Search Results for - Narrowed by: Computer security. - Electronic books. -- local.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Electronic$002bbooks.$002b--$002blocal.$002509Electronic$002bbooks.$002b--$002blocal.$0026ps$003d300$0026isd$003dtrue?2024-09-22T12:17:57ZReversing : Secrets of Reverse Engineering.ent://SD_ILS/0/SD_ILS:11832802024-09-22T12:17:57Z2024-09-22T12:17:57Zby Eilam, Eldad.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227440">Click to View</a><br/>Format: Electronic Resources<br/>Securing HP NonStop Servers in an Open Systems World : TCP/IP, OSS and SQL.ent://SD_ILS/0/SD_ILS:11917562024-09-22T12:17:57Z2024-09-22T12:17:57Zby Corp, XYPRO Technology.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=291716">Click to View</a><br/>Format: Electronic Resources<br/>Developer's Guide to Web Application Security.ent://SD_ILS/0/SD_ILS:11910742024-09-22T12:17:57Z2024-09-22T12:17:57Zby Cross, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=289735">Click to View</a><br/>Format: Electronic Resources<br/>Microsoft Forefront UAG 2010 Administrator's Handbook.ent://SD_ILS/0/SD_ILS:12457062024-09-22T12:17:57Z2024-09-22T12:17:57Zby Ben-Ari, Erez.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=948568">Click to View</a><br/>Format: Electronic Resources<br/>Practical Embedded Security : Building Secure Resource-Constrained Systems.ent://SD_ILS/0/SD_ILS:11950042024-09-22T12:17:57Z2024-09-22T12:17:57Zby Stapko, Timothy.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=312846">Click to View</a><br/>Format: Electronic Resources<br/>Microsoft Windows Security Fundamentals : For Windows 2003 SP1 and R2.ent://SD_ILS/0/SD_ILS:11921752024-09-22T12:17:57Z2024-09-22T12:17:57Zby De Clercq, Jan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294637">Click to View</a><br/>Format: Electronic Resources<br/>Identity Management : Concepts, Technologies, and Systems.ent://SD_ILS/0/SD_ILS:12226882024-09-22T12:17:57Z2024-09-22T12:17:57Zby Takahashi, Kenji.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=634511">Click to View</a><br/>Format: Electronic Resources<br/>Securing the Cloud : Cloud Computer Security Techniques and Tactics.ent://SD_ILS/0/SD_ILS:12271702024-09-22T12:17:57Z2024-09-22T12:17:57Zby Winkler, Vic (J.R.).<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=686827">Click to View</a><br/>Format: Electronic Resources<br/>Security Risk Management : Building an Information Security Risk Management Program from the Ground Up.ent://SD_ILS/0/SD_ILS:12269432024-09-22T12:17:57Z2024-09-22T12:17:57Zby Wheeler, Evan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=685406">Click to View</a><br/>Format: Electronic Resources<br/>Zen and the Art of Information Security.ent://SD_ILS/0/SD_ILS:11967132024-09-22T12:17:57Z2024-09-22T12:17:57Zby Winkler, Ira.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=330200">Click to View</a><br/>Format: Electronic Resources<br/>Assessing Information Security : Strategies, Tactics, Logic and Framework.ent://SD_ILS/0/SD_ILS:12133662024-09-22T12:17:57Z2024-09-22T12:17:57Zby Vladimirov, Andrew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=499606">Click to View</a><br/>Format: Electronic Resources<br/>Spring Security 3.ent://SD_ILS/0/SD_ILS:12451972024-09-22T12:17:57Z2024-09-22T12:17:57Zby Mularien, Peter.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=944051">Click to View</a><br/>Format: Electronic Resources<br/>GlassFish Security.ent://SD_ILS/0/SD_ILS:12452432024-09-22T12:17:57Z2024-09-22T12:17:57Zby Kalali, Masoud.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=944941">Click to View</a><br/>Format: Electronic Resources<br/>Least Privilege Security for Windows 7, Vista and XP : Implement Efficient System Security By Assigning Permissions Effectively.ent://SD_ILS/0/SD_ILS:12451842024-09-22T12:17:57Z2024-09-22T12:17:57Zby Smith, Russell.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=944038">Click to View</a><br/>Format: Electronic Resources<br/>Social Engineering : The Art of Human Hacking.ent://SD_ILS/0/SD_ILS:12288892024-09-22T12:17:57Z2024-09-22T12:17:57Zby Hadnagy, Christopher.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=706746">Click to View</a><br/>Format: Electronic Resources<br/>Dear Hacker : Letters to the Editor Of 2600.ent://SD_ILS/0/SD_ILS:12156712024-09-22T12:17:57Z2024-09-22T12:17:57Zby Goldstein, Emmanuel.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=537340">Click to View</a><br/>Format: Electronic Resources<br/>Hashing in Computer Science : Fifty Years of Slicing and Dicing.ent://SD_ILS/0/SD_ILS:12156732024-09-22T12:17:57Z2024-09-22T12:17:57Zby Konheim, Alan G.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=537352">Click to View</a><br/>Format: Electronic Resources<br/>Professional Cocoa Application Security.ent://SD_ILS/0/SD_ILS:12156742024-09-22T12:17:57Z2024-09-22T12:17:57Zby Lee, Graham J.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=537355">Click to View</a><br/>Format: Electronic Resources<br/>Group Policy : Fundamentals, Security, and the Managed Desktop.ent://SD_ILS/0/SD_ILS:12143372024-09-22T12:17:57Z2024-09-22T12:17:57Zby Moskowitz, Jeremy.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=530009">Click to View</a><br/>Format: Electronic Resources<br/>Logics and Languages for Reliability and Security.ent://SD_ILS/0/SD_ILS:12173012024-09-22T12:17:57Z2024-09-22T12:17:57Zby Esparza, J.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=557042">Click to View</a><br/>Format: Electronic Resources<br/>Cloud Security : A Comprehensive Guide to Secure Cloud Computing.ent://SD_ILS/0/SD_ILS:12189872024-09-22T12:17:57Z2024-09-22T12:17:57Zby Krutz, Ronald L.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=589027">Click to View</a><br/>Format: Electronic Resources<br/>IT Audit, Control, and Security.ent://SD_ILS/0/SD_ILS:12222742024-09-22T12:17:57Z2024-09-22T12:17:57Zby Moeller, Robert R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=624573">Click to View</a><br/>Format: Electronic Resources<br/>Enterprise Information Security and Privacy.ent://SD_ILS/0/SD_ILS:12077182024-09-22T12:17:57Z2024-09-22T12:17:57Zby Axelrod, C. Warren.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=456886">Click to View</a><br/>Format: Electronic Resources<br/>Mac Security Bible.ent://SD_ILS/0/SD_ILS:12115662024-09-22T12:17:57Z2024-09-22T12:17:57Zby Kissell, Joe.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=477803">Click to View</a><br/>Format: Electronic Resources<br/>Distributed Systems Security : Issues, Processes and Solutions.ent://SD_ILS/0/SD_ILS:12058042024-09-22T12:17:57Z2024-09-22T12:17:57Zby Belapurkar, Abhijit.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=437429">Click to View</a><br/>Format: Electronic Resources<br/>Definitive Guide to the C&A Transformation Process : The First Publication of a Comprehensive View of the C&A Transformation.ent://SD_ILS/0/SD_ILS:12161552024-09-22T12:17:57Z2024-09-22T12:17:57Zby Mehan, Julie.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=547041">Click to View</a><br/>Format: Electronic Resources<br/>Securing Information and Communications Systems : Principles, Technologies, and Applications.ent://SD_ILS/0/SD_ILS:12077132024-09-22T12:17:57Z2024-09-22T12:17:57Zby Lopez, Javier.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=456881">Click to View</a><br/>Format: Electronic Resources<br/>Fuzzing for Software Security Testing and Quality Assurance.ent://SD_ILS/0/SD_ILS:12077162024-09-22T12:17:57Z2024-09-22T12:17:57Zby Takanen, Ari.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=456884">Click to View</a><br/>Format: Electronic Resources<br/>Information Security : Policy, Processes, and Practices.ent://SD_ILS/0/SD_ILS:12053592024-09-22T12:17:57Z2024-09-22T12:17:57Zby Goodman, Seymour.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=435197">Click to View</a><br/>Format: Electronic Resources<br/>Computer Forensics For Dummies.ent://SD_ILS/0/SD_ILS:11998622024-09-22T12:17:57Z2024-09-22T12:17:57Zby Volonino, Linda.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=380503">Click to View</a><br/>Format: Electronic Resources<br/>Implementing Email and Security Tokens : Current Standards, Tools, and Practices.ent://SD_ILS/0/SD_ILS:11977622024-09-22T12:17:57Z2024-09-22T12:17:57Zby Turner, Sean.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=343700">Click to View</a><br/>Format: Electronic Resources<br/>ASP.NET 3.5 Security, Membership, and Role Management with C# and VB.ent://SD_ILS/0/SD_ILS:13008272024-09-22T12:17:57Z2024-09-22T12:17:57Zby Haidar, Bilal.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3057687">Click to View</a><br/>Format: Electronic Resources<br/>CompTIA Security+ 2008 In Depth.ent://SD_ILS/0/SD_ILS:13048582024-09-22T12:17:57Z2024-09-22T12:17:57Zby Ciampa, Mark.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3136117">Click to View</a><br/>Format: Electronic Resources<br/>Papers from the First European Workshop on Technological & Security Issues in Digital Rights Management (EuDiRights’06).ent://SD_ILS/0/SD_ILS:11917202024-09-22T12:17:57Z2024-09-22T12:17:57Zby Yague, Mariemma.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=291585">Click to View</a><br/>Format: Electronic Resources<br/>Papers from the HAISA 2007 Symposium : Papers from the HAISA 2007 Symposium.ent://SD_ILS/0/SD_ILS:11965652024-09-22T12:17:57Z2024-09-22T12:17:57Zby Furnell, Steven.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=328737">Click to View</a><br/>Format: Electronic Resources<br/>Role-Based Access Control.ent://SD_ILS/0/SD_ILS:11975332024-09-22T12:17:57Z2024-09-22T12:17:57Zby Ferraiolo, David F.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=338751">Click to View</a><br/>Format: Electronic Resources<br/>Penetration Tester's Open Source Toolkit.ent://SD_ILS/0/SD_ILS:11860462024-09-22T12:17:57Z2024-09-22T12:17:57Zby Faircloth, Jeremy.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254834">Click to View</a><br/>Format: Electronic Resources<br/>Combating Spyware in the Enterprise : Discover, Detect, and Eradicate the Internet's Greatest Threat.ent://SD_ILS/0/SD_ILS:11890822024-09-22T12:17:57Z2024-09-22T12:17:57Zby Piccard, Paul.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=274289">Click to View</a><br/>Format: Electronic Resources<br/>Perfect Password : Selection, Protection, Authentication.ent://SD_ILS/0/SD_ILS:11860632024-09-22T12:17:57Z2024-09-22T12:17:57Zby Burnett, Mark.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254851">Click to View</a><br/>Format: Electronic Resources<br/>How to Cheat at Configuring ISA Server 2004.ent://SD_ILS/0/SD_ILS:11860652024-09-22T12:17:57Z2024-09-22T12:17:57Zby Littlejohn Shinder, Debra.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254853">Click to View</a><br/>Format: Electronic Resources<br/>Information Assurance and Computer Security.ent://SD_ILS/0/SD_ILS:11907422024-09-22T12:17:57Z2024-09-22T12:17:57Zby Thomas, J.P.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=287000">Click to View</a><br/>Format: Electronic Resources<br/>Enemy at the Water Cooler : True Stories of Insider Threats and Enterprise Security Management Countermeasures.ent://SD_ILS/0/SD_ILS:11920262024-09-22T12:17:57Z2024-09-22T12:17:57Zby Contos, Brian T.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294116">Click to View</a><br/>Format: Electronic Resources<br/>part-themed issue on internet security.ent://SD_ILS/0/SD_ILS:11905562024-09-22T12:17:57Z2024-09-22T12:17:57Zby Yague, Dr Mariemma.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=285507">Click to View</a><br/>Format: Electronic Resources<br/>Secure Online Business Handbook : A Practical Guide to Risk Management and Business Continuity.ent://SD_ILS/0/SD_ILS:11873762024-09-22T12:17:57Z2024-09-22T12:17:57Zby Reuvid, Jonathan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=268897">Click to View</a><br/>Format: Electronic Resources<br/>Trusted Platform Module Basics : Using TPM in Embedded Systems.ent://SD_ILS/0/SD_ILS:11891162024-09-22T12:17:57Z2024-09-22T12:17:57Zby Kinney, Steven L.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=274719">Click to View</a><br/>Format: Electronic Resources<br/>BigNum Math : Implementing Cryptographic Multiple Precision Arithmetic.ent://SD_ILS/0/SD_ILS:11867192024-09-22T12:17:57Z2024-09-22T12:17:57Zby St Denis, Tom.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=261284">Click to View</a><br/>Format: Electronic Resources<br/>Security Issues of IT Outsourcing.ent://SD_ILS/0/SD_ILS:11905852024-09-22T12:17:57Z2024-09-22T12:17:57Zby Katsikas, Sokratis K.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=285536">Click to View</a><br/>Format: Electronic Resources<br/>Network Security Foundations : Technology Fundamentals for IT Success.ent://SD_ILS/0/SD_ILS:11871342024-09-22T12:17:57Z2024-09-22T12:17:57Zby Strebe, Matthew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=267332">Click to View</a><br/>Format: Electronic Resources<br/>Click, Click, Who's Really There? : Protect Your Family from Online Predators, Pedophiles, Privacy Loss and More.ent://SD_ILS/0/SD_ILS:11975882024-09-22T12:17:57Z2024-09-22T12:17:57Zby Koh, Lisa.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=338853">Click to View</a><br/>Format: Electronic Resources<br/>Federated Identity Management and Web Services Security with IBM Tivoli Security Solutions.ent://SD_ILS/0/SD_ILS:13099122024-09-22T12:17:57Z2024-09-22T12:17:57Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306521">Click to View</a><br/>Format: Electronic Resources<br/>Buffer Overflow Attacks : Detect, Exploit, Prevent.ent://SD_ILS/0/SD_ILS:11825002024-09-22T12:17:57Z2024-09-22T12:17:57Zby Deckard, Jason.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=222803">Click to View</a><br/>Format: Electronic Resources<br/>Black Hat Physical Device Security : Exploiting Hardware and Software.ent://SD_ILS/0/SD_ILS:11825022024-09-22T12:17:57Z2024-09-22T12:17:57Zby Miller, Drew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=222851">Click to View</a><br/>Format: Electronic Resources<br/>Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives : Tracking Your Family's (Sometimes) Secret Online Lives.ent://SD_ILS/0/SD_ILS:11825032024-09-22T12:17:57Z2024-09-22T12:17:57Zby Cole, Eric.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=222853">Click to View</a><br/>Format: Electronic Resources<br/>Aggressive Network Self-Defense.ent://SD_ILS/0/SD_ILS:11830082024-09-22T12:17:57Z2024-09-22T12:17:57Zby Wyler, Neil R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=225321">Click to View</a><br/>Format: Electronic Resources<br/>Contemporary Cryptography.ent://SD_ILS/0/SD_ILS:11836472024-09-22T12:17:57Z2024-09-22T12:17:57Zby Oppliger, Rolf.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=231638">Click to View</a><br/>Format: Electronic Resources<br/>Sockets, Shellcode, Porting, and Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals.ent://SD_ILS/0/SD_ILS:11831102024-09-22T12:17:57Z2024-09-22T12:17:57Zby Foster, James C.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=226568">Click to View</a><br/>Format: Electronic Resources<br/>Intrusion Prevention and Active Response : Deploying Network and Host IPS.ent://SD_ILS/0/SD_ILS:11831112024-09-22T12:17:57Z2024-09-22T12:17:57Zby Rash, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=226578">Click to View</a><br/>Format: Electronic Resources<br/>How to Cheat at Designing Security for a Windows Server 2003 Network.ent://SD_ILS/0/SD_ILS:11860442024-09-22T12:17:57Z2024-09-22T12:17:57Zby Ruston, Chris.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254832">Click to View</a><br/>Format: Electronic Resources<br/>Business Guide To Information Security : How to Protect Your Company's IT Assets, Reduce Risks and Understand the Law.ent://SD_ILS/0/SD_ILS:11862232024-09-22T12:17:57Z2024-09-22T12:17:57Zby Calder, Alan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=256142">Click to View</a><br/>Format: Electronic Resources<br/>Nessus, Snort, & Ethereal Power Tools : Customizing Open Source Security Applications.ent://SD_ILS/0/SD_ILS:11860512024-09-22T12:17:57Z2024-09-22T12:17:57Zby Caswell, Brian.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254839">Click to View</a><br/>Format: Electronic Resources<br/>Software Piracy Exposed.ent://SD_ILS/0/SD_ILS:11860522024-09-22T12:17:57Z2024-09-22T12:17:57Zby Honick, Ron.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254840">Click to View</a><br/>Format: Electronic Resources<br/>Network Security Evaluation Using the NSA IEM : Using the NSA IEM.ent://SD_ILS/0/SD_ILS:11860542024-09-22T12:17:57Z2024-09-22T12:17:57Zby Rogers, Russ.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254842">Click to View</a><br/>Format: Electronic Resources<br/>Securing IM and P2P Applications for the Enterprise.ent://SD_ILS/0/SD_ILS:11860592024-09-22T12:17:57Z2024-09-22T12:17:57Zby Sachs, Marcus.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254847">Click to View</a><br/>Format: Electronic Resources<br/>Insider Threat : Protecting the Enterprise from Sabotage, Spying, and Theft.ent://SD_ILS/0/SD_ILS:11860612024-09-22T12:17:57Z2024-09-22T12:17:57Zby Cole, Eric.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254849">Click to View</a><br/>Format: Electronic Resources<br/>Implementing Database Security and Auditing.ent://SD_ILS/0/SD_ILS:11906462024-09-22T12:17:57Z2024-09-22T12:17:57Zby Ben Natan, Ron.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=286701">Click to View</a><br/>Format: Electronic Resources<br/>InfoSec Career Hacking : Sell Your Skillz, Not Your Soul.ent://SD_ILS/0/SD_ILS:11831982024-09-22T12:17:57Z2024-09-22T12:17:57Zby Hurley, Chris.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227231">Click to View</a><br/>Format: Electronic Resources<br/>Host Integrity Monitoring Using Osiris and Samhain : Using Osiris and Samhain.ent://SD_ILS/0/SD_ILS:11839532024-09-22T12:17:57Z2024-09-22T12:17:57Zby Wotring, Brian.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=233599">Click to View</a><br/>Format: Electronic Resources<br/>IBM Rational Application Developer V6 Portlet Application Development and Portal Tools.ent://SD_ILS/0/SD_ILS:13099382024-09-22T12:17:57Z2024-09-22T12:17:57Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306547">Click to View</a><br/>Format: Electronic Resources<br/>Multilevel Security and DB2 Row-Level Security Revealed.ent://SD_ILS/0/SD_ILS:13098552024-09-22T12:17:57Z2024-09-22T12:17:57Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306464">Click to View</a><br/>Format: Electronic Resources<br/>Linux on IBM eServer zSeries and S/390 : Best Security Practices.ent://SD_ILS/0/SD_ILS:13102262024-09-22T12:17:57Z2024-09-22T12:17:57Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306835">Click to View</a><br/>Format: Electronic Resources<br/>iSeries Access for Windows V5R2 Hot Topics : Tailored Images, Application Administration, SSL, and Kerberos.ent://SD_ILS/0/SD_ILS:13100902024-09-22T12:17:57Z2024-09-22T12:17:57Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306699">Click to View</a><br/>Format: Electronic Resources<br/>Privacy Protection and Computer Forensics.ent://SD_ILS/0/SD_ILS:11834012024-09-22T12:17:57Z2024-09-22T12:17:57Zby Caloyannides, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227692">Click to View</a><br/>Format: Electronic Resources<br/>User's Guide tp Crytography and Standards.ent://SD_ILS/0/SD_ILS:11833672024-09-22T12:17:57Z2024-09-22T12:17:57Zby Dent, Alex.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227658">Click to View</a><br/>Format: Electronic Resources<br/>Ethereal Packet Sniffing.ent://SD_ILS/0/SD_ILS:11920282024-09-22T12:17:57Z2024-09-22T12:17:57Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294122">Click to View</a><br/>Format: Electronic Resources<br/>Hacking the Code : Auditor's Guide to Writing Secure Code for the Web.ent://SD_ILS/0/SD_ILS:11920482024-09-22T12:17:57Z2024-09-22T12:17:57Zby Burnett, Mark.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294160">Click to View</a><br/>Format: Electronic Resources<br/>Cyber Adversary Characterization : Auditing the Hacker Mind.ent://SD_ILS/0/SD_ILS:11920122024-09-22T12:17:57Z2024-09-22T12:17:57Zby Parker, Tom.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294071">Click to View</a><br/>Format: Electronic Resources<br/>Dr. Tom Shinder's Configuring ISA Server 2004.ent://SD_ILS/0/SD_ILS:11920222024-09-22T12:17:57Z2024-09-22T12:17:57Zby Littlejohn Shinder, Debra.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294094">Click to View</a><br/>Format: Electronic Resources<br/>MCSE Designing Security for a Windows Server 2003 Network (Exam 70-298) : Study Guide and DVD Training System.ent://SD_ILS/0/SD_ILS:11920722024-09-22T12:17:57Z2024-09-22T12:17:57Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294253">Click to View</a><br/>Format: Electronic Resources<br/>Programmer's Ultimate Security DeskRef : Your Programming Security Encyclopedia.ent://SD_ILS/0/SD_ILS:11920972024-09-22T12:17:57Z2024-09-22T12:17:57Zby Foster, James C.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294328">Click to View</a><br/>Format: Electronic Resources<br/>Security Sage's Guide to Hardening the Network Infrastructure.ent://SD_ILS/0/SD_ILS:11921082024-09-22T12:17:57Z2024-09-22T12:17:57Zby Andres, Steven.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294359">Click to View</a><br/>Format: Electronic Resources<br/>Stealing the Network : How to Own a Continent.ent://SD_ILS/0/SD_ILS:11921162024-09-22T12:17:57Z2024-09-22T12:17:57Zby Russell, Ryan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294377">Click to View</a><br/>Format: Electronic Resources<br/>WarDriving : A Guide to Wireless Security.ent://SD_ILS/0/SD_ILS:11921352024-09-22T12:17:57Z2024-09-22T12:17:57Zby Hurley, Chris.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294441">Click to View</a><br/>Format: Electronic Resources<br/>Google Hacking for Penetration Testers.ent://SD_ILS/0/SD_ILS:11920392024-09-22T12:17:57Z2024-09-22T12:17:57Zby Long, Johnny.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294147">Click to View</a><br/>Format: Electronic Resources<br/>Computer Forensics JumpStart.ent://SD_ILS/0/SD_ILS:11871092024-09-22T12:17:57Z2024-09-22T12:17:57Zby Solomon, Micah.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=267268">Click to View</a><br/>Format: Electronic Resources<br/>Bluetooth Security.ent://SD_ILS/0/SD_ILS:11833592024-09-22T12:17:57Z2024-09-22T12:17:57Zby Gehrmann, Christian.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227650">Click to View</a><br/>Format: Electronic Resources<br/>Click, Click, Who's There? : A Family-Based, Non-Technical Approach to Help Parents Protect Their Children Online.ent://SD_ILS/0/SD_ILS:11975872024-09-22T12:17:57Z2024-09-22T12:17:57Zby Koh, Lisa.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=338852">Click to View</a><br/>Format: Electronic Resources<br/>Homeland Security : Techniques and Technologies.ent://SD_ILS/0/SD_ILS:13044202024-09-22T12:17:57Z2024-09-22T12:17:57Zby Mena, Jesus.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3135665">Click to View</a><br/>Format: Electronic Resources<br/>Code Hacking : A Developer's Guide to Network Security.ent://SD_ILS/0/SD_ILS:13044362024-09-22T12:17:57Z2024-09-22T12:17:57Zby Conway, Richard.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3135681">Click to View</a><br/>Format: Electronic Resources<br/>zSeries Trusted Key Entry (TKE) V4.2 Update.ent://SD_ILS/0/SD_ILS:13100672024-09-22T12:17:57Z2024-09-22T12:17:57Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306676">Click to View</a><br/>Format: Electronic Resources<br/>IBM eServer zSeries 990 (z990) Cryptography Implementation.ent://SD_ILS/0/SD_ILS:13101822024-09-22T12:17:57Z2024-09-22T12:17:57Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306791">Click to View</a><br/>Format: Electronic Resources<br/>Security : Secrets, Intruders and ID Tags.ent://SD_ILS/0/SD_ILS:13267442024-09-22T12:17:57Z2024-09-22T12:17:57Zby Patch, Kimberly.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3411447">Click to View</a><br/>Format: Electronic Resources<br/>Techniques and Applications of Digital Watermarking and Content Protection : Techniques and Applications.ent://SD_ILS/0/SD_ILS:11832992024-09-22T12:17:57Z2024-09-22T12:17:57Zby Arnold, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227587">Click to View</a><br/>Format: Electronic Resources<br/>Role-Based Access Control.ent://SD_ILS/0/SD_ILS:11833412024-09-22T12:17:57Z2024-09-22T12:17:57Zby Ferraiolo, David.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227631">Click to View</a><br/>Format: Electronic Resources<br/>Defense and Detection Strategies against Internet Worms.ent://SD_ILS/0/SD_ILS:11833692024-09-22T12:17:57Z2024-09-22T12:17:57Zby Nazario, Jose.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227660">Click to View</a><br/>Format: Electronic Resources<br/>Configuring Symantec AntiVirus Enterprise Edition.ent://SD_ILS/0/SD_ILS:11920062024-09-22T12:17:57Z2024-09-22T12:17:57Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294056">Click to View</a><br/>Format: Electronic Resources<br/>SSCP Systems Security Certified Practitioner Study Guide and DVD Training System.ent://SD_ILS/0/SD_ILS:11921142024-09-22T12:17:57Z2024-09-22T12:17:57Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294375">Click to View</a><br/>Format: Electronic Resources<br/>Mission-Critical Network Planning.ent://SD_ILS/0/SD_ILS:11833612024-09-22T12:17:57Z2024-09-22T12:17:57Zby Liotine, Matthew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227652">Click to View</a><br/>Format: Electronic Resources<br/>Invasion of Privacy : Big Brother and the Company Hackers.ent://SD_ILS/0/SD_ILS:13043802024-09-22T12:17:57Z2024-09-22T12:17:57Zby Weber, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3135625">Click to View</a><br/>Format: Electronic Resources<br/>zSeries Crypto Guide Update.ent://SD_ILS/0/SD_ILS:13100962024-09-22T12:17:57Z2024-09-22T12:17:57Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306705">Click to View</a><br/>Format: Electronic Resources<br/>Information : Getting, Protecting and Using Data.ent://SD_ILS/0/SD_ILS:13267332024-09-22T12:17:57Z2024-09-22T12:17:57Zby Patch, Kimberly.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3411436">Click to View</a><br/>Format: Electronic Resources<br/>Developing Secure Distributed Systems with CORBA.ent://SD_ILS/0/SD_ILS:11833142024-09-22T12:17:57Z2024-09-22T12:17:57Zby Land, Ulrich.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227602">Click to View</a><br/>Format: Electronic Resources<br/>Special Issue On Internet Security.ent://SD_ILS/0/SD_ILS:11838882024-09-22T12:17:57Z2024-09-22T12:17:57Zby Warren, Mathew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=232281">Click to View</a><br/>Format: Electronic Resources<br/>Hack Proofing XML.ent://SD_ILS/0/SD_ILS:11920442024-09-22T12:17:57Z2024-09-22T12:17:57Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294155">Click to View</a><br/>Format: Electronic Resources<br/>Hack Proofing ColdFusion : The Only Way to Stop a Hacker Is to Think Like One.ent://SD_ILS/0/SD_ILS:11920402024-09-22T12:17:57Z2024-09-22T12:17:57Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294151">Click to View</a><br/>Format: Electronic Resources<br/>Checkpoint Next Generation Security Administration.ent://SD_ILS/0/SD_ILS:11919912024-09-22T12:17:57Z2024-09-22T12:17:57Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294029">Click to View</a><br/>Format: Electronic Resources<br/>Security Technologies for the World Wide Web.ent://SD_ILS/0/SD_ILS:11833302024-09-22T12:17:57Z2024-09-22T12:17:57Zby Oppliger, Rolf.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227620">Click to View</a><br/>Format: Electronic Resources<br/>Information : Getting, Protecting and Using Data.ent://SD_ILS/0/SD_ILS:13267172024-09-22T12:17:57Z2024-09-22T12:17:57Zby Patch, Kimberly.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3411420">Click to View</a><br/>Format: Electronic Resources<br/>Hack Proofing Sun Solaris 8.ent://SD_ILS/0/SD_ILS:11920422024-09-22T12:17:57Z2024-09-22T12:17:57Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294153">Click to View</a><br/>Format: Electronic Resources<br/>Data Privacy in the Information Age.ent://SD_ILS/0/SD_ILS:11901542024-09-22T12:17:57Z2024-09-22T12:17:57Zby Klosek, Jacqueline.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=282745">Click to View</a><br/>Format: Electronic Resources<br/>Summary of Discussions at a Planning Meeting on Cyber-Security and the Insider Threat to Classified Information.ent://SD_ILS/0/SD_ILS:13195732024-09-22T12:17:57Z2024-09-22T12:17:57Zby Council, National Research.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3377658">Click to View</a><br/>Format: Electronic Resources<br/>