Search Results for Computer security. - Narrowed by: 2004 SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092004$0025092004$0026ps$003d300?dt=list 2025-12-30T19:38:13Z Computer security : art and science ent://SD_ILS/0/SD_ILS:64506 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Bishop, Matt (Matthew A.)<br/>Format:&#160;Books<br/> Defense and detection strategies against Internet worms ent://SD_ILS/0/SD_ILS:931019 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Nazario, Jose.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227660">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Privacy protection and computer forensics ent://SD_ILS/0/SD_ILS:931051 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Caloyannides, Michael A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227692">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Bluetooth security ent://SD_ILS/0/SD_ILS:931009 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Gehrmann, Christian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227650">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Outsourcing information security ent://SD_ILS/0/SD_ILS:931018 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Axelrod, C. Warren.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227659">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber adversary characterization auditing the hacker mind ent://SD_ILS/0/SD_ILS:939469 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Parker, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294071">Click to View</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at Configuring ISA Server 2004 ent://SD_ILS/0/SD_ILS:933877 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Shinder, Dr. Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254853">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking the code ASP. NET web application security ent://SD_ILS/0/SD_ILS:939506 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Burnett, Mark (Mark M.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294160">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security sage's guide to hardening the network infrastructure ent://SD_ILS/0/SD_ILS:939571 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Andr&eacute;s, Steven.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294359">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network security foundations ent://SD_ILS/0/SD_ILS:935040 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Strebe, Matthew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=267332">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Innocent code a security wake-up call for Web programmers ent://SD_ILS/0/SD_ILS:929474 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Huseby, Sverre H.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=210558">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Stealing the network how to own a continent ent://SD_ILS/0/SD_ILS:939580 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Rogers, Russ.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294377">Click to View</a><br/>Format:&#160;Electronic Resources<br/> MCSE designing security for a Windows Server 2003 network : exam 70-298 study guide &amp; DVD training system ent://SD_ILS/0/SD_ILS:939533 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Khnaser, Elias N.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294253">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Wireless operational security ent://SD_ILS/0/SD_ILS:1188104 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583170">http://www.sciencedirect.com/science/book/9781555583170</a> ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583170">https://www.sciencedirect.com/science/book/9781555583170</a><br/>Format:&#160;Electronic Resources<br/> Implementing homeland security for enterprise IT ent://SD_ILS/0/SD_ILS:1188099 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Erbschloe, Michael.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">http://www.sciencedirect.com/science/book/9781555583125</a><br/>Format:&#160;Electronic Resources<br/> Cyber adversary characterization : auditing the hacker mind ent://SD_ILS/0/SD_ILS:1188369 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Parker, Tom.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836111">http://www.sciencedirect.com/science/book/9781931836111</a><br/>Format:&#160;Electronic Resources<br/> Stealing the network : how to own a continent ent://SD_ILS/0/SD_ILS:1188367 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;131ah.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836050">http://www.sciencedirect.com/science/book/9781931836050</a><br/>Format:&#160;Electronic Resources<br/> Zero day exploit : countdown to darkness ent://SD_ILS/0/SD_ILS:1188489 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Shein, Rob.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836098">http://www.sciencedirect.com/science/book/9781931836098</a><br/>Format:&#160;Electronic Resources<br/> Ethereal packet sniffing ent://SD_ILS/0/SD_ILS:939485 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Orebaugh, Angela.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294122">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Snort 2.1 intrusion detection ent://SD_ILS/0/SD_ILS:1188366 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Beale, Jay.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836043">https://www.sciencedirect.com/science/book/9781931836043</a><br/>Format:&#160;Electronic Resources<br/> &#304;nternette g&uuml;venlik ve Hacker Cracker meselesi : el kitab&#305; ent://SD_ILS/0/SD_ILS:70005 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;G&uuml;ven, Mehmet<br/>Format:&#160;Books<br/> Click, click, who's there? a family-based non-technical approach to help parents protect their children online ent://SD_ILS/0/SD_ILS:945275 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Koh.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338852">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Windows g&uuml;venli&#287;i windows XP ve windows 2000 i&ccedil;in ent://SD_ILS/0/SD_ILS:1165655 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Bott, Ed.<br/>Format:&#160;Books<br/> Implementing PKI Services on z/OS ent://SD_ILS/0/SD_ILS:1075572 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306877">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Programmer's ultimate security deskref ent://SD_ILS/0/SD_ILS:1188409 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Foster, James C.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781932266726">https://www.sciencedirect.com/science/book/9781932266726</a><br/>Format:&#160;Electronic Resources<br/> Check Point Next Generation with application intelligence security administration ent://SD_ILS/0/SD_ILS:1188414 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Tobkin, Chris.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781932266894">https://www.sciencedirect.com/science/book/9781932266894</a><br/>Format:&#160;Electronic Resources<br/> Sockets, shellcode, porting &amp; coding : reverse engineering exploits and tool coding for security professionals ent://SD_ILS/0/SD_ILS:1188242 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490054">http://www.sciencedirect.com/science/book/9781597490054</a><br/>Format:&#160;Electronic Resources<br/> A practical guide to managing information security ent://SD_ILS/0/SD_ILS:931291 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Purser, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=231645">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security assessment : case studies for implementing the NSA IAM ent://SD_ILS/0/SD_ILS:1188416 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Rogers, Russ.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266962">http://www.sciencedirect.com/science/book/9781932266962</a><br/>Format:&#160;Electronic Resources<br/> WarDriving drive, detect, defend: a guide to wireless security ent://SD_ILS/0/SD_ILS:939600 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Hurley, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294441">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Programmer's ultimate security deskref ent://SD_ILS/0/SD_ILS:939559 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Foster, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294328">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Internet applications the emerging global computer. ent://SD_ILS/0/SD_ILS:1092046 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411450">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Implementing SSH strategies for optimizing the Secure Shell ent://SD_ILS/0/SD_ILS:929721 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Dwivedi, Himanshu.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=215119">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security sage's guide to hardening the network infrastructure ent://SD_ILS/0/SD_ILS:1188364 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Andr&eacute;s, Steven.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836012">https://www.sciencedirect.com/science/book/9781931836012</a><br/>Format:&#160;Electronic Resources<br/> Ethereal : packet sniffing ent://SD_ILS/0/SD_ILS:1188411 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Orebaugh, Angela.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266825">http://www.sciencedirect.com/science/book/9781932266825</a><br/>Format:&#160;Electronic Resources<br/> Managing and securing a Cisco structured wireless-aware network ent://SD_ILS/0/SD_ILS:1188415 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Wall, David.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781932266917">https://www.sciencedirect.com/science/book/9781932266917</a><br/>Format:&#160;Electronic Resources<br/> Nessus network auditing ent://SD_ILS/0/SD_ILS:939540 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Beale, Jay.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294281">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Virtual private networking a construction, operation and utilization guide ent://SD_ILS/0/SD_ILS:958798 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Held, Gilbert, 1943-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=470565">Click to View</a><br/>Format:&#160;Electronic Resources<br/> zSeries Trusted Key Entry (TKE) version 4.2 update ent://SD_ILS/0/SD_ILS:1075371 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Kappeler, Patrick.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306676">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IBM eserver zSeries 990 (z990) cryptography implementation ent://SD_ILS/0/SD_ILS:1075486 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306791">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Linux on IBM e-server zSeries and S/390 best security practices ent://SD_ILS/0/SD_ILS:1075530 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Geiselhart, Gregory.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306835">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Lotus security handbook ent://SD_ILS/0/SD_ILS:1075533 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Tworek, William.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306838">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network and security issues for internet mobile entertainment ent://SD_ILS/0/SD_ILS:938596 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=289848">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Dijital kale ent://SD_ILS/0/SD_ILS:57096 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Brown, Dan<br/>Format:&#160;Books<br/> Digital fortress ent://SD_ILS/0/SD_ILS:82561 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Brown, Dan<br/>Format:&#160;Books<br/> Digital fortress ent://SD_ILS/0/SD_ILS:1159821 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Brown, Dan.<br/>Format:&#160;Books<br/> Degunking your email, snam, and viruses ent://SD_ILS/0/SD_ILS:1087431 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Duntemann, Jeff.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3384731">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Integrated identity management using IBM Tivoli security solutions ent://SD_ILS/0/SD_ILS:1075052 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;B&uuml;cker, Axel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306357">Click to View</a><br/>Format:&#160;Electronic Resources<br/> iSeries Access for Windows V5R2 hot topics tailored images, application administration, SSL, and Kerberos ent://SD_ILS/0/SD_ILS:1075394 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Schulz, Jeremy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306699">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Intelligent watermarking techniques ent://SD_ILS/0/SD_ILS:931269 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Pan, Jeng-Shyang.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=231561">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Control and security of E-commerce ent://SD_ILS/0/SD_ILS:958677 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Smith, Gordon E. (Gordon Edward)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=469918">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The disaster recovery handbook a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets ent://SD_ILS/0/SD_ILS:1054619 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Wallace, Michael, 1960-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3001767">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Protecting your library's digital sources the essential guide to planning and preservation ent://SD_ILS/0/SD_ILS:930096 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Kahn, Miriam (Miriam B.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=218937">Click to View</a><br/>Format:&#160;Electronic Resources<br/> WarDriving : drive, detect, defend : a guide to wireless security ent://SD_ILS/0/SD_ILS:1188365 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Hurley, Chris.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836036">https://www.sciencedirect.com/science/book/9781931836036</a><br/>Format:&#160;Electronic Resources<br/> CYA : securing Exchange Server 2003 and Outlook Web Access : cover your a** by getting it right the first time ent://SD_ILS/0/SD_ILS:1188372 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Walther, Henrik.<br/><a href="http://www.sciencedirect.com/science/book/9781931836258">Available from ScienceDirect. Online version available for university members only. This requires an institutional login off-campus</a> ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836241">http://www.sciencedirect.com/science/book/9781931836241</a><br/>Format:&#160;Electronic Resources<br/> Policy-based network management : solutions for the next generation ent://SD_ILS/0/SD_ILS:1188195 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Strassner, John.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558608597">http://www.sciencedirect.com/science/book/9781558608597</a><br/>Format:&#160;Electronic Resources<br/> CYA : securing IIS 6.0 : cover your a** by getting it right the first time ent://SD_ILS/0/SD_ILS:1188373 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Cheah, Chun Hai.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836258">http://www.sciencedirect.com/science/book/9781931836258</a><br/>Format:&#160;Electronic Resources<br/> Windows Server 2003 security infrastructures ent://SD_ILS/0/SD_ILS:1188084 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Clercq, Jan de, 1968-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582838">http://www.sciencedirect.com/science/book/9781555582838</a><br/>Format:&#160;Electronic Resources<br/> HP Nonstop server security : a practical handbook ent://SD_ILS/0/SD_ILS:1188101 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Hill, Terri.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583149">http://www.sciencedirect.com/science/book/9781555583149</a><br/>Format:&#160;Electronic Resources<br/> Hacking the code : ASP.NET web application security ent://SD_ILS/0/SD_ILS:1188406 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Burnett, Mark (Mark M.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266658">http://www.sciencedirect.com/science/book/9781932266658</a><br/>Format:&#160;Electronic Resources<br/> Information security ent://SD_ILS/0/SD_ILS:1185399 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Zelkowitz, Marvin V., 1945-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780120121601">https://www.sciencedirect.com/science/book/9780120121601</a> ScienceDirect <a href="https://www.sciencedirect.com/science/bookseries/00652458/60">https://www.sciencedirect.com/science/bookseries/00652458/60</a> ScienceDirect <a href="https://www.sciencedirect.com/science/publication?issn=00652458&volume=60">https://www.sciencedirect.com/science/publication?issn=00652458&volume=60</a><br/>Format:&#160;Electronic Resources<br/> Architectural issues ent://SD_ILS/0/SD_ILS:1186722 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Zelkowitz, Marvin V., 1945-<br/><a href="http://www.sciencedirect.com/science/bookseries/00652458/61">to access electronic resource</a> ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780120121618">http://www.sciencedirect.com/science/book/9780120121618</a><br/>Format:&#160;Electronic Resources<br/> Best damn Windows server 2003 book period ent://SD_ILS/0/SD_ILS:1188370 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Snedaker, Susan.<br/>MacEwan University Access <a href="http://www.sciencedirect.com/science/book/9781931836128">(Unlimited Concurrent Users)</a> from ScienceDirect ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836128">https://www.sciencedirect.com/science/book/9781931836128</a><br/>Format:&#160;Electronic Resources<br/> Deploying Citrix MetaFrame presentation server 3.0 with Windows server 2003 terminal services ent://SD_ILS/0/SD_ILS:1188401 2025-12-30T19:38:13Z 2025-12-30T19:38:13Z by&#160;Wilson, Concepci&oacute;n S. (Concepci&oacute;n Shimizu), 1940-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266504">http://www.sciencedirect.com/science/book/9781932266504</a><br/>Format:&#160;Electronic Resources<br/>