Search ResultsElektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Yazar
Materyal Türü
Konu
Kütüphane
70 sonuç bulundu Arama sonuçlarına abone ol
0000000000000000000000000000000000000000000000000000000000000000000000DEFAULTTR
Yazdır
Liste seç
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
    Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
      by 
      Laurent, Maryline, editor.
      Format: 
      Alıntı: 
      Digital identity management / Laurent, Maryline, editor.
      by 
      Tiller, James S.
      Format: 
      Alıntı: 
      Adaptive security management architecture Tiller, James S.
      by 
      Snedaker, Susan.
      Format: 
      Alıntı: 
      Syngress IT security project management handbook / Snedaker, Susan.
      by 
      Bertino, Elisa.
      Format: 
      Alıntı: 
      Identity management concepts, technologies, and systems / Bertino, Elisa.
      by 
      Strassner, John.
      Format: 
      Alıntı: 
      Policy-based network management : solutions for the next generation / Strassner, John.
      by 
      Babbin, Jacob.
      Format: 
      Alıntı: 
      Security log management identifying patterns in the chaos / Babbin, Jacob.
      by 
      Field, Alan, author.
      Format: 
      Alıntı: 
      ISO 37001 : an introduction to anti-bribery management systems : doing the right things / Field
      by 
      Wheeler, Evan.
      Format: 
      Alıntı: 
      Security risk management building an information security risk management program from the ground
      by 
      Contos, Brian T.
      Format: 
      Alıntı: 
      Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management
      by 
      Kumar, Atul.
      Format: 
      Alıntı: 
      Management: installation, configuration, and day-to-day tasks / Kumar, Atul.
      by 
      Ganci, John.
      Format: 
      Alıntı: 
      Identity and access management solutions using WebSphere Portal V5.1, Tivoli Identity Manager V4.5
      by 
      Babbin, Jacob.
      Format: 
      Alıntı: 
      Security log management : identifying patterns in the chaos / Babbin, Jacob.
      by 
      Contos, Brian T.
      Format: 
      Alıntı: 
      Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management
      by 
      Ginodman, Veniamin, editor.
      Format: 
      Alıntı: 
      Information Management & Computer Security,
      by 
      Kane, Greg.
      Format: 
      Alıntı: 
      Security Executive Council risk management portfolio
      by 
      Guerrier, Claudine, author.
      Format: 
      Alıntı: 
      Innovation, Entrepreneurship, Management Series : Innovation and Technology Set
      by 
      Moschovitis, Christos J. P., author.
      Format: 
      Alıntı: 
      Information technology -- Management.
      by 
      Hellmann, Roland, author.
      Format: 
      Alıntı: 
      Information technology -- Management.
      by 
      Hsu, Tony, author.
      Format: 
      Alıntı: 
      Information technology -- Management.
      by 
      Vacca, John R.
      Format: 
      Alıntı: 
      Computer security -- Management.
      by 
      Danielyan, Edgar.
      Format: 
      Alıntı: 
      Computer networks -- Management.
      by 
      Collins, Jon, author.
      Format: 
      Alıntı: 
      Computer security -- Management.
      by 
      Osborne, Mark.
      Format: 
      Alıntı: 
      Computer security -- Management.
      by 
      DeLuccia, James J., 1977-
      Format: 
      Alıntı: 
      Information technology -- Management.
      by 
      Allen, Lee, 1946- author.
      Format: 
      Alıntı: 
      Computer security -- Management.
      by 
      Andress, Jason, author.
      Format: 
      Alıntı: 
      Information resources management.
      by 
      Edwards, Matthew, editor of compilation.
      Format: 
      Alıntı: 
      Emergency management.
      by 
      Snedaker, Susan.
      Format: 
      Alıntı: 
      Management information systems -- Security measures.
      by 
      Rittinghouse, John W.
      Format: 
      Alıntı: 
      Information resources management.
      by 
      Knipp, Eric.
      Format: 
      Alıntı: 
      Computer networks -- Management.
      by 
      Harley, David.
      Format: 
      Alıntı: 
      Computer security -- Management.
      by 
      Canavan, Tom.
      Format: 
      Alıntı: 
      Provides information on maintaining security for websites built on open source Content Management
      by 
      Bendell, Dan.
      Format: 
      Alıntı: 
      SonicWALL -- Enterprise SonicWALL management.
      by 
      Beyah, Raheem (Raheem A.), 1976-
      Format: 
      Alıntı: 
      management and configuration.
      by 
      Dwivedi, Himanshu.
      Format: 
      Alıntı: 
      . 4. Authentication ; ch. 5. SSH Management -- pt. 2. Remote Access Solutions. ch. 6. SSH port
      by 
      Burton, James.
      Format: 
      Alıntı: 
      device management; IDS Anti-Evasion Techniques.
      by 
      Williams, Branden R.
      Format: 
      Alıntı: 
      -- Vulnerability management -- Logging events and monitoring the cardholder data environment -- PCI for the small
      by 
      Wotring, Brian.
      Format: 
      Alıntı: 
      This book is about one of the most crucial aspects of system and security management: host
      by 
      Rash, Michael.
      Format: 
      Alıntı: 
      are going to be approaching management for funding in the next year or two to procure intrusion
      by 
      Rittinghouse, John W.
      Format: 
      Alıntı: 
      management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very
      by 
      Andrés, Steven.
      Format: 
      Alıntı: 
      Protocols; Secure Network Management; Network Switching; Defending Routers and Switches; Implementing
      by 
      Speed, Tyler Justin.
      Format: 
      Alıntı: 
      reviews key topics surrounding computer security--including privacy, access controls, and risk management
      by 
      Amini, Rob.
      Format: 
      Alıntı: 
      public key infrastructure -- Securing the network management process -- Securing network services and
      by 
      Behrens, Thorsten.
      Format: 
      Alıntı: 
      , Intrusion Detection, and Attack Management; Services; Configuring Authentication, Authorization and
      by 
      Stephens, Robert.
      Format: 
      Alıntı: 
      : SecurePlatform 11: Management High Availability & Failover 12: Integration and configuration of CVP / UFP 13
      by 
      Behrens, Thorsten.
      Format: 
      Alıntı: 
      , Intrusion Detection, and Attack Management; Services; Configuring Authentication, Authorization and
      by 
      Wall, David.
      Format: 
      Alıntı: 
      responsible for the design, deployment and/or management of a Cisco Structured Wireless-Aware Network. It
      by 
      Rittinghouse, John W.
      Format: 
      Alıntı: 
      operational security, asset protection, integrity management, availability methodology, incident response and
      by 
      Kenyon, Tony, 1960-
      Format: 
      Alıntı: 
      challenging problems in network design and management. He provides clear, specific solutions for day
      by 
      Chuvakin, Anton.
      Format: 
      Alıntı: 
      -- Chapter 7: Using Wireless Networking -- Chapter 8: Vulnerability Management -- Chapter 9: Logging Events
      by 
      Wilhelm, Thomas.
      Format: 
      Alıntı: 
      Master project management skills necessary for running a formal penetration test and setting up a
      by 
      Wayner, Peter, 1964-
      Format: 
      Alıntı: 
      also central to digital rights management (DRM), a group of techniques for technologically controlling
      by 
      Qian, Yi, 1962-
      Format: 
      Alıntı: 
      itemizing failsafe design features such as alarms, restoration protocols, and management configurations to
      by 
      Varsalone, Jesse.
      Format: 
      Alıntı: 
      your Data -- Part IV: Forefront Server Security Management Console -- Chapter 10: Introduction to the
      by 
      Bradley, Tony, 1969-
      Format: 
      Alıntı: 
      . Vulnerability management -- Ch. 9. Monitoring and testing -- Ch. 10. How to plan a project to meet compliance
      by 
      Wiles, Jack.
      Format: 
      Alıntı: 
      & Information; Management through Electronic Discovery; Win or Lose -- You Choose! -- Inside Secrets to
      by 
      Manzuik, Steve.
      Format: 
      Alıntı: 
      management and technical skill and tools required to develop an effective vulnerability management system
      by 
      Harrington, Jan L.
      Format: 
      Alıntı: 
      security policies, user management, and control of services and devices. + Covers techniques for enhancing
      by 
      Cheah, Chun Hai.
      Format: 
      Alıntı: 
      essential IIS 6.0 features. The book is organized around the 15 "MMCs" (Microsoft Management Consoles) that
      by 
      Hunter, Laura E.
      Format: 
      Alıntı: 
      of "Centralized Antivirus Management." For the same reasons that Symantec bundled together these
      by 
      Stefanek, George L.
      Format: 
      Alıntı: 
      And Verification -- Ch. 14 Data Encryption -- Ch. 15 Configuration Management -- Ch. 16 Monitoring The
      by 
      Vacca, John R.
      Format: 
      Alıntı: 
      technology security management / Identity management / Intrusion prevention and detection systems / Computer
      by 
      Maynor, David.
      Format: 
      Alıntı: 
      networks, discusses management of RFID security. * From Hack the Stack, security expert Michael Gregg
      by 
      Seagren, Eric.
      Format: 
      Alıntı: 
      Process -- Introduction -- Patch Management -- Change Management -- Antivirus -- Antispyware -- Intrusion
      by 
      Birkholz, Erik Pace.
      Format: 
      Alıntı: 
      management; however technical managers can use the book to help them understand the challenges faced by the
      by 
      Posey, Brien.
      Format: 
      Alıntı: 
      -- Defining protection policies -- Advanced security configurations -- End point management -- Monitoring
      by 
      Wiles, Jack.
      Format: 
      Alıntı: 
      Management: Performing a Mini Risk Assessment -- Outsider-Insider Threats -- The Mind of a Social Engineer
      by 
      Burnett, Mark (Mark M.)
      Format: 
      Alıntı: 
      ; ; Maintaining State; ; Using ASP.NET Tokens; ; Enhancing ASP.NET State Management; ; Code Audit Fast Track