Search Results for - Narrowed by: Computer security. - Electronic books. -- local. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Electronic$002bbooks.$002b--$002blocal.$002509Electronic$002bbooks.$002b--$002blocal.$0026ps$003d300$0026isd$003dtrue? 2024-09-22T12:17:57Z Reversing : Secrets of Reverse Engineering. ent://SD_ILS/0/SD_ILS:1183280 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Eilam, Eldad.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227440">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing HP NonStop Servers in an Open Systems World : TCP/IP, OSS and SQL. ent://SD_ILS/0/SD_ILS:1191756 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Corp, XYPRO Technology.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=291716">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Developer's Guide to Web Application Security. ent://SD_ILS/0/SD_ILS:1191074 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Cross, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=289735">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Forefront UAG 2010 Administrator's Handbook. ent://SD_ILS/0/SD_ILS:1245706 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Ben-Ari, Erez.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=948568">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Practical Embedded Security : Building Secure Resource-Constrained Systems. ent://SD_ILS/0/SD_ILS:1195004 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Stapko, Timothy.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=312846">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Windows Security Fundamentals : For Windows 2003 SP1 and R2. ent://SD_ILS/0/SD_ILS:1192175 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;De Clercq, Jan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294637">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Identity Management : Concepts, Technologies, and Systems. ent://SD_ILS/0/SD_ILS:1222688 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Takahashi, Kenji.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=634511">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing the Cloud : Cloud Computer Security Techniques and Tactics. ent://SD_ILS/0/SD_ILS:1227170 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Winkler, Vic (J.R.).<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=686827">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security Risk Management : Building an Information Security Risk Management Program from the Ground Up. ent://SD_ILS/0/SD_ILS:1226943 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Wheeler, Evan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=685406">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Zen and the Art of Information Security. ent://SD_ILS/0/SD_ILS:1196713 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Winkler, Ira.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=330200">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Assessing Information Security : Strategies, Tactics, Logic and Framework. ent://SD_ILS/0/SD_ILS:1213366 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Vladimirov, Andrew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=499606">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Spring Security 3. ent://SD_ILS/0/SD_ILS:1245197 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Mularien, Peter.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=944051">Click to View</a><br/>Format:&#160;Electronic Resources<br/> GlassFish Security. ent://SD_ILS/0/SD_ILS:1245243 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Kalali, Masoud.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=944941">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Least Privilege Security for Windows 7, Vista and XP : Implement Efficient System Security By Assigning Permissions Effectively. ent://SD_ILS/0/SD_ILS:1245184 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Smith, Russell.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=944038">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Social Engineering : The Art of Human Hacking. ent://SD_ILS/0/SD_ILS:1228889 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Hadnagy, Christopher.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=706746">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Dear Hacker : Letters to the Editor Of 2600. ent://SD_ILS/0/SD_ILS:1215671 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Goldstein, Emmanuel.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=537340">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hashing in Computer Science : Fifty Years of Slicing and Dicing. ent://SD_ILS/0/SD_ILS:1215673 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Konheim, Alan G.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=537352">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Professional Cocoa Application Security. ent://SD_ILS/0/SD_ILS:1215674 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Lee, Graham J.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=537355">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Group Policy : Fundamentals, Security, and the Managed Desktop. ent://SD_ILS/0/SD_ILS:1214337 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Moskowitz, Jeremy.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=530009">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Logics and Languages for Reliability and Security. ent://SD_ILS/0/SD_ILS:1217301 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Esparza, J.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=557042">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cloud Security : A Comprehensive Guide to Secure Cloud Computing. ent://SD_ILS/0/SD_ILS:1218987 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Krutz, Ronald L.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=589027">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IT Audit, Control, and Security. ent://SD_ILS/0/SD_ILS:1222274 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Moeller, Robert R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=624573">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Information Security and Privacy. ent://SD_ILS/0/SD_ILS:1207718 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Axelrod, C. Warren.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=456886">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mac Security Bible. ent://SD_ILS/0/SD_ILS:1211566 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Kissell, Joe.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=477803">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Distributed Systems Security : Issues, Processes and Solutions. ent://SD_ILS/0/SD_ILS:1205804 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Belapurkar, Abhijit.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=437429">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Definitive Guide to the C&amp;A Transformation Process : The First Publication of a Comprehensive View of the C&amp;A Transformation. ent://SD_ILS/0/SD_ILS:1216155 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Mehan, Julie.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=547041">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing Information and Communications Systems : Principles, Technologies, and Applications. ent://SD_ILS/0/SD_ILS:1207713 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Lopez, Javier.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=456881">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Fuzzing for Software Security Testing and Quality Assurance. ent://SD_ILS/0/SD_ILS:1207716 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Takanen, Ari.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=456884">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information Security : Policy, Processes, and Practices. ent://SD_ILS/0/SD_ILS:1205359 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Goodman, Seymour.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=435197">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer Forensics For Dummies. ent://SD_ILS/0/SD_ILS:1199862 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Volonino, Linda.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=380503">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Implementing Email and Security Tokens : Current Standards, Tools, and Practices. ent://SD_ILS/0/SD_ILS:1197762 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Turner, Sean.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=343700">Click to View</a><br/>Format:&#160;Electronic Resources<br/> ASP.NET 3.5 Security, Membership, and Role Management with C# and VB. ent://SD_ILS/0/SD_ILS:1300827 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Haidar, Bilal.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3057687">Click to View</a><br/>Format:&#160;Electronic Resources<br/> CompTIA Security+ 2008 In Depth. ent://SD_ILS/0/SD_ILS:1304858 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Ciampa, Mark.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3136117">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Papers from the First European Workshop on Technological &amp; Security Issues in Digital Rights Management (EuDiRights&rsquo;06). ent://SD_ILS/0/SD_ILS:1191720 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Yague, Mariemma.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=291585">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Papers from the HAISA 2007 Symposium : Papers from the HAISA 2007 Symposium. ent://SD_ILS/0/SD_ILS:1196565 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Furnell, Steven.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=328737">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Role-Based Access Control. ent://SD_ILS/0/SD_ILS:1197533 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Ferraiolo, David F.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=338751">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Penetration Tester's Open Source Toolkit. ent://SD_ILS/0/SD_ILS:1186046 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Faircloth, Jeremy.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254834">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Combating Spyware in the Enterprise : Discover, Detect, and Eradicate the Internet's Greatest Threat. ent://SD_ILS/0/SD_ILS:1189082 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Piccard, Paul.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=274289">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Perfect Password : Selection, Protection, Authentication. ent://SD_ILS/0/SD_ILS:1186063 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Burnett, Mark.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254851">Click to View</a><br/>Format:&#160;Electronic Resources<br/> How to Cheat at Configuring ISA Server 2004. ent://SD_ILS/0/SD_ILS:1186065 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Littlejohn Shinder, Debra.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254853">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information Assurance and Computer Security. ent://SD_ILS/0/SD_ILS:1190742 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Thomas, J.P.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=287000">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Enemy at the Water Cooler : True Stories of Insider Threats and Enterprise Security Management Countermeasures. ent://SD_ILS/0/SD_ILS:1192026 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Contos, Brian T.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294116">Click to View</a><br/>Format:&#160;Electronic Resources<br/> part-themed issue on internet security. ent://SD_ILS/0/SD_ILS:1190556 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Yague, Dr Mariemma.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=285507">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Secure Online Business Handbook : A Practical Guide to Risk Management and Business Continuity. ent://SD_ILS/0/SD_ILS:1187376 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Reuvid, Jonathan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=268897">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Trusted Platform Module Basics : Using TPM in Embedded Systems. ent://SD_ILS/0/SD_ILS:1189116 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Kinney, Steven L.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=274719">Click to View</a><br/>Format:&#160;Electronic Resources<br/> BigNum Math : Implementing Cryptographic Multiple Precision Arithmetic. ent://SD_ILS/0/SD_ILS:1186719 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;St Denis, Tom.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=261284">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security Issues of IT Outsourcing. ent://SD_ILS/0/SD_ILS:1190585 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Katsikas, Sokratis K.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=285536">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network Security Foundations : Technology Fundamentals for IT Success. ent://SD_ILS/0/SD_ILS:1187134 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Strebe, Matthew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=267332">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Click, Click, Who's Really There? : Protect Your Family from Online Predators, Pedophiles, Privacy Loss and More. ent://SD_ILS/0/SD_ILS:1197588 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Koh, Lisa.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=338853">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Federated Identity Management and Web Services Security with IBM Tivoli Security Solutions. ent://SD_ILS/0/SD_ILS:1309912 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306521">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Buffer Overflow Attacks : Detect, Exploit, Prevent. ent://SD_ILS/0/SD_ILS:1182500 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Deckard, Jason.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=222803">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Black Hat Physical Device Security : Exploiting Hardware and Software. ent://SD_ILS/0/SD_ILS:1182502 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Miller, Drew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=222851">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives : Tracking Your Family's (Sometimes) Secret Online Lives. ent://SD_ILS/0/SD_ILS:1182503 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Cole, Eric.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=222853">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Aggressive Network Self-Defense. ent://SD_ILS/0/SD_ILS:1183008 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Wyler, Neil R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=225321">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Contemporary Cryptography. ent://SD_ILS/0/SD_ILS:1183647 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Oppliger, Rolf.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=231638">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Sockets, Shellcode, Porting, and Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals. ent://SD_ILS/0/SD_ILS:1183110 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Foster, James C.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=226568">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Intrusion Prevention and Active Response : Deploying Network and Host IPS. ent://SD_ILS/0/SD_ILS:1183111 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Rash, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=226578">Click to View</a><br/>Format:&#160;Electronic Resources<br/> How to Cheat at Designing Security for a Windows Server 2003 Network. ent://SD_ILS/0/SD_ILS:1186044 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Ruston, Chris.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254832">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Business Guide To Information Security : How to Protect Your Company's IT Assets, Reduce Risks and Understand the Law. ent://SD_ILS/0/SD_ILS:1186223 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Calder, Alan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=256142">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Nessus, Snort, &amp; Ethereal Power Tools : Customizing Open Source Security Applications. ent://SD_ILS/0/SD_ILS:1186051 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Caswell, Brian.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254839">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Software Piracy Exposed. ent://SD_ILS/0/SD_ILS:1186052 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Honick, Ron.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254840">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network Security Evaluation Using the NSA IEM : Using the NSA IEM. ent://SD_ILS/0/SD_ILS:1186054 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Rogers, Russ.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254842">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing IM and P2P Applications for the Enterprise. ent://SD_ILS/0/SD_ILS:1186059 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Sachs, Marcus.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254847">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Insider Threat : Protecting the Enterprise from Sabotage, Spying, and Theft. ent://SD_ILS/0/SD_ILS:1186061 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Cole, Eric.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254849">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Implementing Database Security and Auditing. ent://SD_ILS/0/SD_ILS:1190646 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Ben Natan, Ron.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=286701">Click to View</a><br/>Format:&#160;Electronic Resources<br/> InfoSec Career Hacking : Sell Your Skillz, Not Your Soul. ent://SD_ILS/0/SD_ILS:1183198 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Hurley, Chris.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227231">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Host Integrity Monitoring Using Osiris and Samhain : Using Osiris and Samhain. ent://SD_ILS/0/SD_ILS:1183953 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Wotring, Brian.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=233599">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IBM Rational Application Developer V6 Portlet Application Development and Portal Tools. ent://SD_ILS/0/SD_ILS:1309938 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306547">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Multilevel Security and DB2 Row-Level Security Revealed. ent://SD_ILS/0/SD_ILS:1309855 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306464">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Linux on IBM eServer zSeries and S/390 : Best Security Practices. ent://SD_ILS/0/SD_ILS:1310226 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306835">Click to View</a><br/>Format:&#160;Electronic Resources<br/> iSeries Access for Windows V5R2 Hot Topics : Tailored Images, Application Administration, SSL, and Kerberos. ent://SD_ILS/0/SD_ILS:1310090 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306699">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Privacy Protection and Computer Forensics. ent://SD_ILS/0/SD_ILS:1183401 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Caloyannides, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227692">Click to View</a><br/>Format:&#160;Electronic Resources<br/> User's Guide tp Crytography and Standards. ent://SD_ILS/0/SD_ILS:1183367 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Dent, Alex.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227658">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Ethereal Packet Sniffing. ent://SD_ILS/0/SD_ILS:1192028 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294122">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking the Code : Auditor's Guide to Writing Secure Code for the Web. ent://SD_ILS/0/SD_ILS:1192048 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Burnett, Mark.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294160">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber Adversary Characterization : Auditing the Hacker Mind. ent://SD_ILS/0/SD_ILS:1192012 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Parker, Tom.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294071">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Dr. Tom Shinder's Configuring ISA Server 2004. ent://SD_ILS/0/SD_ILS:1192022 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Littlejohn Shinder, Debra.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294094">Click to View</a><br/>Format:&#160;Electronic Resources<br/> MCSE Designing Security for a Windows Server 2003 Network (Exam 70-298) : Study Guide and DVD Training System. ent://SD_ILS/0/SD_ILS:1192072 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294253">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Programmer's Ultimate Security DeskRef : Your Programming Security Encyclopedia. ent://SD_ILS/0/SD_ILS:1192097 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Foster, James C.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294328">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security Sage's Guide to Hardening the Network Infrastructure. ent://SD_ILS/0/SD_ILS:1192108 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Andres, Steven.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294359">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Stealing the Network : How to Own a Continent. ent://SD_ILS/0/SD_ILS:1192116 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Russell, Ryan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294377">Click to View</a><br/>Format:&#160;Electronic Resources<br/> WarDriving : A Guide to Wireless Security. ent://SD_ILS/0/SD_ILS:1192135 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Hurley, Chris.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294441">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Google Hacking for Penetration Testers. ent://SD_ILS/0/SD_ILS:1192039 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Long, Johnny.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294147">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer Forensics JumpStart. ent://SD_ILS/0/SD_ILS:1187109 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Solomon, Micah.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=267268">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Bluetooth Security. ent://SD_ILS/0/SD_ILS:1183359 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Gehrmann, Christian.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227650">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Click, Click, Who's There? : A Family-Based, Non-Technical Approach to Help Parents Protect Their Children Online. ent://SD_ILS/0/SD_ILS:1197587 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Koh, Lisa.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=338852">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Homeland Security : Techniques and Technologies. ent://SD_ILS/0/SD_ILS:1304420 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Mena, Jesus.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3135665">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Code Hacking : A Developer's Guide to Network Security. ent://SD_ILS/0/SD_ILS:1304436 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Conway, Richard.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3135681">Click to View</a><br/>Format:&#160;Electronic Resources<br/> zSeries Trusted Key Entry (TKE) V4.2 Update. ent://SD_ILS/0/SD_ILS:1310067 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306676">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IBM eServer zSeries 990 (z990) Cryptography Implementation. ent://SD_ILS/0/SD_ILS:1310182 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306791">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security : Secrets, Intruders and ID Tags. ent://SD_ILS/0/SD_ILS:1326744 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Patch, Kimberly.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3411447">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Techniques and Applications of Digital Watermarking and Content Protection : Techniques and Applications. ent://SD_ILS/0/SD_ILS:1183299 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Arnold, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227587">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Role-Based Access Control. ent://SD_ILS/0/SD_ILS:1183341 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Ferraiolo, David.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227631">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Defense and Detection Strategies against Internet Worms. ent://SD_ILS/0/SD_ILS:1183369 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Nazario, Jose.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227660">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Configuring Symantec AntiVirus Enterprise Edition. ent://SD_ILS/0/SD_ILS:1192006 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294056">Click to View</a><br/>Format:&#160;Electronic Resources<br/> SSCP Systems Security Certified Practitioner Study Guide and DVD Training System. ent://SD_ILS/0/SD_ILS:1192114 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294375">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mission-Critical Network Planning. ent://SD_ILS/0/SD_ILS:1183361 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Liotine, Matthew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227652">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Invasion of Privacy : Big Brother and the Company Hackers. ent://SD_ILS/0/SD_ILS:1304380 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Weber, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3135625">Click to View</a><br/>Format:&#160;Electronic Resources<br/> zSeries Crypto Guide Update. ent://SD_ILS/0/SD_ILS:1310096 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306705">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information : Getting, Protecting and Using Data. ent://SD_ILS/0/SD_ILS:1326733 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Patch, Kimberly.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3411436">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Developing Secure Distributed Systems with CORBA. ent://SD_ILS/0/SD_ILS:1183314 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Land, Ulrich.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227602">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Special Issue On Internet Security. ent://SD_ILS/0/SD_ILS:1183888 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Warren, Mathew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=232281">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hack Proofing XML. ent://SD_ILS/0/SD_ILS:1192044 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294155">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hack Proofing ColdFusion : The Only Way to Stop a Hacker Is to Think Like One. ent://SD_ILS/0/SD_ILS:1192040 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294151">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Checkpoint Next Generation Security Administration. ent://SD_ILS/0/SD_ILS:1191991 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294029">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security Technologies for the World Wide Web. ent://SD_ILS/0/SD_ILS:1183330 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Oppliger, Rolf.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227620">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information : Getting, Protecting and Using Data. ent://SD_ILS/0/SD_ILS:1326717 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Patch, Kimberly.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3411420">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hack Proofing Sun Solaris 8. ent://SD_ILS/0/SD_ILS:1192042 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294153">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy in the Information Age. ent://SD_ILS/0/SD_ILS:1190154 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Klosek, Jacqueline.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=282745">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Summary of Discussions at a Planning Meeting on Cyber-Security and the Insider Threat to Classified Information. ent://SD_ILS/0/SD_ILS:1319573 2024-09-22T12:17:57Z 2024-09-22T12:17:57Z by&#160;Council, National Research.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3377658">Click to View</a><br/>Format:&#160;Electronic Resources<br/>