Arama Sonu&ccedil;ları Firewalls(Computer security) SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dFirewalls$002528Computer$002bsecurity$002529$0026rm$003dTEZ$002bKOLEKSIYONU0$00257C$00257C$00257C1$00257C$00257C$00257C0$00257C$00257C$00257Ctrue$0026te$003dILS$0026ps$003d300?dt=list 2025-07-03T17:22:58Z Policy anomaly reporting for distributed firewalls ent://SD_ILS/0/SD_ILS:16328 2025-07-03T17:22:58Z 2025-07-03T17:22:58Z by&#160;&Ccedil;etin, F&uuml;sun.<br/><a href="http://hdl.handle.net/11147/3197">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> A feedback-based testing methodology for network security software ent://SD_ILS/0/SD_ILS:408861 2025-07-03T17:22:58Z 2025-07-03T17:22:58Z by&#160;Ger&ccedil;ek, G&uuml;rcan.<br/><a href="http://hdl.handle.net/11147/3600">Access to Electronic Versiyon.</a><br/>Format:&#160;El Yazması<br/> Traffic generator for firewall testing ent://SD_ILS/0/SD_ILS:41235 2025-07-03T17:22:58Z 2025-07-03T17:22:58Z by&#160;Kaya, &Ouml;zg&uuml;r.<br/><a href="http://hdl.handle.net/11147/3631">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> Development of a distributed firewall administration tool ent://SD_ILS/0/SD_ILS:17418 2025-07-03T17:22:58Z 2025-07-03T17:22:58Z by&#160;Erdoğan, Yunus.<br/><a href="http://hdl.handle.net/11147/3360">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> Firewall monitoring using intrusion detection systems ent://SD_ILS/0/SD_ILS:16817 2025-07-03T17:22:58Z 2025-07-03T17:22:58Z by&#160;Asarcıklı, Ş&uuml;kran.<br/><a href="http://hdl.handle.net/11147/3295">Access to Electronic Version</a><br/>Format:&#160;El Yazması<br/> Campus network topology discovery and distributed firewall policy generation ent://SD_ILS/0/SD_ILS:129360 2025-07-03T17:22:58Z 2025-07-03T17:22:58Z by&#160;&Ccedil;alışkan, Ezgi.<br/><a href="http://hdl.handle.net/11147/3102">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> Standards And Practices Necessary To Implement A Successful Security Review Program For Intrusion Management Systems ent://SD_ILS/0/SD_ILS:48243 2025-07-03T17:22:58Z 2025-07-03T17:22:58Z by&#160;Doruk, Alpay.<br/><a href="http://hdl.handle.net/11147/3706">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> Intrusion detection system alert correlation with operating system level logs ent://SD_ILS/0/SD_ILS:95740 2025-07-03T17:22:58Z 2025-07-03T17:22:58Z by&#160;Toprak, Mustafa.<br/><a href="http://hdl.handle.net/11147/4029">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> A firewall design for academic environments ent://SD_ILS/0/SD_ILS:87840 2025-07-03T17:22:58Z 2025-07-03T17:22:58Z by&#160;Tok, Metin.<br/><a href="http://hdl.handle.net/11147/3974">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> Analysis of intrusion prevention methods ent://SD_ILS/0/SD_ILS:47461 2025-07-03T17:22:58Z 2025-07-03T17:22:58Z by&#160;Semerci, Hakan.<br/><a href="http://hdl.handle.net/11147/3695">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/>