD_ILS/0/SD_ILS:65621 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Erbschloe, Michael, 1951-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">An electronic book accessible through the World Wide Web; click for information</a> Table of contents <a href="http://www.loc.gov/catdir/toc/els051/2003062590.html">http://www.loc.gov/catdir/toc/els051/2003062590.html</a> Publisher description <a href="http://www.loc.gov/catdir/description/els041/2003062590.html">http://www.loc.gov/catdir/description/els041/2003062590.html</a><br/>Format:&#160;Electronic Resources<br/> Nessus network auditing ent://SD_ILS/0/SD_ILS:65985 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Deraison, Renaud.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836081">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Wireless operational security ent://SD_ILS/0/SD_ILS:66087 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583170">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Windows Server 2003 security infrastructures ent://SD_ILS/0/SD_ILS:66019 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Clercq, Jan de, 1968-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582838">An electronic book accessible through the World Wide Web; click for information</a> Publisher description <a href="http://www.loc.gov/catdir/description/els051/2004273211.html">http://www.loc.gov/catdir/description/els051/2004273211.html</a><br/>Format:&#160;Electronic Resources<br/> Cyber adversary characterization auditing the hacker mind ent://SD_ILS/0/SD_ILS:65579 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Parker, Tom, 1982-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836111">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Snort 2.1 intrusion detection ent://SD_ILS/0/SD_ILS:65907 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Beale, Jay.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836043">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> HP Nonstop server securit a practical handbook ent://SD_ILS/0/SD_ILS:65762 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Hill, Terri.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583149">An electronic book accessible through the World Wide Web; click for information</a> Table of contents <a href="http://www.loc.gov/catdir/toc/els051/2004296150.html">http://www.loc.gov/catdir/toc/els051/2004296150.html</a> Publisher description <a href="http://www.loc.gov/catdir/description/els051/2004296150.html">http://www.loc.gov/catdir/description/els051/2004296150.html</a><br/>Format:&#160;Electronic Resources<br/> Linux on IBM eserver zSeries and S/390 best security practices ent://SD_ILS/0/SD_ILS:2304314 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Geiselhart, Gregory.<br/><a href="https://learning.oreilly.com/library/view/~/0738497665/?ar">https://learning.oreilly.com/library/view/~/0738497665/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0738497665/?ar">https://go.oreilly.com/library-access/library/view/-/0738497665/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738497665">https://learning.oreilly.com/library/view/~/0738497665</a><br/>Format:&#160;Electronic Resources<br/> Assessing and Managing Security Risk in IT Systems ent://SD_ILS/0/SD_ILS:2326305 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;McCumber, John.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780203490426/?ar">https://go.oreilly.com/library-access/library/view/-/9780203490426/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780203490426">https://learning.oreilly.com/library/view/~/9780203490426</a> <a href="https://learning.oreilly.com/library/view/~/9780203490426/?ar">https://learning.oreilly.com/library/view/~/9780203490426/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security awareness : applying practical security in your world ent://SD_ILS/0/SD_ILS:2335737 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Ciampa, Mark D., author<br/>Format:&#160;Books<br/> Introduction to Computer Security. ent://SD_ILS/0/SD_ILS:2317980 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Bishop, Matt (Matthew A.), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321247442/?ar">https://go.oreilly.com/library-access/library/view/-/0321247442/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321247442/?ar">https://learning.oreilly.com/library/view/~/0321247442/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321247442">https://learning.oreilly.com/library/view/~/0321247442</a><br/>Format:&#160;Electronic Resources<br/> Malicious cryptography : exposing cryptovirology ent://SD_ILS/0/SD_ILS:2310281 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Young, Adam, 1972- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780764568466/?ar">https://go.oreilly.com/library-access/library/view/-/9780764568466/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780764568466">https://learning.oreilly.com/library/view/~/9780764568466</a> <a href="https://learning.oreilly.com/library/view/~/9780764568466/?ar">https://learning.oreilly.com/library/view/~/9780764568466/?ar</a><br/>Format:&#160;Electronic Resources<br/> WarDriving drive, detect, defend : a guide to wireless security ent://SD_ILS/0/SD_ILS:65805 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Hurley, Chris.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836036">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Protecting Your Library's Digital Sources : The Essential Guide to Planning and Preservation. ent://SD_ILS/0/SD_ILS:1182414 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Kahn, Miriam B.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=218937">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Finding and Fixing Vulnerabilities in Information Systems : The Vulnerability Assessment and Mitigation Methodology. ent://SD_ILS/0/SD_ILS:1181099 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Anton, Philip S.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=197482">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Intelligent Watermarking Techniques : Series On Innovative Intelligence. ent://SD_ILS/0/SD_ILS:1183629 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Pan, Jeng-Shyang.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=231561">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer Forensics JumpStart. ent://SD_ILS/0/SD_ILS:1187109 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Solomon, Micah.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=267268">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Stealing the Network : How to Own a Continent. ent://SD_ILS/0/SD_ILS:1192116 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Russell, Ryan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294377">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Dr. Tom Shinder's Configuring ISA Server 2004. ent://SD_ILS/0/SD_ILS:1192022 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Littlejohn Shinder, Debra.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294094">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Ethereal Packet Sniffing. ent://SD_ILS/0/SD_ILS:1192028 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294122">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Google Hacking for Penetration Testers. ent://SD_ILS/0/SD_ILS:1192039 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Long, Johnny.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294147">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking the Code : Auditor's Guide to Writing Secure Code for the Web. ent://SD_ILS/0/SD_ILS:1192048 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Burnett, Mark.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294160">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber Adversary Characterization : Auditing the Hacker Mind. ent://SD_ILS/0/SD_ILS:1192012 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Parker, Tom.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294071">Click to View</a><br/>Format:&#160;Electronic Resources<br/> MCSE Designing Security for a Windows Server 2003 Network (Exam 70-298) : Study Guide and DVD Training System. ent://SD_ILS/0/SD_ILS:1192072 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294253">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Programmer's Ultimate Security DeskRef : Your Programming Security Encyclopedia. ent://SD_ILS/0/SD_ILS:1192097 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Foster, James C.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294328">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security Sage's Guide to Hardening the Network Infrastructure. ent://SD_ILS/0/SD_ILS:1192108 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Andres, Steven.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294359">Click to View</a><br/>Format:&#160;Electronic Resources<br/> WarDriving : A Guide to Wireless Security. ent://SD_ILS/0/SD_ILS:1192135 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Hurley, Chris.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294441">Click to View</a><br/>Format:&#160;Electronic Resources<br/> User's Guide tp Crytography and Standards. ent://SD_ILS/0/SD_ILS:1183367 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Dent, Alex.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227658">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Innocent Code : A Security Wake-Up Call for Web Programmers. ent://SD_ILS/0/SD_ILS:1181920 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Huseby, Sverre H.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=210558">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Privacy Protection and Computer Forensics. ent://SD_ILS/0/SD_ILS:1183401 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Caloyannides, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227692">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Bluetooth Security. ent://SD_ILS/0/SD_ILS:1183359 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Gehrmann, Christian.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227650">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Linux on IBM eServer zSeries and S/390 : Best Security Practices. ent://SD_ILS/0/SD_ILS:1310226 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306835">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IBM eServer zSeries 990 (z990) Cryptography Implementation. ent://SD_ILS/0/SD_ILS:1310182 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306791">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Homeland Security : Techniques and Technologies. ent://SD_ILS/0/SD_ILS:1304420 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Mena, Jesus.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3135665">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Code Hacking : A Developer's Guide to Network Security. ent://SD_ILS/0/SD_ILS:1304436 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Conway, Richard.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3135681">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information security and ethics social and organizational issues ent://SD_ILS/0/SD_ILS:2261597 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Quigley, Marian.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-286-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-286-7</a><br/>Format:&#160;Electronic Resources<br/> Privacy What Developers and IT Professionals Should Know ent://SD_ILS/0/SD_ILS:2319742 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Cannon, J., author.<br/><a href="https://learning.oreilly.com/library/view/~/0321224094">https://learning.oreilly.com/library/view/~/0321224094</a> <a href="https://learning.oreilly.com/library/view/~/0321224094/?ar">https://learning.oreilly.com/library/view/~/0321224094/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0321224094/?ar">https://go.oreilly.com/library-access/library/view/-/0321224094/?ar</a><br/>Format:&#160;Electronic Resources<br/> The .NET developer's guide to Windows security ent://SD_ILS/0/SD_ILS:2324153 2024-06-08T23:04:28Z 2024-06-08T23:04:28Z by&#160;Brown, Keith, 1967 March 16-<br/><a href="https://learning.oreilly.com/library/view/~/0321228359">https://learning.oreilly.com/library/view/~/0321228359</a> <a href="https://learning.oreilly.com/library/view/~/0321228359/?ar">https://learning.oreilly.com/library/view/~/0321228359/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0321228359/?ar">https://go.oreilly.com/library-access/library/view/-/0321228359/?ar</a><br/>Format:&#160;Electronic Resources<br/>