Arama Sonuçları Computer viruses.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qu$003dComputer$002bviruses.$0026ps$003d300?dt=list2025-07-17T02:40:04ZComputer Viruses and Malwareent://SD_ILS/0/SD_ILS:5052842025-07-17T02:40:04Z2025-07-17T02:40:04Zby Aycock, John. author.<br/><a href="http://dx.doi.org/10.1007/0-387-34188-9">http://dx.doi.org/10.1007/0-387-34188-9</a><br/>Format: Electronic Resources<br/>Computer viruses: from theory to applicationsent://SD_ILS/0/SD_ILS:5087322025-07-17T02:40:04Z2025-07-17T02:40:04Zby Filiol, Eric. author.<br/><a href="http://dx.doi.org/10.1007/2-287-28099-5">http://dx.doi.org/10.1007/2-287-28099-5</a><br/>Format: Electronic Resources<br/>Seven deadliest Microsoft attacksent://SD_ILS/0/SD_ILS:22898492025-07-17T02:40:04Z2025-07-17T02:40:04Zby Kraus, Rob.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495516/?ar">https://learning.oreilly.com/library/view/~/9781597495516/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495516/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495516/?ar</a><br/>Format: Electronic Resources<br/>The art of computer virus research and defenseent://SD_ILS/0/SD_ILS:22816212025-07-17T02:40:04Z2025-07-17T02:40:04Zby Szor, Peter.<br/><a href="https://learning.oreilly.com/library/view/~/0321304543/?ar">https://learning.oreilly.com/library/view/~/0321304543/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0321304543/?ar">https://go.oreilly.com/library-access/library/view/-/0321304543/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321304543">https://learning.oreilly.com/library/view/~/0321304543</a><br/>Format: Electronic Resources<br/>Malicious mobile code : virus protection for Windowsent://SD_ILS/0/SD_ILS:22812012025-07-17T02:40:04Z2025-07-17T02:40:04Zby Grimes, Roger A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/156592682X/?ar">https://go.oreilly.com/library-access/library/view/-/156592682X/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/156592682X/?ar">https://learning.oreilly.com/library/view/~/156592682X/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/156592682X">https://learning.oreilly.com/library/view/~/156592682X</a><br/>Format: Electronic Resources<br/>E-mail virus protection handbook.ent://SD_ILS/0/SD_ILS:22807552025-07-17T02:40:04Z2025-07-17T02:40:04Zby Syngress Media, Inc.<br/><a href="https://www.sciencedirect.com/science/book/9781928994237">https://www.sciencedirect.com/science/book/9781928994237</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781928994237/?ar">https://go.oreilly.com/library-access/library/view/-/9781928994237/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781928994237/?ar">https://learning.oreilly.com/library/view/~/9781928994237/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781928994237">https://learning.oreilly.com/library/view/~/9781928994237</a><br/>Format: Electronic Resources<br/>Automatic defense against zero-day polymorphic worms in communication networksent://SD_ILS/0/SD_ILS:21305512025-07-17T02:40:04Z2025-07-17T02:40:04Zby Mohammed, Mohssen, 1982- author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1220106">Click to View</a><br/>Format: Electronic Resources<br/>Configuring Symantec AntiVirus corporate editionent://SD_ILS/0/SD_ILS:655772025-07-17T02:40:04Z2025-07-17T02:40:04Zby Hunter, Laura E.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836814">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Cuckoo Malware Analysis.ent://SD_ILS/0/SD_ILS:12622062025-07-17T02:40:04Z2025-07-17T02:40:04Zby Oktavianto, Digit.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1389346">Click to View</a><br/>Format: Electronic Resources<br/>Antivirus bypass techniques : learn practical techniques and tactics to combat, bypass, and evade antivirus softwareent://SD_ILS/0/SD_ILS:23538072025-07-17T02:40:04Z2025-07-17T02:40:04Zby Yehoshua, Nir, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6741268">Click to View</a><br/>Format: Electronic Resources<br/>E-mail virus protection handbookent://SD_ILS/0/SD_ILS:657602025-07-17T02:40:04Z2025-07-17T02:40:04Zby Syngress Media, Inc.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994237">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Buffer overflow attacks detect, exploit, preventent://SD_ILS/0/SD_ILS:655432025-07-17T02:40:04Z2025-07-17T02:40:04Zby Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266672">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Configuring Symantec AntiVirus Enterprise Edition.ent://SD_ILS/0/SD_ILS:11920062025-07-17T02:40:04Z2025-07-17T02:40:04Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294056">Click to View</a><br/>Format: Electronic Resources<br/>Defense and Detection Strategies against Internet Worms.ent://SD_ILS/0/SD_ILS:11833692025-07-17T02:40:04Z2025-07-17T02:40:04Zby Nazario, Jose.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227660">Click to View</a><br/>Format: Electronic Resources<br/>Degunking your email, snam, and virusesent://SD_ILS/0/SD_ILS:21024672025-07-17T02:40:04Z2025-07-17T02:40:04Zby Duntemann, Jeff.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3384731">Click to View</a><br/>Format: Electronic Resources<br/>Degunking Your Email, Spam, and Viruses.ent://SD_ILS/0/SD_ILS:13220732025-07-17T02:40:04Z2025-07-17T02:40:04Zby Duntemann, Jeff.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3384731">Click to View</a><br/>Format: Electronic Resources<br/>Malware forensics field guide for Windows systems digital forensics field guidesent://SD_ILS/0/SD_ILS:22057382025-07-17T02:40:04Z2025-07-17T02:40:04Zby Malin, Cameron H.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=921016">Click to View</a><br/>Format: Electronic Resources<br/>Practical Malware Analysis : A Hands-On Guide to Dissecting Malicious Software.ent://SD_ILS/0/SD_ILS:12555862025-07-17T02:40:04Z2025-07-17T02:40:04Zby Sikorski, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1137570">Click to View</a><br/>Format: Electronic Resources<br/>Antivirus bypass techniques : learn practical techniques and tactics to combat, bypass, and evade antivirus softwareent://SD_ILS/0/SD_ILS:23294342025-07-17T02:40:04Z2025-07-17T02:40:04Zby Yehoshua, Nir, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801079747/?ar">https://learning.oreilly.com/library/view/~/9781801079747/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801079747/?ar">https://go.oreilly.com/library-access/library/view/-/9781801079747/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801079747">https://learning.oreilly.com/library/view/~/9781801079747</a><br/>Format: Electronic Resources<br/>Manually removing viruses and malware from Windows 7ent://SD_ILS/0/SD_ILS:22967582025-07-17T02:40:04Z2025-07-17T02:40:04Zby Halsey, Mike.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781449338053/?ar">https://go.oreilly.com/library-access/library/view/-/9781449338053/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781449338053/?ar">https://learning.oreilly.com/videos/~/9781449338053/?ar</a><br/>Format: Electronic Resources<br/>Malicious cryptography : exposing cryptovirologyent://SD_ILS/0/SD_ILS:23102812025-07-17T02:40:04Z2025-07-17T02:40:04Zby Young, Adam, 1972- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780764568466/?ar">https://go.oreilly.com/library-access/library/view/-/9780764568466/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780764568466">https://learning.oreilly.com/library/view/~/9780764568466</a>
<a href="https://learning.oreilly.com/library/view/~/9780764568466/?ar">https://learning.oreilly.com/library/view/~/9780764568466/?ar</a><br/>Format: Electronic Resources<br/>Mit open souce-tools : Spam & Viren bekäempfenent://SD_ILS/0/SD_ILS:23078262025-07-17T02:40:04Z2025-07-17T02:40:04Zby Eisentraut, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/9783868999068">https://learning.oreilly.com/library/view/~/9783868999068</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783868999068/?ar">https://go.oreilly.com/library-access/library/view/-/9783868999068/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9783868999068/?ar">https://learning.oreilly.com/library/view/~/9783868999068/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity - Attack and Defense Strategies - Second Editionent://SD_ILS/0/SD_ILS:23231022025-07-17T02:40:04Z2025-07-17T02:40:04Zby Diogenes, Yuri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838827793/?ar">https://go.oreilly.com/library-access/library/view/-/9781838827793/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781838827793/?ar">https://learning.oreilly.com/library/view/~/9781838827793/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781838827793">https://learning.oreilly.com/library/view/~/9781838827793</a><br/>Format: Electronic Resources<br/>Cuckoo Malware Analysis.ent://SD_ILS/0/SD_ILS:23005612025-07-17T02:40:04Z2025-07-17T02:40:04Zby Oktavianto, Digit.<br/><a href="https://learning.oreilly.com/library/view/~/9781782169239/?ar">https://learning.oreilly.com/library/view/~/9781782169239/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781782169239/?ar">https://go.oreilly.com/library-access/library/view/-/9781782169239/?ar</a><br/>Format: Electronic Resources<br/>Windows Malware analysis essentials : master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill setent://SD_ILS/0/SD_ILS:23084382025-07-17T02:40:04Z2025-07-17T02:40:04Zby Marak, Victor, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785281518">https://learning.oreilly.com/library/view/~/9781785281518</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785281518/?ar">https://go.oreilly.com/library-access/library/view/-/9781785281518/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785281518/?ar">https://learning.oreilly.com/library/view/~/9781785281518/?ar</a><br/>Format: Electronic Resources<br/>Malware forensics field guide for Linux systemsent://SD_ILS/0/SD_ILS:22061612025-07-17T02:40:04Z2025-07-17T02:40:04Zby Malin, Cameron H.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115128">Click to View</a><br/>Format: Electronic Resources<br/>Network defense and countermeasures : principles and practicesent://SD_ILS/0/SD_ILS:23014352025-07-17T02:40:04Z2025-07-17T02:40:04Zby Easttom, Chuck, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780133384390">https://learning.oreilly.com/library/view/~/9780133384390</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780133384390/?ar">https://go.oreilly.com/library-access/library/view/-/9780133384390/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780133384390/?ar">https://learning.oreilly.com/library/view/~/9780133384390/?ar</a><br/>Format: Electronic Resources<br/>Malware forensics field guide for Windows systems : digital forensics field guidesent://SD_ILS/0/SD_ILS:22946822025-07-17T02:40:04Z2025-07-17T02:40:04Zby Malin, Cameron H.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494724/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494724/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494724/?ar">https://learning.oreilly.com/library/view/~/9781597494724/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494724">https://learning.oreilly.com/library/view/~/9781597494724</a><br/>Format: Electronic Resources<br/>Malware data science : attack detection and attributionent://SD_ILS/0/SD_ILS:23173882025-07-17T02:40:04Z2025-07-17T02:40:04Zby Saxe, Joshua, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492067672">https://learning.oreilly.com/library/view/~/9781492067672</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492067672/?ar">https://go.oreilly.com/library-access/library/view/-/9781492067672/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492067672/?ar">https://learning.oreilly.com/library/view/~/9781492067672/?ar</a><br/>Format: Electronic Resources<br/>Practical malware analysis : the hands-on guide to dissecting malicious softwareent://SD_ILS/0/SD_ILS:22951522025-07-17T02:40:04Z2025-07-17T02:40:04Zby Sikorski, Michael.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781593272906/?ar">https://go.oreilly.com/library-access/library/view/-/9781593272906/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781593272906/?ar">https://learning.oreilly.com/library/view/~/9781593272906/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781593272906">https://learning.oreilly.com/library/view/~/9781593272906</a><br/>Format: Electronic Resources<br/>Cybercrime and the Law : Challenges, Issues, and Outcomes.ent://SD_ILS/0/SD_ILS:12521222025-07-17T02:40:04Z2025-07-17T02:40:04Zby Brenner, Susan W.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1085118">Click to View</a><br/>Format: Electronic Resources<br/>Absolute beginner's guide to security, spam, spyware and virusesent://SD_ILS/0/SD_ILS:22820882025-07-17T02:40:04Z2025-07-17T02:40:04Zby Walker, Andy.<br/><a href="https://learning.oreilly.com/library/view/~/0789734591">https://learning.oreilly.com/library/view/~/0789734591</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0789734591/?ar">https://go.oreilly.com/library-access/library/view/-/0789734591/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0789734591/?ar">https://learning.oreilly.com/library/view/~/0789734591/?ar</a><br/>Format: Electronic Resources<br/>Malware forensics : investigating and analyzing malicious codeent://SD_ILS/0/SD_ILS:22856932025-07-17T02:40:04Z2025-07-17T02:40:04Zby Aquilina, James M.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492683/?ar">https://learning.oreilly.com/library/view/~/9781597492683/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492683/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492683/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492683">https://learning.oreilly.com/library/view/~/9781597492683</a><br/>Format: Electronic Resources<br/>AVIEN malware defense guide for the Enterpriseent://SD_ILS/0/SD_ILS:22845102025-07-17T02:40:04Z2025-07-17T02:40:04Zby Harley, David.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491648">https://learning.oreilly.com/library/view/~/9781597491648</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491648/?ar">https://learning.oreilly.com/library/view/~/9781597491648/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491648/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491648/?ar</a><br/>Format: Electronic Resources<br/>Practical internet of things security : design a security framework for an Internet connected ecosystement://SD_ILS/0/SD_ILS:23186282025-07-17T02:40:04Z2025-07-17T02:40:04Zby Russell, Brian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788625821/?ar">https://learning.oreilly.com/library/view/~/9781788625821/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788625821/?ar">https://go.oreilly.com/library-access/library/view/-/9781788625821/?ar</a><br/>Format: Electronic Resources<br/>Cybercrime : protecting your business, your family and yourselfent://SD_ILS/0/SD_ILS:23325452025-07-17T02:40:04Z2025-07-17T02:40:04Zby Wade, Todd author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780175874/?ar">https://learning.oreilly.com/library/view/~/9781780175874/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780175874">https://learning.oreilly.com/library/view/~/9781780175874</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780175874/?ar">https://go.oreilly.com/library-access/library/view/-/9781780175874/?ar</a><br/>Format: Electronic Resources<br/>Learning Python for forensics : leverage the power of Python in forensic investigationsent://SD_ILS/0/SD_ILS:23191162025-07-17T02:40:04Z2025-07-17T02:40:04Zby Miller, Preston, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789341690/?ar">https://learning.oreilly.com/library/view/~/9781789341690/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789341690/?ar">https://go.oreilly.com/library-access/library/view/-/9781789341690/?ar</a><br/>Format: Electronic Resources<br/>Malware forensics field guide for Linux systemsent://SD_ILS/0/SD_ILS:23023882025-07-17T02:40:04Z2025-07-17T02:40:04Zby Malin, Cameron H.<br/><a href="https://learning.oreilly.com/library/view/~/9781597494700/?ar">https://learning.oreilly.com/library/view/~/9781597494700/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597494700/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494700/?ar</a><br/>Format: Electronic Resources<br/>Information technology / Paul A. Davies.ent://SD_ILS/0/SD_ILS:15638962025-07-17T02:40:04Z2025-07-17T02:40:04Zby Davies, Paul A., author.<br/>Format: Books<br/>Information security a manager's guide to thwarting data thieves and hackersent://SD_ILS/0/SD_ILS:20480172025-07-17T02:40:04Z2025-07-17T02:40:04Zby Alexander, Philip, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=339307">Click to View</a><br/>Format: Electronic Resources<br/>Biotechnology : Cells, Sensors and Sifters.ent://SD_ILS/0/SD_ILS:13267232025-07-17T02:40:04Z2025-07-17T02:40:04Zby Patch, Kimberly.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3411426">Click to View</a><br/>Format: Electronic Resources<br/>Mac OS X Black Book.ent://SD_ILS/0/SD_ILS:13220422025-07-17T02:40:04Z2025-07-17T02:40:04Zby Steinberg.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3384700">Click to View</a><br/>Format: Electronic Resources<br/>Special Issue On Internet Security.ent://SD_ILS/0/SD_ILS:11838882025-07-17T02:40:04Z2025-07-17T02:40:04Zby Warren, Mathew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=232281">Click to View</a><br/>Format: Electronic Resources<br/>The Essential Guide to Home Computer Security.ent://SD_ILS/0/SD_ILS:12356562025-07-17T02:40:04Z2025-07-17T02:40:04Zby R. Rowlingson, Robert.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=811317">Click to View</a><br/>Format: Electronic Resources<br/>Technological Turf Wars : A Case Study of the Computer Antivirus Industry.ent://SD_ILS/0/SD_ILS:12049882025-07-17T02:40:04Z2025-07-17T02:40:04Zby Johnston, Jessica R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=432873">Click to View</a><br/>Format: Electronic Resources<br/>Ultimate guide to internet securityent://SD_ILS/0/SD_ILS:22473362025-07-17T02:40:04Z2025-07-17T02:40:04Z<a href="http://link.overdrive.com/?websiteID=564&titleID=5848537">Click to access digital title.</a>
Image <a href="https://img1.od-cdn.com/ImageType-100/11052-1/%7BE4706EC4-128D-404A-91D7-FF4749DEA6EE%7DImg100.jpg">Large cover image</a>
Thumbnail <a href="https://img1.od-cdn.com/ImageType-200/11052-1/%7BE4706EC4-128D-404A-91D7-FF4749DEA6EE%7DImg200.jpg">Thumbnail cover image</a><br/>Format: Electronic Resources<br/>Honeypots and routers : collecting internet attacksent://SD_ILS/0/SD_ILS:23222732025-07-17T02:40:04Z2025-07-17T02:40:04Zby Mohammed, Mohssen, 1982- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781498702201">https://learning.oreilly.com/library/view/~/9781498702201</a>
<a href="https://learning.oreilly.com/library/view/~/9781498702201/?ar">https://learning.oreilly.com/library/view/~/9781498702201/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781498702201/?ar">https://go.oreilly.com/library-access/library/view/-/9781498702201/?ar</a><br/>Format: Electronic Resources<br/>DNA Computing Modelsent://SD_ILS/0/SD_ILS:5017522025-07-17T02:40:04Z2025-07-17T02:40:04Zby Zimmermann, Karl-Heinz. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-73637-2">http://dx.doi.org/10.1007/978-0-387-73637-2</a><br/>Format: Electronic Resources<br/>Data Warehousing and Data Mining Techniques for Cyber Securityent://SD_ILS/0/SD_ILS:5056472025-07-17T02:40:04Z2025-07-17T02:40:04Zby Singhal, Anoop. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-47653-7">http://dx.doi.org/10.1007/978-0-387-47653-7</a><br/>Format: Electronic Resources<br/>Security and software for cybercafésent://SD_ILS/0/SD_ILS:22618832025-07-17T02:40:04Z2025-07-17T02:40:04Zby Adomi, Esharenana E.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-903-8">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-903-8</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5105722025-07-17T02:40:04Z2025-07-17T02:40:04Zby Desmedt, Yvo G. editor.<br/><a href="http://dx.doi.org/10.1007/11599371">http://dx.doi.org/10.1007/11599371</a><br/>Format: Electronic Resources<br/>Exploit : A Theory of Networks.ent://SD_ILS/0/SD_ILS:11964962025-07-17T02:40:04Z2025-07-17T02:40:04Zby Galloway, Alexander R.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=328399">Click to View</a><br/>Format: Electronic Resources<br/>Newnes PC troubleshooting pocket bookent://SD_ILS/0/SD_ILS:658812025-07-17T02:40:04Z2025-07-17T02:40:04Zby Anderson, Howard.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750659888">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Introduction to Evolutionary Genomicsent://SD_ILS/0/SD_ILS:20842432025-07-17T02:40:04Z2025-07-17T02:40:04Zby Saitou, Naruya. author.<br/><a href="https://doi.org/10.1007/978-3-319-92642-1">https://doi.org/10.1007/978-3-319-92642-1</a><br/>Format: Electronic Resources<br/>Network Security JumpStart : Computer and Network Security Basics.ent://SD_ILS/0/SD_ILS:11883262025-07-17T02:40:04Z2025-07-17T02:40:04Zby Strebe, Matthew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=272216">Click to View</a><br/>Format: Electronic Resources<br/>Computer Network Securityent://SD_ILS/0/SD_ILS:5043732025-07-17T02:40:04Z2025-07-17T02:40:04Zby Kizza, Joseph Migga. author.<br/><a href="http://dx.doi.org/10.1007/b106962">http://dx.doi.org/10.1007/b106962</a><br/>Format: Electronic Resources<br/>Computer Security in the 21st Centuryent://SD_ILS/0/SD_ILS:5042522025-07-17T02:40:04Z2025-07-17T02:40:04Zby Lee, D. T. editor.<br/><a href="http://dx.doi.org/10.1007/b104203">http://dx.doi.org/10.1007/b104203</a><br/>Format: Electronic Resources<br/>Biosensingent://SD_ILS/0/SD_ILS:5067232025-07-17T02:40:04Z2025-07-17T02:40:04Zby Schultz, Jerome. author.<br/><a href="http://dx.doi.org/10.1007/1-4020-4058-X">http://dx.doi.org/10.1007/1-4020-4058-X</a><br/>Format: Electronic Resources<br/>Foundations of Computer Securityent://SD_ILS/0/SD_ILS:5085252025-07-17T02:40:04Z2025-07-17T02:40:04Zby Salomon, David. author.<br/><a href="http://dx.doi.org/10.1007/1-84628-341-8">http://dx.doi.org/10.1007/1-84628-341-8</a><br/>Format: Electronic Resources<br/>Advanced topics in end user computing. Vol. 1ent://SD_ILS/0/SD_ILS:22610802025-07-17T02:40:04Z2025-07-17T02:40:04Zby Mahmood, Mo Adam.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-930708-42-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-930708-42-6</a><br/>Format: Electronic Resources<br/>BCS Glossary of Computing and ICT.ent://SD_ILS/0/SD_ILS:12541162025-07-17T02:40:04Z2025-07-17T02:40:04Zby Burdett, Arnold.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1122636">Click to View</a><br/>Format: Electronic Resources<br/>Your Free Open Source Music Studio.ent://SD_ILS/0/SD_ILS:13051382025-07-17T02:40:04Z2025-07-17T02:40:04Zby Childs, G.W.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3136465">Click to View</a><br/>Format: Electronic Resources<br/>Molecular and Cellular Signalingent://SD_ILS/0/SD_ILS:5044742025-07-17T02:40:04Z2025-07-17T02:40:04Zby Beckerman, Martin. author.<br/><a href="http://dx.doi.org/10.1007/b136493">http://dx.doi.org/10.1007/b136493</a><br/>Format: Electronic Resources<br/>Aspects of Network and Information Security.ent://SD_ILS/0/SD_ILS:11992802025-07-17T02:40:04Z2025-07-17T02:40:04Zby Kranakis, E.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=363205">Click to View</a><br/>Format: Electronic Resources<br/>Biometrics, Computer Security Systems and Artificial Intelligence Applicationsent://SD_ILS/0/SD_ILS:5054262025-07-17T02:40:04Z2025-07-17T02:40:04Zby Saeed, Khalid. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-36503-9">http://dx.doi.org/10.1007/978-0-387-36503-9</a><br/>Format: Electronic Resources<br/>Viral Membrane Proteins: Structure, Function, and Drug Designent://SD_ILS/0/SD_ILS:5047402025-07-17T02:40:04Z2025-07-17T02:40:04Zby Fischer, Wolfgang B. editor.<br/><a href="http://dx.doi.org/10.1007/0-387-28146-0">http://dx.doi.org/10.1007/0-387-28146-0</a><br/>Format: Electronic Resources<br/>Microsoft Outlook programming jumpstart for administrators, power users, and developersent://SD_ILS/0/SD_ILS:655702025-07-17T02:40:04Z2025-07-17T02:40:04Zby Mosher, Sue, 1953-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582869">An electronic book accessible through the World Wide Web; click for information</a>
Publisher description <a href="http://www.loc.gov/catdir/description/els031/2003268295.html">http://www.loc.gov/catdir/description/els031/2003268295.html</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/els031/2003268295.html">http://www.loc.gov/catdir/toc/els031/2003268295.html</a><br/>Format: Electronic Resources<br/>Essential Computer Security : Everyone's Guide to Email, Internet, and Wireless Security.ent://SD_ILS/0/SD_ILS:11958462025-07-17T02:40:04Z2025-07-17T02:40:04Zby Bradley, T.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=319200">Click to View</a><br/>Format: Electronic Resources<br/>Physical security for ITent://SD_ILS/0/SD_ILS:658502025-07-17T02:40:04Z2025-07-17T02:40:04Zby Erbschloe, Michael, 1951-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583279">An electronic book accessible through the World Wide Web; click for information</a>
Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip051/2004023167.html">http://www.loc.gov/catdir/toc/ecip051/2004023167.html</a>
Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0617/2004023167-d.html">http://www.loc.gov/catdir/enhancements/fy0617/2004023167-d.html</a><br/>Format: Electronic Resources<br/>General Systems Theory : Ideas And Applications.ent://SD_ILS/0/SD_ILS:11810102025-07-17T02:40:04Z2025-07-17T02:40:04Zby Skyttner, L.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=183728">Click to View</a><br/>Format: Electronic Resources<br/>Computing with Windows 7 for the Older and Wiser : Get up and Running on Your Home PC.ent://SD_ILS/0/SD_ILS:12156872025-07-17T02:40:04Z2025-07-17T02:40:04Zby Arnold, Adrian.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=537383">Click to View</a><br/>Format: Electronic Resources<br/>Inter-Domain Management First International Conference on Autonomous Infrastructure, Management and Security, AIMS 2007, Oslo, Norway, June 21-22, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125722025-07-17T02:40:04Z2025-07-17T02:40:04Zby Bandara, Arosha K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72986-0">http://dx.doi.org/10.1007/978-3-540-72986-0</a><br/>Format: Electronic Resources<br/>Biological Information:New Perspectivesent://SD_ILS/0/SD_ILS:21800152025-07-17T02:40:04Z2025-07-17T02:40:04Zby Robert J Marks II<br/><a href="http://www.worldscientific.com/worldscibooks/10.1142/8818">DOAB: download the publication</a>
<a href="https://directory.doabooks.org/handle/20.500.12854/42227">DOAB: description of the publication</a><br/>Format: Books<br/>The history of information security a comprehensive handbookent://SD_ILS/0/SD_ILS:641982025-07-17T02:40:04Z2025-07-17T02:40:04Zby Leeuw, Karl de.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444516084">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Teach Yourself VISUALLY Laptops.ent://SD_ILS/0/SD_ILS:11969962025-07-17T02:40:04Z2025-07-17T02:40:04Zby Muir, Nancy C.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=333813">Click to View</a><br/>Format: Electronic Resources<br/>General Systems Theory : Problems, Perspectives, Practice.ent://SD_ILS/0/SD_ILS:12713952025-07-17T02:40:04Z2025-07-17T02:40:04Zby Skyttner, Lars.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1681395">Click to View</a><br/>Format: Electronic Resources<br/>PCs Simplified.ent://SD_ILS/0/SD_ILS:12289072025-07-17T02:40:04Z2025-07-17T02:40:04Zby Marmel, Elaine.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=706859">Click to View</a><br/>Format: Electronic Resources<br/>Computers at Risk : Safe Computing in the Information Age.ent://SD_ILS/0/SD_ILS:13185492025-07-17T02:40:04Z2025-07-17T02:40:04Zby Staff, National Research Council.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3376465">Click to View</a><br/>Format: Electronic Resources<br/>Hands-On Ethical Hacking and Network Defense.ent://SD_ILS/0/SD_ILS:13052332025-07-17T02:40:04Z2025-07-17T02:40:04Zby Simpson, Michael T.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3136562">Click to View</a><br/>Format: Electronic Resources<br/>Computer-Based Patient Record : An Essential Technology for Health Care, Revised Edition.ent://SD_ILS/0/SD_ILS:13188192025-07-17T02:40:04Z2025-07-17T02:40:04Zby Dick, Richard S.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3376738">Click to View</a><br/>Format: Electronic Resources<br/>CompTIA Strata Study Guide : Exams FC0-U41, FC0-U11, and FC0-U21.ent://SD_ILS/0/SD_ILS:12285362025-07-17T02:40:04Z2025-07-17T02:40:04Zby Smith, Andrew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=698007">Click to View</a><br/>Format: Electronic Resources<br/>Teach Yourself VISUALLY PCs.ent://SD_ILS/0/SD_ILS:12230052025-07-17T02:40:04Z2025-07-17T02:40:04Zby Marmel, Elaine.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=644889">Click to View</a><br/>Format: Electronic Resources<br/>Invasion of Privacy : Big Brother and the Company Hackers.ent://SD_ILS/0/SD_ILS:13043802025-07-17T02:40:04Z2025-07-17T02:40:04Zby Weber, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3135625">Click to View</a><br/>Format: Electronic Resources<br/>The Classroom Teacher's Technology Survival Guide.ent://SD_ILS/0/SD_ILS:12358962025-07-17T02:40:04Z2025-07-17T02:40:04Zby Johnson, Doug.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=817517">Click to View</a><br/>Format: Electronic Resources<br/>Good Small Business Guide 2012 : How to Start and Grow Your Own Business.ent://SD_ILS/0/SD_ILS:12364172025-07-17T02:40:04Z2025-07-17T02:40:04Zby Bloomsbury Publishing,.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=819837">Click to View</a><br/>Format: Electronic Resources<br/>The Antivirus Hacker's Handbook.ent://SD_ILS/0/SD_ILS:12826832025-07-17T02:40:04Z2025-07-17T02:40:04Zby Koret, Joxean.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1985804">Click to View</a><br/>Format: Electronic Resources<br/>Administrative Assistant's and Secretary's Handbook.ent://SD_ILS/0/SD_ILS:12664092025-07-17T02:40:04Z2025-07-17T02:40:04Zby Stroman, James.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1596415">Click to View</a><br/>Format: Electronic Resources<br/>Administrative Assistant's and Secretary's Handbook.ent://SD_ILS/0/SD_ILS:12327162025-07-17T02:40:04Z2025-07-17T02:40:04Zby WILSON, Kevin.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=773204">Click to View</a><br/>Format: Electronic Resources<br/>Eleventh Hour CISSP : Study Guide.ent://SD_ILS/0/SD_ILS:12636972025-07-17T02:40:04Z2025-07-17T02:40:04Zby Conrad, Eric.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1495655">Click to View</a><br/>Format: Electronic Resources<br/>Windows 8 Tweaks.ent://SD_ILS/0/SD_ILS:12380432025-07-17T02:40:04Z2025-07-17T02:40:04Zby Sinchak, Steve.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=837592">Click to View</a><br/>Format: Electronic Resources<br/>Maritime Security : An Introduction.ent://SD_ILS/0/SD_ILS:11994622025-07-17T02:40:04Z2025-07-17T02:40:04Zby McNicholas, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=365617">Click to View</a><br/>Format: Electronic Resources<br/>Experimental Leukemia : History, Biology and Genetics.ent://SD_ILS/0/SD_ILS:12930422025-07-17T02:40:04Z2025-07-17T02:40:04Zby Sugiyama, Taketoshi.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3019785">Click to View</a><br/>Format: Electronic Resources<br/>Trust and Security in Collaborative Computing.ent://SD_ILS/0/SD_ILS:12706882025-07-17T02:40:04Z2025-07-17T02:40:04Zby Zou, Xukai.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1679354">Click to View</a><br/>Format: Electronic Resources<br/>Broadband Bible.ent://SD_ILS/0/SD_ILS:13008162025-07-17T02:40:04Z2025-07-17T02:40:04Zby Gaskin, James E.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3056671">Click to View</a><br/>Format: Electronic Resources<br/>New Realism, New Barbarism : Socialist Theory in the Era of Globalization.ent://SD_ILS/0/SD_ILS:13223692025-07-17T02:40:04Z2025-07-17T02:40:04Zby Kagarlitsky, Boris.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3386057">Click to View</a><br/>Format: Electronic Resources<br/>Investigating Internet Crimes : An Introduction to Solving Crimes in Cyberspace.ent://SD_ILS/0/SD_ILS:12534902025-07-17T02:40:04Z2025-07-17T02:40:04Zby Shipley, Todd G.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115158">Click to View</a><br/>Format: Electronic Resources<br/>Word 2010 All-in-One For Dummies.ent://SD_ILS/0/SD_ILS:12143362025-07-17T02:40:04Z2025-07-17T02:40:04Zby Lowe, Doug.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=530006">Click to View</a><br/>Format: Electronic Resources<br/>Risk and Crisis Management : 101 Cases (Revised Edition).ent://SD_ILS/0/SD_ILS:12712172025-07-17T02:40:04Z2025-07-17T02:40:04Zby Ishikawa, Akira.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1681179">Click to View</a><br/>Format: Electronic Resources<br/>Why Do Kamikaze Pilots Wear Helmets? : Answers to the Questions You've Always Wanted to Ask.ent://SD_ILS/0/SD_ILS:12906342025-07-17T02:40:04Z2025-07-17T02:40:04Zby Thompson, Andrew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3015248">Click to View</a><br/>Format: Electronic Resources<br/>Malware Analyst's Cookbook and DVD : Tools and Techniques for Fighting Malicious Code.ent://SD_ILS/0/SD_ILS:12222262025-07-17T02:40:04Z2025-07-17T02:40:04Zby Ligh, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=624374">Click to View</a><br/>Format: Electronic Resources<br/>Computer Security Handbook, Set.ent://SD_ILS/0/SD_ILS:12693372025-07-17T02:40:04Z2025-07-17T02:40:04Zby Bosworth, Seymour.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1652940">Click to View</a><br/>Format: Electronic Resources<br/>Artificial War : Multiagent-based Simulation Of Combat.ent://SD_ILS/0/SD_ILS:11831892025-07-17T02:40:04Z2025-07-17T02:40:04Zby Ilachinski, Andrew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227143">Click to View</a><br/>Format: Electronic Resources<br/>Death of the Internet.ent://SD_ILS/0/SD_ILS:12392272025-07-17T02:40:04Z2025-07-17T02:40:04Zby Jakobsson, Markus.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=848529">Click to View</a><br/>Format: Electronic Resources<br/>CCTV Surveillance : Video Practices and Technology.ent://SD_ILS/0/SD_ILS:11903812025-07-17T02:40:04Z2025-07-17T02:40:04Zby Kruegle, Herman.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=284021">Click to View</a><br/>Format: Electronic Resources<br/>Wireless Mobile Internet Security.ent://SD_ILS/0/SD_ILS:12565052025-07-17T02:40:04Z2025-07-17T02:40:04Zby Rhee, Man Young.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1161959">Click to View</a><br/>Format: Electronic Resources<br/>