Arama Sonu&ccedil;ları Computer viruses. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qu$003dComputer$002bviruses.$0026ps$003d300?dt=list 2025-07-17T02:40:04Z Computer Viruses and Malware ent://SD_ILS/0/SD_ILS:505284 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Aycock, John. author.<br/><a href="http://dx.doi.org/10.1007/0-387-34188-9">http://dx.doi.org/10.1007/0-387-34188-9</a><br/>Format:&#160;Electronic Resources<br/> Computer viruses: from theory to applications ent://SD_ILS/0/SD_ILS:508732 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Filiol, Eric. author.<br/><a href="http://dx.doi.org/10.1007/2-287-28099-5">http://dx.doi.org/10.1007/2-287-28099-5</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest Microsoft attacks ent://SD_ILS/0/SD_ILS:2289849 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Kraus, Rob.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495516/?ar">https://learning.oreilly.com/library/view/~/9781597495516/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597495516/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495516/?ar</a><br/>Format:&#160;Electronic Resources<br/> The art of computer virus research and defense ent://SD_ILS/0/SD_ILS:2281621 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Szor, Peter.<br/><a href="https://learning.oreilly.com/library/view/~/0321304543/?ar">https://learning.oreilly.com/library/view/~/0321304543/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0321304543/?ar">https://go.oreilly.com/library-access/library/view/-/0321304543/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321304543">https://learning.oreilly.com/library/view/~/0321304543</a><br/>Format:&#160;Electronic Resources<br/> Malicious mobile code : virus protection for Windows ent://SD_ILS/0/SD_ILS:2281201 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Grimes, Roger A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/156592682X/?ar">https://go.oreilly.com/library-access/library/view/-/156592682X/?ar</a> <a href="https://learning.oreilly.com/library/view/~/156592682X/?ar">https://learning.oreilly.com/library/view/~/156592682X/?ar</a> <a href="https://learning.oreilly.com/library/view/~/156592682X">https://learning.oreilly.com/library/view/~/156592682X</a><br/>Format:&#160;Electronic Resources<br/> E-mail virus protection handbook. ent://SD_ILS/0/SD_ILS:2280755 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Syngress Media, Inc.<br/><a href="https://www.sciencedirect.com/science/book/9781928994237">https://www.sciencedirect.com/science/book/9781928994237</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781928994237/?ar">https://go.oreilly.com/library-access/library/view/-/9781928994237/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781928994237/?ar">https://learning.oreilly.com/library/view/~/9781928994237/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781928994237">https://learning.oreilly.com/library/view/~/9781928994237</a><br/>Format:&#160;Electronic Resources<br/> Automatic defense against zero-day polymorphic worms in communication networks ent://SD_ILS/0/SD_ILS:2130551 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Mohammed, Mohssen, 1982- author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1220106">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Configuring Symantec AntiVirus corporate edition ent://SD_ILS/0/SD_ILS:65577 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Hunter, Laura E.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836814">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Cuckoo Malware Analysis. ent://SD_ILS/0/SD_ILS:1262206 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Oktavianto, Digit.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1389346">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Antivirus bypass techniques : learn practical techniques and tactics to combat, bypass, and evade antivirus software ent://SD_ILS/0/SD_ILS:2353807 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Yehoshua, Nir, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6741268">Click to View</a><br/>Format:&#160;Electronic Resources<br/> E-mail virus protection handbook ent://SD_ILS/0/SD_ILS:65760 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Syngress Media, Inc.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994237">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Buffer overflow attacks detect, exploit, prevent ent://SD_ILS/0/SD_ILS:65543 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266672">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Configuring Symantec AntiVirus Enterprise Edition. ent://SD_ILS/0/SD_ILS:1192006 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294056">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Defense and Detection Strategies against Internet Worms. ent://SD_ILS/0/SD_ILS:1183369 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Nazario, Jose.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227660">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Degunking your email, snam, and viruses ent://SD_ILS/0/SD_ILS:2102467 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Duntemann, Jeff.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3384731">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Degunking Your Email, Spam, and Viruses. ent://SD_ILS/0/SD_ILS:1322073 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Duntemann, Jeff.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3384731">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Malware forensics field guide for Windows systems digital forensics field guides ent://SD_ILS/0/SD_ILS:2205738 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Malin, Cameron H.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=921016">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Practical Malware Analysis : A Hands-On Guide to Dissecting Malicious Software. ent://SD_ILS/0/SD_ILS:1255586 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Sikorski, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1137570">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Antivirus bypass techniques : learn practical techniques and tactics to combat, bypass, and evade antivirus software ent://SD_ILS/0/SD_ILS:2329434 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Yehoshua, Nir, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801079747/?ar">https://learning.oreilly.com/library/view/~/9781801079747/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781801079747/?ar">https://go.oreilly.com/library-access/library/view/-/9781801079747/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801079747">https://learning.oreilly.com/library/view/~/9781801079747</a><br/>Format:&#160;Electronic Resources<br/> Manually removing viruses and malware from Windows 7 ent://SD_ILS/0/SD_ILS:2296758 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Halsey, Mike.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781449338053/?ar">https://go.oreilly.com/library-access/library/view/-/9781449338053/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781449338053/?ar">https://learning.oreilly.com/videos/~/9781449338053/?ar</a><br/>Format:&#160;Electronic Resources<br/> Malicious cryptography : exposing cryptovirology ent://SD_ILS/0/SD_ILS:2310281 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Young, Adam, 1972- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780764568466/?ar">https://go.oreilly.com/library-access/library/view/-/9780764568466/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780764568466">https://learning.oreilly.com/library/view/~/9780764568466</a> <a href="https://learning.oreilly.com/library/view/~/9780764568466/?ar">https://learning.oreilly.com/library/view/~/9780764568466/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mit open souce-tools : Spam &amp; Viren bek&auml;empfen ent://SD_ILS/0/SD_ILS:2307826 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Eisentraut, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9783868999068">https://learning.oreilly.com/library/view/~/9783868999068</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783868999068/?ar">https://go.oreilly.com/library-access/library/view/-/9783868999068/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9783868999068/?ar">https://learning.oreilly.com/library/view/~/9783868999068/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity - Attack and Defense Strategies - Second Edition ent://SD_ILS/0/SD_ILS:2323102 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Diogenes, Yuri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838827793/?ar">https://go.oreilly.com/library-access/library/view/-/9781838827793/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781838827793/?ar">https://learning.oreilly.com/library/view/~/9781838827793/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781838827793">https://learning.oreilly.com/library/view/~/9781838827793</a><br/>Format:&#160;Electronic Resources<br/> Cuckoo Malware Analysis. ent://SD_ILS/0/SD_ILS:2300561 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Oktavianto, Digit.<br/><a href="https://learning.oreilly.com/library/view/~/9781782169239/?ar">https://learning.oreilly.com/library/view/~/9781782169239/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781782169239/?ar">https://go.oreilly.com/library-access/library/view/-/9781782169239/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows Malware analysis essentials : master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set ent://SD_ILS/0/SD_ILS:2308438 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Marak, Victor, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785281518">https://learning.oreilly.com/library/view/~/9781785281518</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781785281518/?ar">https://go.oreilly.com/library-access/library/view/-/9781785281518/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785281518/?ar">https://learning.oreilly.com/library/view/~/9781785281518/?ar</a><br/>Format:&#160;Electronic Resources<br/> Malware forensics field guide for Linux systems ent://SD_ILS/0/SD_ILS:2206161 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Malin, Cameron H.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115128">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network defense and countermeasures : principles and practices ent://SD_ILS/0/SD_ILS:2301435 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Easttom, Chuck, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780133384390">https://learning.oreilly.com/library/view/~/9780133384390</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780133384390/?ar">https://go.oreilly.com/library-access/library/view/-/9780133384390/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780133384390/?ar">https://learning.oreilly.com/library/view/~/9780133384390/?ar</a><br/>Format:&#160;Electronic Resources<br/> Malware forensics field guide for Windows systems : digital forensics field guides ent://SD_ILS/0/SD_ILS:2294682 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Malin, Cameron H.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494724/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494724/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597494724/?ar">https://learning.oreilly.com/library/view/~/9781597494724/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597494724">https://learning.oreilly.com/library/view/~/9781597494724</a><br/>Format:&#160;Electronic Resources<br/> Malware data science : attack detection and attribution ent://SD_ILS/0/SD_ILS:2317388 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Saxe, Joshua, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492067672">https://learning.oreilly.com/library/view/~/9781492067672</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492067672/?ar">https://go.oreilly.com/library-access/library/view/-/9781492067672/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492067672/?ar">https://learning.oreilly.com/library/view/~/9781492067672/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical malware analysis : the hands-on guide to dissecting malicious software ent://SD_ILS/0/SD_ILS:2295152 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Sikorski, Michael.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781593272906/?ar">https://go.oreilly.com/library-access/library/view/-/9781593272906/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781593272906/?ar">https://learning.oreilly.com/library/view/~/9781593272906/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781593272906">https://learning.oreilly.com/library/view/~/9781593272906</a><br/>Format:&#160;Electronic Resources<br/> Cybercrime and the Law : Challenges, Issues, and Outcomes. ent://SD_ILS/0/SD_ILS:1252122 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Brenner, Susan W.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1085118">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Absolute beginner's guide to security, spam, spyware and viruses ent://SD_ILS/0/SD_ILS:2282088 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Walker, Andy.<br/><a href="https://learning.oreilly.com/library/view/~/0789734591">https://learning.oreilly.com/library/view/~/0789734591</a> <a href="https://go.oreilly.com/library-access/library/view/-/0789734591/?ar">https://go.oreilly.com/library-access/library/view/-/0789734591/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0789734591/?ar">https://learning.oreilly.com/library/view/~/0789734591/?ar</a><br/>Format:&#160;Electronic Resources<br/> Malware forensics : investigating and analyzing malicious code ent://SD_ILS/0/SD_ILS:2285693 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Aquilina, James M.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492683/?ar">https://learning.oreilly.com/library/view/~/9781597492683/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492683/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492683/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492683">https://learning.oreilly.com/library/view/~/9781597492683</a><br/>Format:&#160;Electronic Resources<br/> AVIEN malware defense guide for the Enterprise ent://SD_ILS/0/SD_ILS:2284510 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Harley, David.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491648">https://learning.oreilly.com/library/view/~/9781597491648</a> <a href="https://learning.oreilly.com/library/view/~/9781597491648/?ar">https://learning.oreilly.com/library/view/~/9781597491648/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491648/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491648/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical internet of things security : design a security framework for an Internet connected ecosystem ent://SD_ILS/0/SD_ILS:2318628 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Russell, Brian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788625821/?ar">https://learning.oreilly.com/library/view/~/9781788625821/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788625821/?ar">https://go.oreilly.com/library-access/library/view/-/9781788625821/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybercrime : protecting your business, your family and yourself ent://SD_ILS/0/SD_ILS:2332545 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Wade, Todd author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780175874/?ar">https://learning.oreilly.com/library/view/~/9781780175874/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781780175874">https://learning.oreilly.com/library/view/~/9781780175874</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781780175874/?ar">https://go.oreilly.com/library-access/library/view/-/9781780175874/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learning Python for forensics : leverage the power of Python in forensic investigations ent://SD_ILS/0/SD_ILS:2319116 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Miller, Preston, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789341690/?ar">https://learning.oreilly.com/library/view/~/9781789341690/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789341690/?ar">https://go.oreilly.com/library-access/library/view/-/9781789341690/?ar</a><br/>Format:&#160;Electronic Resources<br/> Malware forensics field guide for Linux systems ent://SD_ILS/0/SD_ILS:2302388 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Malin, Cameron H.<br/><a href="https://learning.oreilly.com/library/view/~/9781597494700/?ar">https://learning.oreilly.com/library/view/~/9781597494700/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597494700/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494700/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information technology / Paul A. Davies. ent://SD_ILS/0/SD_ILS:1563896 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Davies, Paul A., author.<br/>Format:&#160;Books<br/> Information security a manager's guide to thwarting data thieves and hackers ent://SD_ILS/0/SD_ILS:2048017 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Alexander, Philip, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=339307">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Biotechnology : Cells, Sensors and Sifters. ent://SD_ILS/0/SD_ILS:1326723 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Patch, Kimberly.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3411426">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mac OS X Black Book. ent://SD_ILS/0/SD_ILS:1322042 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Steinberg.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3384700">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Special Issue On Internet Security. ent://SD_ILS/0/SD_ILS:1183888 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Warren, Mathew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=232281">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The Essential Guide to Home Computer Security. ent://SD_ILS/0/SD_ILS:1235656 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;R. Rowlingson, Robert.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=811317">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Technological Turf Wars : A Case Study of the Computer Antivirus Industry. ent://SD_ILS/0/SD_ILS:1204988 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Johnston, Jessica R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=432873">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Ultimate guide to internet security ent://SD_ILS/0/SD_ILS:2247336 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z <a href="http://link.overdrive.com/?websiteID=564&titleID=5848537">Click to access digital title.</a> Image <a href="https://img1.od-cdn.com/ImageType-100/11052-1/%7BE4706EC4-128D-404A-91D7-FF4749DEA6EE%7DImg100.jpg">Large cover image</a> Thumbnail <a href="https://img1.od-cdn.com/ImageType-200/11052-1/%7BE4706EC4-128D-404A-91D7-FF4749DEA6EE%7DImg200.jpg">Thumbnail cover image</a><br/>Format:&#160;Electronic Resources<br/> Honeypots and routers : collecting internet attacks ent://SD_ILS/0/SD_ILS:2322273 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Mohammed, Mohssen, 1982- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781498702201">https://learning.oreilly.com/library/view/~/9781498702201</a> <a href="https://learning.oreilly.com/library/view/~/9781498702201/?ar">https://learning.oreilly.com/library/view/~/9781498702201/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781498702201/?ar">https://go.oreilly.com/library-access/library/view/-/9781498702201/?ar</a><br/>Format:&#160;Electronic Resources<br/> DNA Computing Models ent://SD_ILS/0/SD_ILS:501752 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Zimmermann, Karl-Heinz. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-73637-2">http://dx.doi.org/10.1007/978-0-387-73637-2</a><br/>Format:&#160;Electronic Resources<br/> Data Warehousing and Data Mining Techniques for Cyber Security ent://SD_ILS/0/SD_ILS:505647 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Singhal, Anoop. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-47653-7">http://dx.doi.org/10.1007/978-0-387-47653-7</a><br/>Format:&#160;Electronic Resources<br/> Security and software for cybercaf&eacute;s ent://SD_ILS/0/SD_ILS:2261883 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Adomi, Esharenana E.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-903-8">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-903-8</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510572 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Desmedt, Yvo G. editor.<br/><a href="http://dx.doi.org/10.1007/11599371">http://dx.doi.org/10.1007/11599371</a><br/>Format:&#160;Electronic Resources<br/> Exploit : A Theory of Networks. ent://SD_ILS/0/SD_ILS:1196496 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Galloway, Alexander R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=328399">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Newnes PC troubleshooting pocket book ent://SD_ILS/0/SD_ILS:65881 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Anderson, Howard.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750659888">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Evolutionary Genomics ent://SD_ILS/0/SD_ILS:2084243 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Saitou, Naruya. author.<br/><a href="https://doi.org/10.1007/978-3-319-92642-1">https://doi.org/10.1007/978-3-319-92642-1</a><br/>Format:&#160;Electronic Resources<br/> Network Security JumpStart : Computer and Network Security Basics. ent://SD_ILS/0/SD_ILS:1188326 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Strebe, Matthew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=272216">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer Network Security ent://SD_ILS/0/SD_ILS:504373 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Kizza, Joseph Migga. author.<br/><a href="http://dx.doi.org/10.1007/b106962">http://dx.doi.org/10.1007/b106962</a><br/>Format:&#160;Electronic Resources<br/> Computer Security in the 21st Century ent://SD_ILS/0/SD_ILS:504252 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Lee, D. T. editor.<br/><a href="http://dx.doi.org/10.1007/b104203">http://dx.doi.org/10.1007/b104203</a><br/>Format:&#160;Electronic Resources<br/> Biosensing ent://SD_ILS/0/SD_ILS:506723 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Schultz, Jerome. author.<br/><a href="http://dx.doi.org/10.1007/1-4020-4058-X">http://dx.doi.org/10.1007/1-4020-4058-X</a><br/>Format:&#160;Electronic Resources<br/> Foundations of Computer Security ent://SD_ILS/0/SD_ILS:508525 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Salomon, David. author.<br/><a href="http://dx.doi.org/10.1007/1-84628-341-8">http://dx.doi.org/10.1007/1-84628-341-8</a><br/>Format:&#160;Electronic Resources<br/> Advanced topics in end user computing. Vol. 1 ent://SD_ILS/0/SD_ILS:2261080 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Mahmood, Mo Adam.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-930708-42-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-930708-42-6</a><br/>Format:&#160;Electronic Resources<br/> BCS Glossary of Computing and ICT. ent://SD_ILS/0/SD_ILS:1254116 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Burdett, Arnold.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1122636">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Your Free Open Source Music Studio. ent://SD_ILS/0/SD_ILS:1305138 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Childs, G.W.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3136465">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Molecular and Cellular Signaling ent://SD_ILS/0/SD_ILS:504474 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Beckerman, Martin. author.<br/><a href="http://dx.doi.org/10.1007/b136493">http://dx.doi.org/10.1007/b136493</a><br/>Format:&#160;Electronic Resources<br/> Aspects of Network and Information Security. ent://SD_ILS/0/SD_ILS:1199280 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Kranakis, E.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=363205">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Biometrics, Computer Security Systems and Artificial Intelligence Applications ent://SD_ILS/0/SD_ILS:505426 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Saeed, Khalid. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-36503-9">http://dx.doi.org/10.1007/978-0-387-36503-9</a><br/>Format:&#160;Electronic Resources<br/> Viral Membrane Proteins: Structure, Function, and Drug Design ent://SD_ILS/0/SD_ILS:504740 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Fischer, Wolfgang B. editor.<br/><a href="http://dx.doi.org/10.1007/0-387-28146-0">http://dx.doi.org/10.1007/0-387-28146-0</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Outlook programming jumpstart for administrators, power users, and developers ent://SD_ILS/0/SD_ILS:65570 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Mosher, Sue, 1953-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582869">An electronic book accessible through the World Wide Web; click for information</a> Publisher description <a href="http://www.loc.gov/catdir/description/els031/2003268295.html">http://www.loc.gov/catdir/description/els031/2003268295.html</a> Table of contents <a href="http://www.loc.gov/catdir/toc/els031/2003268295.html">http://www.loc.gov/catdir/toc/els031/2003268295.html</a><br/>Format:&#160;Electronic Resources<br/> Essential Computer Security : Everyone's Guide to Email, Internet, and Wireless Security. ent://SD_ILS/0/SD_ILS:1195846 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Bradley, T.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=319200">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Physical security for IT ent://SD_ILS/0/SD_ILS:65850 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Erbschloe, Michael, 1951-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583279">An electronic book accessible through the World Wide Web; click for information</a> Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip051/2004023167.html">http://www.loc.gov/catdir/toc/ecip051/2004023167.html</a> Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0617/2004023167-d.html">http://www.loc.gov/catdir/enhancements/fy0617/2004023167-d.html</a><br/>Format:&#160;Electronic Resources<br/> General Systems Theory : Ideas And Applications. ent://SD_ILS/0/SD_ILS:1181010 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Skyttner, L.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=183728">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computing with Windows 7 for the Older and Wiser : Get up and Running on Your Home PC. ent://SD_ILS/0/SD_ILS:1215687 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Arnold, Adrian.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=537383">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Inter-Domain Management First International Conference on Autonomous Infrastructure, Management and Security, AIMS 2007, Oslo, Norway, June 21-22, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512572 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Bandara, Arosha K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72986-0">http://dx.doi.org/10.1007/978-3-540-72986-0</a><br/>Format:&#160;Electronic Resources<br/> Biological Information:New Perspectives ent://SD_ILS/0/SD_ILS:2180015 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Robert J Marks II<br/><a href="http://www.worldscientific.com/worldscibooks/10.1142/8818">DOAB: download the publication</a> <a href="https://directory.doabooks.org/handle/20.500.12854/42227">DOAB: description of the publication</a><br/>Format:&#160;Books<br/> The history of information security a comprehensive handbook ent://SD_ILS/0/SD_ILS:64198 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Leeuw, Karl de.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444516084">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Teach Yourself VISUALLY Laptops. ent://SD_ILS/0/SD_ILS:1196996 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Muir, Nancy C.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=333813">Click to View</a><br/>Format:&#160;Electronic Resources<br/> General Systems Theory : Problems, Perspectives, Practice. ent://SD_ILS/0/SD_ILS:1271395 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Skyttner, Lars.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1681395">Click to View</a><br/>Format:&#160;Electronic Resources<br/> PCs Simplified. ent://SD_ILS/0/SD_ILS:1228907 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Marmel, Elaine.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=706859">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computers at Risk : Safe Computing in the Information Age. ent://SD_ILS/0/SD_ILS:1318549 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Staff, National Research Council.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3376465">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hands-On Ethical Hacking and Network Defense. ent://SD_ILS/0/SD_ILS:1305233 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Simpson, Michael T.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3136562">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer-Based Patient Record : An Essential Technology for Health Care, Revised Edition. ent://SD_ILS/0/SD_ILS:1318819 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Dick, Richard S.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3376738">Click to View</a><br/>Format:&#160;Electronic Resources<br/> CompTIA Strata Study Guide : Exams FC0-U41, FC0-U11, and FC0-U21. ent://SD_ILS/0/SD_ILS:1228536 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Smith, Andrew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=698007">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Teach Yourself VISUALLY PCs. ent://SD_ILS/0/SD_ILS:1223005 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Marmel, Elaine.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=644889">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Invasion of Privacy : Big Brother and the Company Hackers. ent://SD_ILS/0/SD_ILS:1304380 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Weber, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3135625">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The Classroom Teacher's Technology Survival Guide. ent://SD_ILS/0/SD_ILS:1235896 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Johnson, Doug.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=817517">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Good Small Business Guide 2012 : How to Start and Grow Your Own Business. ent://SD_ILS/0/SD_ILS:1236417 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Bloomsbury Publishing,.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=819837">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The Antivirus Hacker's Handbook. ent://SD_ILS/0/SD_ILS:1282683 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Koret, Joxean.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1985804">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Administrative Assistant's and Secretary's Handbook. ent://SD_ILS/0/SD_ILS:1266409 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Stroman, James.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1596415">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Administrative Assistant's and Secretary's Handbook. ent://SD_ILS/0/SD_ILS:1232716 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;WILSON, Kevin.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=773204">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Eleventh Hour CISSP : Study Guide. ent://SD_ILS/0/SD_ILS:1263697 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Conrad, Eric.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1495655">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Windows 8 Tweaks. ent://SD_ILS/0/SD_ILS:1238043 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Sinchak, Steve.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=837592">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Maritime Security : An Introduction. ent://SD_ILS/0/SD_ILS:1199462 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;McNicholas, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=365617">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Experimental Leukemia : History, Biology and Genetics. ent://SD_ILS/0/SD_ILS:1293042 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Sugiyama, Taketoshi.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3019785">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Trust and Security in Collaborative Computing. ent://SD_ILS/0/SD_ILS:1270688 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Zou, Xukai.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1679354">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Broadband Bible. ent://SD_ILS/0/SD_ILS:1300816 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Gaskin, James E.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3056671">Click to View</a><br/>Format:&#160;Electronic Resources<br/> New Realism, New Barbarism : Socialist Theory in the Era of Globalization. ent://SD_ILS/0/SD_ILS:1322369 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Kagarlitsky, Boris.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3386057">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Investigating Internet Crimes : An Introduction to Solving Crimes in Cyberspace. ent://SD_ILS/0/SD_ILS:1253490 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Shipley, Todd G.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115158">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Word 2010 All-in-One For Dummies. ent://SD_ILS/0/SD_ILS:1214336 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Lowe, Doug.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=530006">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Risk and Crisis Management : 101 Cases (Revised Edition). ent://SD_ILS/0/SD_ILS:1271217 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Ishikawa, Akira.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1681179">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Why Do Kamikaze Pilots Wear Helmets? : Answers to the Questions You've Always Wanted to Ask. ent://SD_ILS/0/SD_ILS:1290634 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Thompson, Andrew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3015248">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Malware Analyst's Cookbook and DVD : Tools and Techniques for Fighting Malicious Code. ent://SD_ILS/0/SD_ILS:1222226 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Ligh, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=624374">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer Security Handbook, Set. ent://SD_ILS/0/SD_ILS:1269337 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Bosworth, Seymour.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1652940">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Artificial War : Multiagent-based Simulation Of Combat. ent://SD_ILS/0/SD_ILS:1183189 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Ilachinski, Andrew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227143">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Death of the Internet. ent://SD_ILS/0/SD_ILS:1239227 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Jakobsson, Markus.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=848529">Click to View</a><br/>Format:&#160;Electronic Resources<br/> CCTV Surveillance : Video Practices and Technology. ent://SD_ILS/0/SD_ILS:1190381 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Kruegle, Herman.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=284021">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Wireless Mobile Internet Security. ent://SD_ILS/0/SD_ILS:1256505 2025-07-17T02:40:04Z 2025-07-17T02:40:04Z by&#160;Rhee, Man Young.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1161959">Click to View</a><br/>Format:&#160;Electronic Resources<br/>