Search Results for Computer security. - Narrowed by: Elsevier E-Book CollectionsSirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AELSBOOK$002509Elsevier$002bE-Book$002bCollections$0026ps$003d300?dt=list2026-01-10T21:52:02ZComputer securityent://SD_ILS/0/SD_ILS:11750902026-01-10T21:52:02Z2026-01-10T21:52:02Zby Hsiao, David K., 1933-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123576507">https://www.sciencedirect.com/science/book/9780123576507</a><br/>Format: Electronic Resources<br/>Computer securityent://SD_ILS/0/SD_ILS:11759622026-01-10T21:52:02Z2026-01-10T21:52:02Zby Carroll, John M. (John Millar), 1925-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780409900323">https://www.sciencedirect.com/science/book/9780409900323</a><br/>Format: Electronic Resources<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:11925942026-01-10T21:52:02Z2026-01-10T21:52:02Zby Vacca, John R.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123743541">https://www.sciencedirect.com/science/book/9780123743541</a><br/>Format: Electronic Resources<br/>Essential computer security : everyone's guide to e-mail, internet, and wireless securityent://SD_ILS/0/SD_ILS:11864192026-01-10T21:52:02Z2026-01-10T21:52:02Zby Bradley, Tony, 1969-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491143">https://www.sciencedirect.com/science/book/9781597491143</a><br/>Format: Electronic Resources<br/>Securing the cloud : cloud computer security techniques and tacticsent://SD_ILS/0/SD_ILS:11837432026-01-10T21:52:02Z2026-01-10T21:52:02Zby Winkler, J. R. (Joachim R.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format: Electronic Resources<br/>Information assurance : dependability and security in networked systemsent://SD_ILS/0/SD_ILS:11891952026-01-10T21:52:02Z2026-01-10T21:52:02Zby Qian, Yi, 1962-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123735669">https://www.sciencedirect.com/science/book/9780123735669</a><br/>Format: Electronic Resources<br/>Digital watermarking and steganographyent://SD_ILS/0/SD_ILS:11891962026-01-10T21:52:02Z2026-01-10T21:52:02Zby Cox, I. J. (Ingemar J.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123725851">http://www.sciencedirect.com/science/book/9780123725851</a><br/>Format: Electronic Resources<br/>Information security best practices : 205 basic rulesent://SD_ILS/0/SD_ILS:11883182026-01-10T21:52:02Z2026-01-10T21:52:02Zby Stefanek, George L.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781878707963">https://www.sciencedirect.com/science/book/9781878707963</a><br/>Format: Electronic Resources<br/>Configuring SonicWALL firewallsent://SD_ILS/0/SD_ILS:11882822026-01-10T21:52:02Z2026-01-10T21:52:02Zby Bendell, Dan.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492508">http://www.sciencedirect.com/science/book/9781597492508</a><br/>Format: Electronic Resources<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:11838152026-01-10T21:52:02Z2026-01-10T21:52:02Zby Andress, Jason.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496537">https://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Electronic Resources<br/>Host integrity monitoring : using Osiris and Samhainent://SD_ILS/0/SD_ILS:11882452026-01-10T21:52:02Z2026-01-10T21:52:02Zby Wotring, Brian.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490184">http://www.sciencedirect.com/science/book/9781597490184</a><br/>Format: Electronic Resources<br/>Intrusion prevention and active response : deploying network and host IPSent://SD_ILS/0/SD_ILS:11884002026-01-10T21:52:02Z2026-01-10T21:52:02Zby Rash, Michael.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266474">http://www.sciencedirect.com/science/book/9781932266474</a><br/>Format: Electronic Resources<br/>Wireless operational securityent://SD_ILS/0/SD_ILS:11881042026-01-10T21:52:02Z2026-01-10T21:52:02Zby Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583170">http://www.sciencedirect.com/science/book/9781555583170</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583170">https://www.sciencedirect.com/science/book/9781555583170</a><br/>Format: Electronic Resources<br/>Seven deadliest USB attacksent://SD_ILS/0/SD_ILS:11780202026-01-10T21:52:02Z2026-01-10T21:52:02Zby Anderson, Brian (Brian James)<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495530">https://www.sciencedirect.com/science/book/9781597495530</a><br/>Format: Electronic Resources<br/>Cybersecurity operations handbookent://SD_ILS/0/SD_ILS:11880952026-01-10T21:52:02Z2026-01-10T21:52:02Zby Rittinghouse, John W.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583064">https://www.sciencedirect.com/science/book/9781555583064</a><br/>Format: Electronic Resources<br/>Hack proofing ColdFusionent://SD_ILS/0/SD_ILS:11883582026-01-10T21:52:02Z2026-01-10T21:52:02Zby Meyer, Greg.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994770">http://www.sciencedirect.com/science/book/9781928994770</a><br/>Format: Electronic Resources<br/>Hack proofing your Web applicationsent://SD_ILS/0/SD_ILS:11883432026-01-10T21:52:02Z2026-01-10T21:52:02Zby Traxler, Julie.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994312">https://www.sciencedirect.com/science/book/9781928994312</a><br/>Format: Electronic Resources<br/>Hack proofing Sun Solaris 8ent://SD_ILS/0/SD_ILS:11884852026-01-10T21:52:02Z2026-01-10T21:52:02Zby Miles, Wyman.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994442">http://www.sciencedirect.com/science/book/9781928994442</a><br/>Format: Electronic Resources<br/>Microsoft forefront security administration guideent://SD_ILS/0/SD_ILS:11891202026-01-10T21:52:02Z2026-01-10T21:52:02Zby Varsalone, Jesse.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492447">https://www.sciencedirect.com/science/book/9781597492447</a><br/>Format: Electronic Resources<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:11882482026-01-10T21:52:02Z2026-01-10T21:52:02Zby Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490214">https://www.sciencedirect.com/science/book/9781597490214</a><br/>Format: Electronic Resources<br/>Implementing homeland security for enterprise ITent://SD_ILS/0/SD_ILS:11880992026-01-10T21:52:02Z2026-01-10T21:52:02Zby Erbschloe, Michael.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">http://www.sciencedirect.com/science/book/9781555583125</a><br/>Format: Electronic Resources<br/>Cyber adversary characterization : auditing the hacker mindent://SD_ILS/0/SD_ILS:11883692026-01-10T21:52:02Z2026-01-10T21:52:02Zby Parker, Tom.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836111">http://www.sciencedirect.com/science/book/9781931836111</a><br/>Format: Electronic Resources<br/>Hack proofing Windows 2000ent://SD_ILS/0/SD_ILS:11883812026-01-10T21:52:02Z2026-01-10T21:52:02Zby Todd, Chad.<br/><a href="http://www.sciencedirect.com/science/book/9781931836494">Available from ScienceDirect. Online version available for university members only. This requires an institutional login off-campus</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836494">https://www.sciencedirect.com/science/book/9781931836494</a><br/>Format: Electronic Resources<br/>Scene of the cybercrime.ent://SD_ILS/0/SD_ILS:11896652026-01-10T21:52:02Z2026-01-10T21:52:02Zby Cross, Michael, 1965-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492768">https://www.sciencedirect.com/science/book/9781597492768</a><br/>Format: Electronic Resources<br/>Syngress force emerging threat analysis : from mischief to maliciousent://SD_ILS/0/SD_ILS:11863392026-01-10T21:52:02Z2026-01-10T21:52:02Zby Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">http://www.sciencedirect.com/science/book/9781597490566</a><br/>Format: Electronic Resources<br/>OSSEC host-based intrusion detection guideent://SD_ILS/0/SD_ILS:11896202026-01-10T21:52:02Z2026-01-10T21:52:02Zby Hay, Andrew.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492409">http://www.sciencedirect.com/science/book/9781597492409</a><br/>Format: Electronic Resources<br/>Techno Security's guide to managing risks : for IT managers, auditors, and investigatorsent://SD_ILS/0/SD_ILS:11882802026-01-10T21:52:02Z2026-01-10T21:52:02Zby Wiles, Jack.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">http://www.sciencedirect.com/science/book/9781597491389</a><br/>Format: Electronic Resources<br/>Configuring Juniper Networks NetScreen & SSG firewallsent://SD_ILS/0/SD_ILS:11864282026-01-10T21:52:02Z2026-01-10T21:52:02Zby Cameron, Rob.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491181">http://www.sciencedirect.com/science/book/9781597491181</a><br/>Format: Electronic Resources<br/>Configuring Check Point NGX VPN-1/fire wall-ent://SD_ILS/0/SD_ILS:11882502026-01-10T21:52:02Z2026-01-10T21:52:02Zby Stephens, Robert.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490313">http://www.sciencedirect.com/science/book/9781597490313</a><br/>Format: Electronic Resources<br/>Check Point NGX R65 security administrationent://SD_ILS/0/SD_ILS:11891222026-01-10T21:52:02Z2026-01-10T21:52:02Zby Bonnell, Ralph.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492454">http://www.sciencedirect.com/science/book/9781597492454</a><br/>Format: Electronic Resources<br/>Cisco PIX firewalls : configure, manage, & troubleshootent://SD_ILS/0/SD_ILS:11842832026-01-10T21:52:02Z2026-01-10T21:52:02Zby Behrens, Thorsten.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490047">https://www.sciencedirect.com/science/book/9781597490047</a><br/>Format: Electronic Resources<br/>Cisco PIX firewalls : configure, manage, & troubleshootent://SD_ILS/0/SD_ILS:11884812026-01-10T21:52:02Z2026-01-10T21:52:02Zby Behrens, Thorsten.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490047">https://www.sciencedirect.com/science/book/9781597490047</a><br/>Format: Electronic Resources<br/>Stealing the network : how to own a continentent://SD_ILS/0/SD_ILS:11883672026-01-10T21:52:02Z2026-01-10T21:52:02Zby 131ah.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836050">http://www.sciencedirect.com/science/book/9781931836050</a><br/>Format: Electronic Resources<br/>Zero day exploit : countdown to darknessent://SD_ILS/0/SD_ILS:11884892026-01-10T21:52:02Z2026-01-10T21:52:02Zby Shein, Rob.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836098">http://www.sciencedirect.com/science/book/9781931836098</a><br/>Format: Electronic Resources<br/>Integrating ISA Server 2006 with Microsoft Exchange 2007ent://SD_ILS/0/SD_ILS:11896502026-01-10T21:52:02Z2026-01-10T21:52:02Zby Strachan, Fergus.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492751">http://www.sciencedirect.com/science/book/9781597492751</a><br/>Format: Electronic Resources<br/>How to cheat at configuring ISA server 2004ent://SD_ILS/0/SD_ILS:11882612026-01-10T21:52:02Z2026-01-10T21:52:02Zby Shinder, Thomas W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490573">http://www.sciencedirect.com/science/book/9781597490573</a><br/>Format: Electronic Resources<br/>Special ops : host and network security for Microsoft, UNIX, and Oracleent://SD_ILS/0/SD_ILS:11884962026-01-10T21:52:02Z2026-01-10T21:52:02Zby Birkholz, Erik Pace.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836692">http://www.sciencedirect.com/science/book/9781931836692</a><br/>Format: Electronic Resources<br/>Cisco security professional's guide to secure intrusion detection systemsent://SD_ILS/0/SD_ILS:11884082026-01-10T21:52:02Z2026-01-10T21:52:02Zby Burton, James.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266696">http://www.sciencedirect.com/science/book/9781932266696</a><br/>Format: Electronic Resources<br/>Firewall policies and VPN configurationsent://SD_ILS/0/SD_ILS:11882702026-01-10T21:52:02Z2026-01-10T21:52:02Zby Henmi, Anne.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490887">https://www.sciencedirect.com/science/book/9781597490887</a><br/>Format: Electronic Resources<br/>Insider threat : protecting the enterprise from sabotage, spying, and theftent://SD_ILS/0/SD_ILS:11882592026-01-10T21:52:02Z2026-01-10T21:52:02Zby Cole, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format: Electronic Resources<br/>Botnets : the killer web appent://SD_ILS/0/SD_ILS:11864442026-01-10T21:52:02Z2026-01-10T21:52:02Zby Schiller, Craig A.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491358">https://www.sciencedirect.com/science/book/9781597491358</a><br/>Format: Electronic Resources<br/>How to cheat at designing security for a Windows Server 2003 networkent://SD_ILS/0/SD_ILS:11882812026-01-10T21:52:02Z2026-01-10T21:52:02Zby Amini, Rob.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492430">https://www.sciencedirect.com/science/book/9781597492430</a><br/>Format: Electronic Resources<br/>Professional penetration testing : creating and operating a formal hacking labent://SD_ILS/0/SD_ILS:11930162026-01-10T21:52:02Z2026-01-10T21:52:02Zby Wilhelm, Thomas.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494250">https://www.sciencedirect.com/science/book/9781597494250</a><br/>Format: Electronic Resources<br/>Network security assessment : from vulnerability to patchent://SD_ILS/0/SD_ILS:11882732026-01-10T21:52:02Z2026-01-10T21:52:02Zby Manzuik, Steve.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491013">http://www.sciencedirect.com/science/book/9781597491013</a><br/>Format: Electronic Resources<br/>How to cheat at securing your networkent://SD_ILS/0/SD_ILS:11899832026-01-10T21:52:02Z2026-01-10T21:52:02Zby Dubrawsky, Ido.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492317">https://www.sciencedirect.com/science/book/9781597492317</a><br/>Format: Electronic Resources<br/>Developer's guide to web application securityent://SD_ILS/0/SD_ILS:11863712026-01-10T21:52:02Z2026-01-10T21:52:02Zby Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format: Electronic Resources<br/>Hacking a terror network : the silent threat of covert channelsent://SD_ILS/0/SD_ILS:11883632026-01-10T21:52:02Z2026-01-10T21:52:02Zby Rogers, Russ.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994985">https://www.sciencedirect.com/science/book/9781928994985</a><br/>Format: Electronic Resources<br/>Snort 2.1 intrusion detectionent://SD_ILS/0/SD_ILS:11883662026-01-10T21:52:02Z2026-01-10T21:52:02Zby Beale, Jay.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836043">https://www.sciencedirect.com/science/book/9781931836043</a><br/>Format: Electronic Resources<br/>Snort : IDS and IPS toolkitent://SD_ILS/0/SD_ILS:11882712026-01-10T21:52:02Z2026-01-10T21:52:02Zby Beale, Jay.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490993">https://www.sciencedirect.com/science/book/9781597490993</a><br/>Format: Electronic Resources<br/>AVIEN malware defense guide for the Enterpriseent://SD_ILS/0/SD_ILS:11891042026-01-10T21:52:02Z2026-01-10T21:52:02Zby Harley, David.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491648">https://www.sciencedirect.com/science/book/9781597491648</a><br/>Format: Electronic Resources<br/>Check Point NG VPN-1/Firewall-1 : advanced configuration and troubleshootingent://SD_ILS/0/SD_ILS:11883972026-01-10T21:52:02Z2026-01-10T21:52:02Zby Noble, Jim.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836975">http://www.sciencedirect.com/science/book/9781931836975</a><br/>Format: Electronic Resources<br/>Hack the stack : using snort and ethereal to master the 8 layers of an insecure networkent://SD_ILS/0/SD_ILS:11864272026-01-10T21:52:02Z2026-01-10T21:52:02Zby Gregg, Michael (Michael C.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">http://www.sciencedirect.com/science/book/9781597491099</a><br/>Format: Electronic Resources<br/>Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasuresent://SD_ILS/0/SD_ILS:11864392026-01-10T21:52:02Z2026-01-10T21:52:02Zby Contos, Brian T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491297">https://www.sciencedirect.com/science/book/9781597491297</a><br/>Format: Electronic Resources<br/>Hack proofing your networkent://SD_ILS/0/SD_ILS:11883572026-01-10T21:52:02Z2026-01-10T21:52:02Zby Ahmad, David R. Mirza.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994701">https://www.sciencedirect.com/science/book/9781928994701</a><br/>Format: Electronic Resources<br/>Secure your network for free : using NMAP, wireshark, snort, nessus, and MRTGent://SD_ILS/0/SD_ILS:11882782026-01-10T21:52:02Z2026-01-10T21:52:02Zby Seagren, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491235">http://www.sciencedirect.com/science/book/9781597491235</a><br/>Format: Electronic Resources<br/>Eleventh hour network+ : exam N10-004 study guideent://SD_ILS/0/SD_ILS:11928062026-01-10T21:52:02Z2026-01-10T21:52:02Zby Alpern, Naomi J.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494281">https://www.sciencedirect.com/science/book/9781597494281</a><br/>Format: Electronic Resources<br/>Eleventh hour security+ : exam SYO-201 study guideent://SD_ILS/0/SD_ILS:11928382026-01-10T21:52:02Z2026-01-10T21:52:02Zby Dubrawsky, Ido.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494274">https://www.sciencedirect.com/science/book/9781597494274</a><br/>Format: Electronic Resources<br/>Writing security tools and exploitsent://SD_ILS/0/SD_ILS:11882842026-01-10T21:52:02Z2026-01-10T21:52:02Zby Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499972">http://www.sciencedirect.com/science/book/9781597499972</a><br/>Format: Electronic Resources<br/>Programmer's ultimate security deskrefent://SD_ILS/0/SD_ILS:11884092026-01-10T21:52:02Z2026-01-10T21:52:02Zby Foster, James C.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781932266726">https://www.sciencedirect.com/science/book/9781932266726</a><br/>Format: Electronic Resources<br/>SQL injection attacks and defenseent://SD_ILS/0/SD_ILS:11928192026-01-10T21:52:02Z2026-01-10T21:52:02Zby Clarke, Justin.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494243">https://www.sciencedirect.com/science/book/9781597494243</a><br/>Format: Electronic Resources<br/>Malware forensics : investigating and analyzing malicious codeent://SD_ILS/0/SD_ILS:11896362026-01-10T21:52:02Z2026-01-10T21:52:02Zby Aquilina, James M.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492683">http://www.sciencedirect.com/science/book/9781597492683</a><br/>Format: Electronic Resources<br/>Microsoft Vista for IT security professionalsent://SD_ILS/0/SD_ILS:11864532026-01-10T21:52:02Z2026-01-10T21:52:02Zby Piltzecker, Tony, 1975-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491396">http://www.sciencedirect.com/science/book/9781597491396</a><br/>Format: Electronic Resources<br/>Metasploit toolkit for penetration testing, exploit development, and vulnerability researchent://SD_ILS/0/SD_ILS:11863732026-01-10T21:52:02Z2026-01-10T21:52:02Zby Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">http://www.sciencedirect.com/science/book/9781597490740</a><br/>Format: Electronic Resources<br/>Combating spyware in the enterpriseent://SD_ILS/0/SD_ILS:11863552026-01-10T21:52:02Z2026-01-10T21:52:02Zby Baskin, Brian.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490641">https://www.sciencedirect.com/science/book/9781597490641</a><br/>Format: Electronic Resources<br/>Black Hat physical device security : exploiting hardware and softwareent://SD_ILS/0/SD_ILS:11884102026-01-10T21:52:02Z2026-01-10T21:52:02Zby Miller, Drew, 1978-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266818">http://www.sciencedirect.com/science/book/9781932266818</a><br/>Format: Electronic Resources<br/>The basics of hacking and penetration testing : ethical hacking and penetration testing made easyent://SD_ILS/0/SD_ILS:11839502026-01-10T21:52:02Z2026-01-10T21:52:02Zby Engebretson, Pat (Patrick Henry), 1974-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496551">https://www.sciencedirect.com/science/book/9781597496551</a><br/>Format: Electronic Resources<br/>Open source fuzzing tools.ent://SD_ILS/0/SD_ILS:11864742026-01-10T21:52:02Z2026-01-10T21:52:02Zby Rathaus, Noam.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491952">http://www.sciencedirect.com/science/book/9781597491952</a><br/>Format: Electronic Resources<br/>Microsoft windows security fundamentalsent://SD_ILS/0/SD_ILS:11857032026-01-10T21:52:02Z2026-01-10T21:52:02Zby Clercq, Jan de, 1968-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583408">https://www.sciencedirect.com/science/book/9781555583408</a><br/>Format: Electronic Resources<br/>Cyber spying : tracking your family's (sometimes) secret online livesent://SD_ILS/0/SD_ILS:11883792026-01-10T21:52:02Z2026-01-10T21:52:02Zby Fair, Ted.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836418">https://www.sciencedirect.com/science/book/9781931836418</a><br/>Format: Electronic Resources<br/>Snort 2.0 intrusion detectionent://SD_ILS/0/SD_ILS:11883872026-01-10T21:52:02Z2026-01-10T21:52:02Zby Beale, Jay.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836746">http://www.sciencedirect.com/science/book/9781931836746</a><br/>Format: Electronic Resources<br/>Enterprise directory and security implementation guide : designing and implementing directories in your organizationent://SD_ILS/0/SD_ILS:11850372026-01-10T21:52:02Z2026-01-10T21:52:02Zby Carrington, Charles (Charles Dudley)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780121604523">http://www.sciencedirect.com/science/book/9780121604523</a><br/>Format: Electronic Resources<br/>Hack proofing your identity in the information age : protect your family on the internet!ent://SD_ILS/0/SD_ILS:11853182026-01-10T21:52:02Z2026-01-10T21:52:02Zby Bidwell, Teri.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836517">https://www.sciencedirect.com/science/book/9781931836517</a><br/>Format: Electronic Resources<br/>Hack proofing Linux : a guide to open source securityent://SD_ILS/0/SD_ILS:11884842026-01-10T21:52:02Z2026-01-10T21:52:02Zby Stanger, James.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994343">http://www.sciencedirect.com/science/book/9781928994343</a><br/>Format: Electronic Resources<br/>Thor's Microsoft security bible : a collection of practical security techniquesent://SD_ILS/0/SD_ILS:11839722026-01-10T21:52:02Z2026-01-10T21:52:02Zby Mullen, Timothy M.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495721">http://www.sciencedirect.com/science/book/9781597495721</a><br/>Format: Electronic Resources<br/>System assurance : beyond detecting vulnerabilitiesent://SD_ILS/0/SD_ILS:11832662026-01-10T21:52:02Z2026-01-10T21:52:02Zby Mansourov, Nikolai.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123814142">https://www.sciencedirect.com/science/book/9780123814142</a><br/>Format: Electronic Resources<br/>FISMA certification & accreditation handbookent://SD_ILS/0/SD_ILS:11882772026-01-10T21:52:02Z2026-01-10T21:52:02Zby Taylor, Laura.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">http://www.sciencedirect.com/science/book/9781597491167</a><br/>Format: Electronic Resources<br/>Multimedia security technologies for digital rights managementent://SD_ILS/0/SD_ILS:11869942026-01-10T21:52:02Z2026-01-10T21:52:02Zby Zeng, Wenjun, 1967-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123694768">http://www.sciencedirect.com/science/book/9780123694768</a><br/>Format: Electronic Resources<br/>Implementing database security and auditing : a guide for DBAs, information security administrators and auditorsent://SD_ILS/0/SD_ILS:11881152026-01-10T21:52:02Z2026-01-10T21:52:02Zby Ben-Natan, Ron.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">http://www.sciencedirect.com/science/book/9781555583347</a><br/>Format: Electronic Resources<br/>Network security evaluation using the NSA IEMent://SD_ILS/0/SD_ILS:11882522026-01-10T21:52:02Z2026-01-10T21:52:02Zby Rogers, Russ.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490351">http://www.sciencedirect.com/science/book/9781597490351</a><br/>Format: Electronic Resources<br/>Check Point Next Generation with application intelligence security administrationent://SD_ILS/0/SD_ILS:11884142026-01-10T21:52:02Z2026-01-10T21:52:02Zby Tobkin, Chris.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781932266894">https://www.sciencedirect.com/science/book/9781932266894</a><br/>Format: Electronic Resources<br/>Digital watermarkingent://SD_ILS/0/SD_ILS:11881542026-01-10T21:52:02Z2026-01-10T21:52:02Zby Cox, I. J. (Ingemar J.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607149">http://www.sciencedirect.com/science/book/9781558607149</a><br/>Format: Electronic Resources<br/>Scene of the cybercrime : computer forensics handbookent://SD_ILS/0/SD_ILS:11884942026-01-10T21:52:02Z2026-01-10T21:52:02Zby Shinder, Debra Littlejohn, author.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836654">https://www.sciencedirect.com/science/book/9781931836654</a><br/>Format: Electronic Resources<br/>Advances in computers. Volume 83ent://SD_ILS/0/SD_ILS:11837822026-01-10T21:52:02Z2026-01-10T21:52:02Zby Zelkowitz, Marvin V., 1945-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123855107">http://www.sciencedirect.com/science/book/9780123855107</a><br/>Format: Electronic Resources<br/>Securing Windows server 2008 : prevent attacks from outside and inside your organization.ent://SD_ILS/0/SD_ILS:11896212026-01-10T21:52:02Z2026-01-10T21:52:02ZScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492805">https://www.sciencedirect.com/science/book/9781597492805</a><br/>Format: Electronic Resources<br/>OS X exploits and defenseent://SD_ILS/0/SD_ILS:11897052026-01-10T21:52:02Z2026-01-10T21:52:02Zby Baccas, Paul.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492546">http://www.sciencedirect.com/science/book/9781597492546</a><br/>Format: Electronic Resources<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:11864602026-01-10T21:52:02Z2026-01-10T21:52:02Zby Winkler, Ira.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491686">https://www.sciencedirect.com/science/book/9781597491686</a><br/>Format: Electronic Resources<br/>Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionalsent://SD_ILS/0/SD_ILS:11882422026-01-10T21:52:02Z2026-01-10T21:52:02Zby Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490054">http://www.sciencedirect.com/science/book/9781597490054</a><br/>Format: Electronic Resources<br/>MCSE/MCSA : implementing & administering security in a Windows 2000 network (exam 70-214) : study guide and DVD training systement://SD_ILS/0/SD_ILS:11883902026-01-10T21:52:02Z2026-01-10T21:52:02Zby Schmied, Will.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836845">http://www.sciencedirect.com/science/book/9781931836845</a><br/>Format: Electronic Resources<br/>Eleventh hour CISSP : study guideent://SD_ILS/0/SD_ILS:11831382026-01-10T21:52:02Z2026-01-10T21:52:02Zby Conrad, Eric, 1967-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495660">https://www.sciencedirect.com/science/book/9781597495660</a><br/>Format: Electronic Resources<br/>Syngress IT security project management handbookent://SD_ILS/0/SD_ILS:11882652026-01-10T21:52:02Z2026-01-10T21:52:02Zby Snedaker, Susan.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490764">http://www.sciencedirect.com/science/book/9781597490764</a><br/>Format: Electronic Resources<br/>Security+ study guide & DVD training systement://SD_ILS/0/SD_ILS:11864622026-01-10T21:52:02Z2026-01-10T21:52:02Zby Cross, Michael, 1965-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491532">https://www.sciencedirect.com/science/book/9781597491532</a><br/>Format: Electronic Resources<br/>Security for Microsoft Windows System Administrators : introduction to key information security conceptsent://SD_ILS/0/SD_ILS:11817682026-01-10T21:52:02Z2026-01-10T21:52:02Zby Rountree, Derrick.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495943">http://www.sciencedirect.com/science/book/9781597495943</a><br/>Format: Electronic Resources<br/>Best damn firewall book periodent://SD_ILS/0/SD_ILS:11891152026-01-10T21:52:02Z2026-01-10T21:52:02Zby Behrens, Thorsten.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492188">https://www.sciencedirect.com/science/book/9781597492188</a><br/>Format: Electronic Resources<br/>The best damn IT security management book periodent://SD_ILS/0/SD_ILS:11892392026-01-10T21:52:02Z2026-01-10T21:52:02Zby Susan Snedaker.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492270">http://www.sciencedirect.com/science/book/9781597492270</a><br/>Format: Electronic Resources<br/>Configuring NetScreen firewallsent://SD_ILS/0/SD_ILS:11883992026-01-10T21:52:02Z2026-01-10T21:52:02Zby Cameron, Rob.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266399">http://www.sciencedirect.com/science/book/9781932266399</a><br/>Format: Electronic Resources<br/>Security assessment : case studies for implementing the NSA IAMent://SD_ILS/0/SD_ILS:11884162026-01-10T21:52:02Z2026-01-10T21:52:02Zby Rogers, Russ.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266962">http://www.sciencedirect.com/science/book/9781932266962</a><br/>Format: Electronic Resources<br/>How to cheat at managing information securityent://SD_ILS/0/SD_ILS:11864212026-01-10T21:52:02Z2026-01-10T21:52:02Zby Osborne, Mark.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491105">https://www.sciencedirect.com/science/book/9781597491105</a><br/>Format: Electronic Resources<br/>Firewalls : jumpstart for network and systems administratorsent://SD_ILS/0/SD_ILS:11880892026-01-10T21:52:02Z2026-01-10T21:52:02Zby Vacca, John R.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582975">http://www.sciencedirect.com/science/book/9781555582975</a><br/>Format: Electronic Resources<br/>The best damn firewall book periodent://SD_ILS/0/SD_ILS:11883932026-01-10T21:52:02Z2026-01-10T21:52:02Zby Carasik, Anne H.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836906">http://www.sciencedirect.com/science/book/9781931836906</a><br/>Format: Electronic Resources<br/>Cisco security specialist's guide to PIX firewallsent://SD_ILS/0/SD_ILS:11883842026-01-10T21:52:02Z2026-01-10T21:52:02Zby Osipav, Vitaly.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836630">http://www.sciencedirect.com/science/book/9781931836630</a><br/>Format: Electronic Resources<br/>SonicWALL secure wireless network : integrated solutions guideent://SD_ILS/0/SD_ILS:11899142026-01-10T21:52:02Z2026-01-10T21:52:02Zby Levy, Joe.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491938">http://www.sciencedirect.com/science/book/9781597491938</a><br/>Format: Electronic Resources<br/>Security sage's guide to hardening the network infrastructureent://SD_ILS/0/SD_ILS:11883642026-01-10T21:52:02Z2026-01-10T21:52:02Zby Andrés, Steven.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836012">https://www.sciencedirect.com/science/book/9781931836012</a><br/>Format: Electronic Resources<br/>Hack proofing XMLent://SD_ILS/0/SD_ILS:11883822026-01-10T21:52:02Z2026-01-10T21:52:02Zby 'Ken'@ftu.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836500">http://www.sciencedirect.com/science/book/9781931836500</a><br/>Format: Electronic Resources<br/>Hack proofing your wireless networkent://SD_ILS/0/SD_ILS:11884872026-01-10T21:52:02Z2026-01-10T21:52:02Zby Barnes, Christian.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994596">http://www.sciencedirect.com/science/book/9781928994596</a><br/>Format: Electronic Resources<br/>Seven deadliest network attacksent://SD_ILS/0/SD_ILS:11780322026-01-10T21:52:02Z2026-01-10T21:52:02Zby Prowell, Stacy J.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495493">https://www.sciencedirect.com/science/book/9781597495493</a><br/>Format: Electronic Resources<br/>How to cheat at securing Linuxent://SD_ILS/0/SD_ILS:11891062026-01-10T21:52:02Z2026-01-10T21:52:02Zby Krishnamurthy Madwachar, Mohan.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492072">https://www.sciencedirect.com/science/book/9781597492072</a><br/>Format: Electronic Resources<br/>InfoSec career hacking : sell your skillz, not your soulent://SD_ILS/0/SD_ILS:11882442026-01-10T21:52:02Z2026-01-10T21:52:02Zby Bayles, Aaron W.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490115">https://www.sciencedirect.com/science/book/9781597490115</a><br/>Format: Electronic Resources<br/>Nessus, Snort, & Ethereal power tools : customizing open source security applicationsent://SD_ILS/0/SD_ILS:11882472026-01-10T21:52:02Z2026-01-10T21:52:02Zby Archibald, Neil.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490207">http://www.sciencedirect.com/science/book/9781597490207</a><br/>Format: Electronic Resources<br/>Ethereal : packet sniffingent://SD_ILS/0/SD_ILS:11884112026-01-10T21:52:02Z2026-01-10T21:52:02Zby Orebaugh, Angela.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266825">http://www.sciencedirect.com/science/book/9781932266825</a><br/>Format: Electronic Resources<br/>Managing and securing a Cisco structured wireless-aware networkent://SD_ILS/0/SD_ILS:11884152026-01-10T21:52:02Z2026-01-10T21:52:02Zby Wall, David.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781932266917">https://www.sciencedirect.com/science/book/9781932266917</a><br/>Format: Electronic Resources<br/>Network security : know it allent://SD_ILS/0/SD_ILS:11892572026-01-10T21:52:02Z2026-01-10T21:52:02Zby Joshi, James B. D.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123744630">http://www.sciencedirect.com/science/book/9780123744630</a><br/>Format: Electronic Resources<br/>How to cheat at configuring Open Source security toolsent://SD_ILS/0/SD_ILS:11864652026-01-10T21:52:02Z2026-01-10T21:52:02Zby Alder, Raven.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491709">http://www.sciencedirect.com/science/book/9781597491709</a><br/>Format: Electronic Resources<br/>Integrated security systems design : concepts, specifications, and implementationent://SD_ILS/0/SD_ILS:11879972026-01-10T21:52:02Z2026-01-10T21:52:02Zby Norman, Thomas L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679091">http://www.sciencedirect.com/science/book/9780750679091</a><br/>Format: Electronic Resources<br/>Designing and building enterprise DMZsent://SD_ILS/0/SD_ILS:11882722026-01-10T21:52:02Z2026-01-10T21:52:02Zby Dubrawsky, Ido.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491006">http://www.sciencedirect.com/science/book/9781597491006</a><br/>Format: Electronic Resources<br/>Security log management : identifying patterns in the chaosent://SD_ILS/0/SD_ILS:11882572026-01-10T21:52:02Z2026-01-10T21:52:02Zby Babbin, Jacob.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490429">http://www.sciencedirect.com/science/book/9781597490429</a><br/>Format: Electronic Resources<br/>Physical security for ITent://SD_ILS/0/SD_ILS:11881102026-01-10T21:52:02Z2026-01-10T21:52:02Zby Erbschloe, Michael, 1951-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583279">http://www.sciencedirect.com/science/book/9781555583279</a><br/>Format: Electronic Resources<br/>Network security : a practical approachent://SD_ILS/0/SD_ILS:11853532026-01-10T21:52:02Z2026-01-10T21:52:02Zby Harrington, Jan L.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123116338">https://www.sciencedirect.com/science/book/9780123116338</a><br/>Format: Electronic Resources<br/>Disappearing cryptography : information hiding : steganography & watermarkingent://SD_ILS/0/SD_ILS:11881692026-01-10T21:52:02Z2026-01-10T21:52:02Zby Wayner, Peter, 1964-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607699">http://www.sciencedirect.com/science/book/9781558607699</a><br/>Format: Electronic Resources<br/>Nokia network security solutions handbookent://SD_ILS/0/SD_ILS:11883862026-01-10T21:52:02Z2026-01-10T21:52:02Zby Maxwell, Doug.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836708">http://www.sciencedirect.com/science/book/9781931836708</a><br/>Format: Electronic Resources<br/>Managing Cisco network securityent://SD_ILS/0/SD_ILS:11884932026-01-10T21:52:02Z2026-01-10T21:52:02Zby Knipp, Eric.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836562">https://www.sciencedirect.com/science/book/9781931836562</a><br/>Format: Electronic Resources<br/>Cisco router and switch forensics : investigating and analyzing malicious network activityent://SD_ILS/0/SD_ILS:11928002026-01-10T21:52:02Z2026-01-10T21:52:02Zby Liu, Dale.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494182">https://www.sciencedirect.com/science/book/9781597494182</a><br/>Format: Electronic Resources<br/>ISA server and beyond : real world security solutions for Microsoft enterprise networksent://SD_ILS/0/SD_ILS:11884952026-01-10T21:52:02Z2026-01-10T21:52:02Zby Shinder, Thomas W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836661">http://www.sciencedirect.com/science/book/9781931836661</a><br/>Format: Electronic Resources<br/>How to cheat at securing SQL server 2005.ent://SD_ILS/0/SD_ILS:11864752026-01-10T21:52:02Z2026-01-10T21:52:02ZScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491969">http://www.sciencedirect.com/science/book/9781597491969</a><br/>Format: Electronic Resources<br/>Asterisk hacking.ent://SD_ILS/0/SD_ILS:11885822026-01-10T21:52:02Z2026-01-10T21:52:02Zby Brashars, Joshua.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491518">http://www.sciencedirect.com/science/book/9781597491518</a><br/>Format: Electronic Resources<br/>Ninja hacking : unconventional penetration testing tactics and techniquesent://SD_ILS/0/SD_ILS:11818282026-01-10T21:52:02Z2026-01-10T21:52:02Zby Wilhelm, Thomas.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495882">http://www.sciencedirect.com/science/book/9781597495882</a><br/>Format: Electronic Resources<br/>Protecting information on local area networksent://SD_ILS/0/SD_ILS:11758282026-01-10T21:52:02Z2026-01-10T21:52:02Zby Schweitzer, James A., 1929-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780409901382">http://www.sciencedirect.com/science/book/9780409901382</a><br/>Format: Electronic Resources<br/>Buffer overflow attacks : detect, exploit, preventent://SD_ILS/0/SD_ILS:11884072026-01-10T21:52:02Z2026-01-10T21:52:02Zby Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266672">http://www.sciencedirect.com/science/book/9781932266672</a><br/>Format: Electronic Resources<br/>Windows Registry Forensics : Advanced Digital Forensic Analysis of the Windows Registry.ent://SD_ILS/0/SD_ILS:11835262026-01-10T21:52:02Z2026-01-10T21:52:02Zby Carvey, Harlan.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495806">https://www.sciencedirect.com/science/book/9781597495806</a><br/>Format: Electronic Resources<br/>Windows forensic analysis : DVD toolkitent://SD_ILS/0/SD_ILS:11864552026-01-10T21:52:02Z2026-01-10T21:52:02Zby Carvey, Harlan A.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491563">http://www.sciencedirect.com/science/book/9781597491563</a><br/>Format: Electronic Resources<br/>How to cheat at VoIP securityent://SD_ILS/0/SD_ILS:11864632026-01-10T21:52:02Z2026-01-10T21:52:02Zby Porter, Thomas, PhD.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491693">http://www.sciencedirect.com/science/book/9781597491693</a><br/>Format: Electronic Resources<br/>WarDriving & wireless penetration testingent://SD_ILS/0/SD_ILS:11882752026-01-10T21:52:02Z2026-01-10T21:52:02Zby Hurley, Chris.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491112">http://www.sciencedirect.com/science/book/9781597491112</a><br/>Format: Electronic Resources<br/>Web application vulnerabilities : detect, exploit, preventent://SD_ILS/0/SD_ILS:11891052026-01-10T21:52:02Z2026-01-10T21:52:02Zby Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492096">http://www.sciencedirect.com/science/book/9781597492096</a><br/>Format: Electronic Resources<br/>How to cheat at Windows system administration using command line scriptsent://SD_ILS/0/SD_ILS:11864252026-01-10T21:52:02Z2026-01-10T21:52:02Zby Bhardwaj, Pawan K.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491051">http://www.sciencedirect.com/science/book/9781597491051</a><br/>Format: Electronic Resources<br/>WarDriving : drive, detect, defend : a guide to wireless securityent://SD_ILS/0/SD_ILS:11883652026-01-10T21:52:02Z2026-01-10T21:52:02Zby Hurley, Chris.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836036">https://www.sciencedirect.com/science/book/9781931836036</a><br/>Format: Electronic Resources<br/>Cyber warfare : techniques, tactics and tools for security practitionersent://SD_ILS/0/SD_ILS:11838162026-01-10T21:52:02Z2026-01-10T21:52:02Zby Andress, Jason.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496377">http://www.sciencedirect.com/science/book/9781597496377</a><br/>Format: Electronic Resources<br/>Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systemsent://SD_ILS/0/SD_ILS:11840112026-01-10T21:52:02Z2026-01-10T21:52:02Zby Knapp, Eric.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496452">https://www.sciencedirect.com/science/book/9781597496452</a><br/>Format: Electronic Resources<br/>Seven deadliest Microsoft attacksent://SD_ILS/0/SD_ILS:11774792026-01-10T21:52:02Z2026-01-10T21:52:02Zby Kraus, Rob.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495516">https://www.sciencedirect.com/science/book/9781597495516</a><br/>Format: Electronic Resources<br/>Seven deadliest web application attacksent://SD_ILS/0/SD_ILS:11775022026-01-10T21:52:02Z2026-01-10T21:52:02Zby Shema, Mike.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495431">http://www.sciencedirect.com/science/book/9781597495431</a><br/>Format: Electronic Resources<br/>Seven deadliest wireless technologies attacksent://SD_ILS/0/SD_ILS:11780192026-01-10T21:52:02Z2026-01-10T21:52:02Zby Haines, Brad.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495417">https://www.sciencedirect.com/science/book/9781597495417</a><br/>Format: Electronic Resources<br/>Seven deadliest social network attacksent://SD_ILS/0/SD_ILS:11780312026-01-10T21:52:02Z2026-01-10T21:52:02Zby Timm, Carl.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495455">https://www.sciencedirect.com/science/book/9781597495455</a><br/>Format: Electronic Resources<br/>Advances in computers. Volume 79ent://SD_ILS/0/SD_ILS:11756682026-01-10T21:52:02Z2026-01-10T21:52:02Zby Zelkowitz, Marvin V., 1945-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123810274">https://www.sciencedirect.com/science/book/9780123810274</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/bookseries/00652458/79">https://www.sciencedirect.com/science/bookseries/00652458/79</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/issue/25777-2010-999209999-1783761">https://www.sciencedirect.com/science/issue/25777-2010-999209999-1783761</a><br/>Format: Electronic Resources<br/>Virtualization and forensics : a digital forensic investigator's guide to virtual environmentsent://SD_ILS/0/SD_ILS:11784292026-01-10T21:52:02Z2026-01-10T21:52:02Zby Barrett, Diane.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format: Electronic Resources<br/>Kismet hackingent://SD_ILS/0/SD_ILS:11896512026-01-10T21:52:02Z2026-01-10T21:52:02Zby Haines, Brad.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491174">http://www.sciencedirect.com/science/book/9781597491174</a><br/>Format: Electronic Resources<br/>Infosecurity 2008 threat analysisent://SD_ILS/0/SD_ILS:11900002026-01-10T21:52:02Z2026-01-10T21:52:02Zby Clark, Champ, III.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492249">https://www.sciencedirect.com/science/book/9781597492249</a><br/>Format: Electronic Resources<br/>Practical VoIP securityent://SD_ILS/0/SD_ILS:11882632026-01-10T21:52:02Z2026-01-10T21:52:02Zby Porter, Thomas.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490603">https://www.sciencedirect.com/science/book/9781597490603</a><br/>Format: Electronic Resources<br/>Trusted platform module basics : using TPM in embedded systemsent://SD_ILS/0/SD_ILS:11856622026-01-10T21:52:02Z2026-01-10T21:52:02Zby Kinney, Steven.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679602">http://www.sciencedirect.com/science/book/9780750679602</a><br/>Format: Electronic Resources<br/>Aggressive network self-defenseent://SD_ILS/0/SD_ILS:11884902026-01-10T21:52:02Z2026-01-10T21:52:02Zby Wyler, Neil R.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">http://www.sciencedirect.com/science/book/9781931836203</a><br/>Format: Electronic Resources<br/>Software piracy exposedent://SD_ILS/0/SD_ILS:11884172026-01-10T21:52:02Z2026-01-10T21:52:02Zby Craig, Paul.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781932266986">https://www.sciencedirect.com/science/book/9781932266986</a><br/>Format: Electronic Resources<br/>IM, instant messaging, securityent://SD_ILS/0/SD_ILS:11856392026-01-10T21:52:02Z2026-01-10T21:52:02Zby Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583385">http://www.sciencedirect.com/science/book/9781555583385</a><br/>Format: Electronic Resources<br/>CYA : securing Exchange Server 2003 and Outlook Web Access : cover your a** by getting it right the first timeent://SD_ILS/0/SD_ILS:11883722026-01-10T21:52:02Z2026-01-10T21:52:02Zby Walther, Henrik.<br/><a href="http://www.sciencedirect.com/science/book/9781931836258">Available from ScienceDirect. Online version available for university members only. This requires an institutional login off-campus</a>
ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836241">http://www.sciencedirect.com/science/book/9781931836241</a><br/>Format: Electronic Resources<br/>Internet security : a jumpstart for systems administrators and IT managersent://SD_ILS/0/SD_ILS:11880902026-01-10T21:52:02Z2026-01-10T21:52:02Zby Speed, Tim.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582982">http://www.sciencedirect.com/science/book/9781555582982</a><br/>Format: Electronic Resources<br/>Stealing the network : how to own the boxent://SD_ILS/0/SD_ILS:11883912026-01-10T21:52:02Z2026-01-10T21:52:02Zby Russell, Ryan, 1969-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836876">https://www.sciencedirect.com/science/book/9781931836876</a><br/>Format: Electronic Resources<br/>Building DMZs for Enterprise networksent://SD_ILS/0/SD_ILS:11883922026-01-10T21:52:02Z2026-01-10T21:52:02Zby Shimonski, Robert.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836883">http://www.sciencedirect.com/science/book/9781931836883</a><br/>Format: Electronic Resources<br/>Data networks : routing, security, and performance optimizationent://SD_ILS/0/SD_ILS:11880752026-01-10T21:52:02Z2026-01-10T21:52:02Zby Kenyon, Tony, 1960-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582715">http://www.sciencedirect.com/science/book/9781555582715</a><br/>Format: Electronic Resources<br/>Cyber attacks : protecting national infrastructureent://SD_ILS/0/SD_ILS:11818252026-01-10T21:52:02Z2026-01-10T21:52:02Zby Amoroso, Edward G.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123849175">https://www.sciencedirect.com/science/book/9780123849175</a><br/>Format: Electronic Resources<br/>Securing SQL server : protecting your database from attackersent://SD_ILS/0/SD_ILS:11835102026-01-10T21:52:02Z2026-01-10T21:52:02Zby Cherry, Denny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496254">https://www.sciencedirect.com/science/book/9781597496254</a><br/>Format: Electronic Resources<br/>PCI compliance : understand and implement effective PCI data security standard compliance.ent://SD_ILS/0/SD_ILS:11774802026-01-10T21:52:02Z2026-01-10T21:52:02Zby Chuvakin, Anton.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494991">http://www.sciencedirect.com/science/book/9781597494991</a><br/>Format: Electronic Resources<br/>Managed code rootkits : hooking into runtime environmentsent://SD_ILS/0/SD_ILS:11818272026-01-10T21:52:02Z2026-01-10T21:52:02Zby Metula, Erez.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495745">http://www.sciencedirect.com/science/book/9781597495745</a><br/>Format: Electronic Resources<br/>PCI compliance : implementing effective PCI data security standardsent://SD_ILS/0/SD_ILS:11864662026-01-10T21:52:02Z2026-01-10T21:52:02Zby Bradley, Tony, 1969-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491655">http://www.sciencedirect.com/science/book/9781597491655</a><br/>Format: Electronic Resources<br/>Security convergence : managing enterprise security riskent://SD_ILS/0/SD_ILS:11864462026-01-10T21:52:02Z2026-01-10T21:52:02Zby Tyson, Dave.<br/><a href="http://www.sciencedirect.com/science/book/9780750684255">Available from ScienceDirect. Online version available for university members only. This requires an institutional login off-campus</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780750684255">https://www.sciencedirect.com/science/book/9780750684255</a><br/>Format: Electronic Resources<br/>Optimizing and testing WLANs : proven techniques for maximum performanceent://SD_ILS/0/SD_ILS:11880132026-01-10T21:52:02Z2026-01-10T21:52:02Zby Alexander, Tom.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679862">http://www.sciencedirect.com/science/book/9780750679862</a><br/>Format: Electronic Resources<br/>Physical and logical security convergence powered by enterprise security managementent://SD_ILS/0/SD_ILS:11890882026-01-10T21:52:02Z2026-01-10T21:52:02Zby Contos, Brian T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491228">https://www.sciencedirect.com/science/book/9781597491228</a><br/>Format: Electronic Resources<br/>Techno security's guide to e-discovery and digital forensicsent://SD_ILS/0/SD_ILS:11891132026-01-10T21:52:02Z2026-01-10T21:52:02Zby Wiles, Jack.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492232">http://www.sciencedirect.com/science/book/9781597492232</a><br/>Format: Electronic Resources<br/>Securing IM and P2P applications for the enterpriseent://SD_ILS/0/SD_ILS:11842632026-01-10T21:52:02Z2026-01-10T21:52:02Zby Piccard, Paul L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490177">http://www.sciencedirect.com/science/book/9781597490177</a>
ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499965">http://www.sciencedirect.com/science/book/9781597499965</a><br/>Format: Electronic Resources<br/>Securing HP NonStop servers in an open systems world : TCP/IP, OSS & SQLent://SD_ILS/0/SD_ILS:11881182026-01-10T21:52:02Z2026-01-10T21:52:02Zby XYPRO Technology Corporation.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583446">http://www.sciencedirect.com/science/book/9781555583446</a><br/>Format: Electronic Resources<br/>Business continuity and disaster recovery for infosec managersent://SD_ILS/0/SD_ILS:11881172026-01-10T21:52:02Z2026-01-10T21:52:02Zby Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583392">http://www.sciencedirect.com/science/book/9781555583392</a><br/>Format: Electronic Resources<br/>Policy-based network management : solutions for the next generationent://SD_ILS/0/SD_ILS:11881952026-01-10T21:52:02Z2026-01-10T21:52:02Zby Strassner, John.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558608597">http://www.sciencedirect.com/science/book/9781558608597</a><br/>Format: Electronic Resources<br/>CYA : securing IIS 6.0 : cover your a** by getting it right the first timeent://SD_ILS/0/SD_ILS:11883732026-01-10T21:52:02Z2026-01-10T21:52:02Zby Cheah, Chun Hai.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836258">http://www.sciencedirect.com/science/book/9781931836258</a><br/>Format: Electronic Resources<br/>Configuring Symantec Antivirus, Corporate Editionent://SD_ILS/0/SD_ILS:11883892026-01-10T21:52:02Z2026-01-10T21:52:02Zby Hunter, Laura E.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836814">http://www.sciencedirect.com/science/book/9781931836814</a><br/>Format: Electronic Resources<br/>Hack proofing your e-commerce site : the only way to stop a hacker is to think like one].ent://SD_ILS/0/SD_ILS:11883422026-01-10T21:52:02Z2026-01-10T21:52:02Zby Russell, Ryan.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994275">http://www.sciencedirect.com/science/book/9781928994275</a><br/>Format: Electronic Resources<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:11839662026-01-10T21:52:02Z2026-01-10T21:52:02Zby Faircloth, Jeremy.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496278">http://www.sciencedirect.com/science/book/9781597496278</a><br/>Format: Electronic Resources<br/>Dissecting the hack : the forb1dd3n networkent://SD_ILS/0/SD_ILS:11813792026-01-10T21:52:02Z2026-01-10T21:52:02Zby Street, Jayson E.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495684">https://www.sciencedirect.com/science/book/9781597495684</a><br/>Format: Electronic Resources<br/>A guide to kernel exploitation : attacking the coreent://SD_ILS/0/SD_ILS:11817702026-01-10T21:52:02Z2026-01-10T21:52:02Zby Perla, Enrico.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494861">https://www.sciencedirect.com/science/book/9781597494861</a><br/>Format: Electronic Resources<br/>Google hacking for penetration testers. Volume 2ent://SD_ILS/0/SD_ILS:11891022026-01-10T21:52:02Z2026-01-10T21:52:02Zby Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491761">https://www.sciencedirect.com/science/book/9781597491761</a><br/>Format: Electronic Resources<br/>Practical embedded security : building secure resource-constrained systemsent://SD_ILS/0/SD_ILS:11891682026-01-10T21:52:02Z2026-01-10T21:52:02Zby Stapko, Timothy John.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780750682152">https://www.sciencedirect.com/science/book/9780750682152</a><br/>Format: Electronic Resources<br/>Securing Citrix XenApp Server in the enterpriseent://SD_ILS/0/SD_ILS:11896372026-01-10T21:52:02Z2026-01-10T21:52:02Zby Bin Azad, Tariq.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492812">http://www.sciencedirect.com/science/book/9781597492812</a><br/>Format: Electronic Resources<br/>Reverse engineering code with IDA Proent://SD_ILS/0/SD_ILS:11896692026-01-10T21:52:02Z2026-01-10T21:52:02Zby Ferguson, Justin.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492379">http://www.sciencedirect.com/science/book/9781597492379</a><br/>Format: Electronic Resources<br/>Stealing the network : how to own a shadow: the chase for Knuthent://SD_ILS/0/SD_ILS:11882682026-01-10T21:52:02Z2026-01-10T21:52:02Zby Long, Johnny.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490818">http://www.sciencedirect.com/science/book/9781597490818</a><br/>Format: Electronic Resources<br/>Stealing the network : how to own an identityent://SD_ILS/0/SD_ILS:11882432026-01-10T21:52:02Z2026-01-10T21:52:02Zby Alder, Raven.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490061">https://www.sciencedirect.com/science/book/9781597490061</a><br/>Format: Electronic Resources<br/>Windows Server 2003 security infrastructuresent://SD_ILS/0/SD_ILS:11880842026-01-10T21:52:02Z2026-01-10T21:52:02Zby Clercq, Jan de, 1968-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582838">http://www.sciencedirect.com/science/book/9781555582838</a><br/>Format: Electronic Resources<br/>Nmap in the enterprise : your guide to network scanningent://SD_ILS/0/SD_ILS:11891212026-01-10T21:52:02Z2026-01-10T21:52:02Zby Orebaugh, Angela.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492416">http://www.sciencedirect.com/science/book/9781597492416</a><br/>Format: Electronic Resources<br/>No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfingent://SD_ILS/0/SD_ILS:11896352026-01-10T21:52:02Z2026-01-10T21:52:02Zby Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492157">https://www.sciencedirect.com/science/book/9781597492157</a><br/>Format: Electronic Resources<br/>Netcat power toolsent://SD_ILS/0/SD_ILS:11897042026-01-10T21:52:02Z2026-01-10T21:52:02Zby Kanclirz, Jan.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492577">https://www.sciencedirect.com/science/book/9781597492577</a><br/>Format: Electronic Resources<br/>The history of information security : a comprehensive handbookent://SD_ILS/0/SD_ILS:11865232026-01-10T21:52:02Z2026-01-10T21:52:02Zby Leeuw, Karl de.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444516084">http://www.sciencedirect.com/science/book/9780444516084</a><br/>Format: Electronic Resources<br/>HP Nonstop server security : a practical handbookent://SD_ILS/0/SD_ILS:11881012026-01-10T21:52:02Z2026-01-10T21:52:02Zby Hill, Terri.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583149">http://www.sciencedirect.com/science/book/9781555583149</a><br/>Format: Electronic Resources<br/>Hacking the code : ASP.NET web application securityent://SD_ILS/0/SD_ILS:11884062026-01-10T21:52:02Z2026-01-10T21:52:02Zby Burnett, Mark (Mark M.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266658">http://www.sciencedirect.com/science/book/9781932266658</a><br/>Format: Electronic Resources<br/>SSCP : study guide & DVD training systement://SD_ILS/0/SD_ILS:11883882026-01-10T21:52:02Z2026-01-10T21:52:02Zby Jacobs, Josh.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836807">http://www.sciencedirect.com/science/book/9781931836807</a><br/>Format: Electronic Resources<br/>Winternals defragmentation, recovery, and administration field guideent://SD_ILS/0/SD_ILS:11882672026-01-10T21:52:02Z2026-01-10T21:52:02Zby Kleiman, Dave.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490795">https://www.sciencedirect.com/science/book/9781597490795</a><br/>Format: Electronic Resources<br/>Computers and the general practitionerent://SD_ILS/0/SD_ILS:11775542026-01-10T21:52:02Z2026-01-10T21:52:02Zby Malcolm, Alastair.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780080268651">http://www.sciencedirect.com/science/book/9780080268651</a><br/>Format: Electronic Resources<br/>Digital video surveillance and securityent://SD_ILS/0/SD_ILS:11775002026-01-10T21:52:02Z2026-01-10T21:52:02Zby Caputo, Anthony C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781856177474">http://www.sciencedirect.com/science/book/9781856177474</a><br/>Format: Electronic Resources<br/>Wi-Fi telephony : challenges and solutions for voice over WLANsent://SD_ILS/0/SD_ILS:11880122026-01-10T21:52:02Z2026-01-10T21:52:02Zby Chandra, Praphul.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679718">http://www.sciencedirect.com/science/book/9780750679718</a><br/>Format: Electronic Resources<br/>Highly dependable softwareent://SD_ILS/0/SD_ILS:11867212026-01-10T21:52:02Z2026-01-10T21:52:02Zby Zelkowitz, Marvin V., 1945-<br/><a href="http://www.sciencedirect.com/science/bookseries/00652458/58">to access electronic resource</a>
ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780120121588">http://www.sciencedirect.com/science/book/9780120121588</a><br/>Format: Electronic Resources<br/>Understanding motion capture for computer animationent://SD_ILS/0/SD_ILS:11832752026-01-10T21:52:02Z2026-01-10T21:52:02Zby Menache, Alberto, 1961-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123814968">https://www.sciencedirect.com/science/book/9780123814968</a><br/>Format: Electronic Resources<br/>Architecture of network systemsent://SD_ILS/0/SD_ILS:11836812026-01-10T21:52:02Z2026-01-10T21:52:02Zby Serpanos, Dimitrios Nikolaou.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123744944">https://www.sciencedirect.com/science/book/9780123744944</a><br/>Format: Electronic Resources<br/>21st European symposium on computer aided process engineeringent://SD_ILS/0/SD_ILS:11839472026-01-10T21:52:02Z2026-01-10T21:52:02Zby European Symposium on Computer Aided Process Engineering (21st : 2011 : Chalkidiki, Greece)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444538956">http://www.sciencedirect.com/science/book/9780444538956</a><br/>Format: Electronic Resources<br/>Principles of computer system design : an introductionent://SD_ILS/0/SD_ILS:11928182026-01-10T21:52:02Z2026-01-10T21:52:02Zby Saltzer, J. H., 1939-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123749574">https://www.sciencedirect.com/science/book/9780123749574</a><br/>Format: Electronic Resources<br/>Advances in computers. Vol. 74, Software development.ent://SD_ILS/0/SD_ILS:11894542026-01-10T21:52:02Z2026-01-10T21:52:02Zby Zelkowitz, Marvin V., 1945-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123744265">https://www.sciencedirect.com/science/book/9780123744265</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/bookseries/00652458/74">https://www.sciencedirect.com/science/bookseries/00652458/74</a><br/>Format: Electronic Resources<br/>Cyber crime investigations : bridging the gaps between security professionals, law enforcement, and prosecutorsent://SD_ILS/0/SD_ILS:11864452026-01-10T21:52:02Z2026-01-10T21:52:02Zby Reyes, Anthony.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491334">https://www.sciencedirect.com/science/book/9781597491334</a><br/>Format: Electronic Resources<br/>The best damn cybercrime and digital forensics book periodent://SD_ILS/0/SD_ILS:11891172026-01-10T21:52:02Z2026-01-10T21:52:02Zby Cardwell, Kevin.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492287">http://www.sciencedirect.com/science/book/9781597492287</a><br/>Format: Electronic Resources<br/>Vesuvius : education, security and prosperity = Educazione, sicurezza e prosperitàent://SD_ILS/0/SD_ILS:11875382026-01-10T21:52:02Z2026-01-10T21:52:02Zby Dobran, F.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780444521040">https://www.sciencedirect.com/science/book/9780444521040</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/bookseries/1871644X/8">https://www.sciencedirect.com/science/bookseries/1871644X/8</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/publication?issn=1871644X&volume=8">https://www.sciencedirect.com/science/publication?issn=1871644X&volume=8</a><br/>Format: Electronic Resources<br/>BigNum math : implementing cryptographic multiple precision arithmeticent://SD_ILS/0/SD_ILS:11882762026-01-10T21:52:02Z2026-01-10T21:52:02Zby St. Denis, Tom.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491129">https://www.sciencedirect.com/science/book/9781597491129</a><br/>Format: Electronic Resources<br/>Perfect passwords : selection, protection, authenticationent://SD_ILS/0/SD_ILS:11882562026-01-10T21:52:02Z2026-01-10T21:52:02Zby Burnett, Mark.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490412">https://www.sciencedirect.com/science/book/9781597490412</a><br/>Format: Electronic Resources<br/>Network algorithmics : an interdisciplinary approach to designing fast networked devicesent://SD_ILS/0/SD_ILS:11867852026-01-10T21:52:02Z2026-01-10T21:52:02Zby Varghese, George, 1960-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780120884773">https://www.sciencedirect.com/science/book/9780120884773</a><br/>Format: Electronic Resources<br/>Google hacking for penetration testersent://SD_ILS/0/SD_ILS:11883752026-01-10T21:52:02Z2026-01-10T21:52:02Zby Long, Johnny.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836364">http://www.sciencedirect.com/science/book/9781931836364</a><br/>Format: Electronic Resources<br/>Architectural issuesent://SD_ILS/0/SD_ILS:11867222026-01-10T21:52:02Z2026-01-10T21:52:02Zby Zelkowitz, Marvin V., 1945-<br/><a href="http://www.sciencedirect.com/science/bookseries/00652458/61">to access electronic resource</a>
ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780120121618">http://www.sciencedirect.com/science/book/9780120121618</a><br/>Format: Electronic Resources<br/>Best damn Windows server 2003 book periodent://SD_ILS/0/SD_ILS:11883702026-01-10T21:52:02Z2026-01-10T21:52:02Zby Snedaker, Susan.<br/>MacEwan University Access <a href="http://www.sciencedirect.com/science/book/9781931836128">(Unlimited Concurrent Users)</a> from ScienceDirect
ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836128">https://www.sciencedirect.com/science/book/9781931836128</a><br/>Format: Electronic Resources<br/>Deploying Citrix MetaFrame presentation server 3.0 with Windows server 2003 terminal servicesent://SD_ILS/0/SD_ILS:11884012026-01-10T21:52:02Z2026-01-10T21:52:02Zby Wilson, Concepción S. (Concepción Shimizu), 1940-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266504">http://www.sciencedirect.com/science/book/9781932266504</a><br/>Format: Electronic Resources<br/>Information securityent://SD_ILS/0/SD_ILS:11853992026-01-10T21:52:02Z2026-01-10T21:52:02Zby Zelkowitz, Marvin V., 1945-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780120121601">https://www.sciencedirect.com/science/book/9780120121601</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/bookseries/00652458/60">https://www.sciencedirect.com/science/bookseries/00652458/60</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/publication?issn=00652458&volume=60">https://www.sciencedirect.com/science/publication?issn=00652458&volume=60</a><br/>Format: Electronic Resources<br/>Microsoft Outlook programming : jumpstart for administrators, power users, and developersent://SD_ILS/0/SD_ILS:11880852026-01-10T21:52:02Z2026-01-10T21:52:02Zby Mosher, Sue, 1953-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582869">http://www.sciencedirect.com/science/book/9781555582869</a><br/>Format: Electronic Resources<br/>Socially responsible IT managementent://SD_ILS/0/SD_ILS:11884682026-01-10T21:52:02Z2026-01-10T21:52:02Zby Erbschloe, Michael, 1951-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582906">http://www.sciencedirect.com/science/book/9781555582906</a><br/>Format: Electronic Resources<br/>Networking explainedent://SD_ILS/0/SD_ILS:11880672026-01-10T21:52:02Z2026-01-10T21:52:02Zby Gallo, Michael A.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582524">http://www.sciencedirect.com/science/book/9781555582524</a><br/>Format: Electronic Resources<br/>Securing the smart grid : next generation power grid securityent://SD_ILS/0/SD_ILS:11818322026-01-10T21:52:02Z2026-01-10T21:52:02Zby Flick, Tony.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495707">https://www.sciencedirect.com/science/book/9781597495707</a><br/>Format: Electronic Resources<br/>CD and DVD forensicsent://SD_ILS/0/SD_ILS:11864322026-01-10T21:52:02Z2026-01-10T21:52:02Zby Crowley, Paul.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491280">https://www.sciencedirect.com/science/book/9781597491280</a><br/>Format: Electronic Resources<br/>Face processing : advanced modeling and methodsent://SD_ILS/0/SD_ILS:11867812026-01-10T21:52:02Z2026-01-10T21:52:02Zby Zhao, Wenyi.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780120884520">http://www.sciencedirect.com/science/book/9780120884520</a><br/>Format: Electronic Resources<br/>High-technology crime investigator's handbook : establishing and managing a high-technology crime prevention programent://SD_ILS/0/SD_ILS:11880032026-01-10T21:52:02Z2026-01-10T21:52:02Zby Kovacich, Gerald L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679299">http://www.sciencedirect.com/science/book/9780750679299</a><br/>Format: Electronic Resources<br/>Virtual machines : versatile platforms for systems and processesent://SD_ILS/0/SD_ILS:11852812026-01-10T21:52:02Z2026-01-10T21:52:02Zby Smith, James E. (James Edward), 1950-<br/>MacEwan University Access <a href="http://www.sciencedirect.com/science/book/9781558609105">(Unlimited Concurrent Users)</a> from ScienceDirect
ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781558609105">https://www.sciencedirect.com/science/book/9781558609105</a><br/>Format: Electronic Resources<br/>Computing perspectivesent://SD_ILS/0/SD_ILS:11782082026-01-10T21:52:02Z2026-01-10T21:52:02Zby Wilkes, M. V. (Maurice Vincent)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780080502687">http://www.sciencedirect.com/science/book/9780080502687</a><br/>Format: Electronic Resources<br/>Information technology serving societyent://SD_ILS/0/SD_ILS:11772592026-01-10T21:52:02Z2026-01-10T21:52:02Zby Chartrand, Robert Lee, 1928-2010.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780080219790">https://www.sciencedirect.com/science/book/9780080219790</a><br/>Format: Electronic Resources<br/>Advances in computers. Volume 12ent://SD_ILS/0/SD_ILS:11897562026-01-10T21:52:02Z2026-01-10T21:52:02Zby Rubinoff, Morris.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780120121120">https://www.sciencedirect.com/science/book/9780120121120</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/bookseries/00652458/12">https://www.sciencedirect.com/science/bookseries/00652458/12</a>
ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780120121120">http://www.sciencedirect.com/science/book/9780120121120</a>
ScienceDirect <a href="http://www.sciencedirect.com/science/bookseries/00652458/12">http://www.sciencedirect.com/science/bookseries/00652458/12</a><br/>Format: Electronic Resources<br/>Encyclopedia of information systemsent://SD_ILS/0/SD_ILS:11888882026-01-10T21:52:02Z2026-01-10T21:52:02Zby Bidgoli, Hossein.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/referenceworks/9780122272400">http://www.sciencedirect.com/science/referenceworks/9780122272400</a><br/>Format: Electronic Resources<br/>