Search Results for Internet (Computer network) - Narrowed by: English - Computer networks -- Security measures - Computer security
SirsiDynix Enterprise
http://portal.utm.my/client/en_AU/main/main/qu$003dInternet$002b$002528Computer$002bnetwork$002529$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002509Computer$002bsecurity$0026ps$003d300$0026isd$003dtrue?dt=list
2024-06-26T11:21:18Z
Computer Security Fundamentals
ent://SD_ILS/0/SD_ILS:886135
2024-06-26T11:21:18Z
2024-06-26T11:21:18Z
by Easttom, Chuck, author<br/>Author Easttom, Chuck, author<br/>Format: Books<br/>Call Number QA76.9.A25 E27 2020<br/>Edition Fourth Edition<br/>Publication Date 2020<br/>ISBN 9780135774779<br/>
Computational network science : an algorithmic approach
ent://SD_ILS/0/SD_ILS:838372
2024-06-26T11:21:18Z
2024-06-26T11:21:18Z
by Hexmoor, Henry, author<br/>Author Hexmoor, Henry, author<br/>Format: Books<br/>Call Number TK5105.59 H49 2015<br/>Publisher Morgan Kaufmann,<br/>Publication Date 2015<br/>ISBN 9780128008911<br/>
Advances in secure computing, internet services, and applications
ent://SD_ILS/0/SD_ILS:841203
2024-06-26T11:21:18Z
2024-06-26T11:21:18Z
by Tripathy, B. K. editor<br/>Author Tripathy, B. K. editor, Acharjya, D. P. editor<br/>Format: Books<br/>Call Number TK5105.59 A38 2014 f<br/>Publisher Information Science Reference, an imprint of IGI Global,<br/>Publication Date 2014<br/>ISBN 9781466649408<br/>
Windows forensic analysis toolkit : advanced analysis techniques for Windows 8
ent://SD_ILS/0/SD_ILS:838076
2024-06-26T11:21:18Z
2024-06-26T11:21:18Z
by Carvey, Harlan A., author<br/>Author Carvey, Harlan A., author<br/>Format: Books<br/>Call Number HV8079.C65 C374 2014<br/>Edition Fourth edition<br/>Publisher Syngress,<br/>Publication Date 2014<br/>ISBN 9780124171572<br/>
Digital forensics for network, internet, and cloud computing : a forensic evidence guide for moving targets and data
ent://SD_ILS/0/SD_ILS:640462
2024-06-26T11:21:18Z
2024-06-26T11:21:18Z
by Lillard, Terrence V.<br/>Author Lillard, Terrence V., Lillard, Terrence<br/>Format: Books<br/>Call Number HV8079.C65 D54 2010<br/>Publisher Syngress,<br/>Publication Date 2010<br/>ISBN 9781597495370<br/>
Network intrusion detection and prevention : concepts and techniques
ent://SD_ILS/0/SD_ILS:334955
2024-06-26T11:21:18Z
2024-06-26T11:21:18Z
by Ali A. Ghorbani<br/>Author Ali A. Ghorbani, Lu, Wei, Tavallaee, Mahbod<br/>Format: Books<br/>Call Number TK5105.59 A43 2010<br/>Publisher Springer,<br/>Publication Date 2010<br/>ISBN 9780387887708<br/>
An intrusion detection system (IDS) for internet network
ent://SD_ILS/0/SD_ILS:156938
2024-06-26T11:21:18Z
2024-06-26T11:21:18Z
by Mohd. Fauzan Safiee<br/>Author Mohd. Fauzan Safiee, Syarifah Hafizah Syed Ariffin<br/>Format: Books<br/>Call Number TK5105.59 M43 2007<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2007<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=48865">Preview</a><br/>Thesis (Sarjana Kejuruteraan (Elektrikal-Elektronik dan Telecommunication)) - Universiti Teknologi Malaysia, 2007<br/>
An intrusion detection system (IDS) for internet network
ent://SD_ILS/0/SD_ILS:568228
2024-06-26T11:21:18Z
2024-06-26T11:21:18Z
by Mohd. Fauzan Safiee<br/>Author Mohd. Fauzan Safiee, Syarifah Hafizah Syed Ariffin<br/>Format: Computer file<br/>Call Number CP 015165<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2007<br/>Thesis (Sarjana Kejuruteraan (Elektrikal-Elektronik dan Telecommunication)) - Universiti Teknologi Malaysia, 2007<br/>
Windows forensics : the field guide for corporate computer investigations
ent://SD_ILS/0/SD_ILS:277857
2024-06-26T11:21:18Z
2024-06-26T11:21:18Z
by Steel, Chad<br/>Author Steel, Chad<br/>Format: Books<br/>Call Number HV8079.C65 S84 2006<br/>Publisher Wiley Pub.,<br/>Publication Date 2006<br/>ISBN 9780470038628<br/>
Professional pen testing for Web applications
ent://SD_ILS/0/SD_ILS:132813
2024-06-26T11:21:18Z
2024-06-26T11:21:18Z
by Andreu, Andres, 1968-<br/>Author Andreu, Andres, 1968-<br/>Format: Books<br/>Call Number QA76.9.A25 A525 2006<br/>Publisher Wiley Pub.,<br/>Publication Date 2006<br/>ISBN 9780471789666<br/>
Securing the web
ent://SD_ILS/0/SD_ILS:8582
2024-06-26T11:21:18Z
2024-06-26T11:21:18Z
by Video Education Australasia<br/>Author Video Education Australasia<br/>Format: Visual Materials<br/>Call Number CP 015502<br/>Publisher VEA,<br/>Publication Date 2006<br/>
Principles and practice of information security : protecting computers from hackers and lawyers
ent://SD_ILS/0/SD_ILS:389219
2024-06-26T11:21:18Z
2024-06-26T11:21:18Z
by Volonino, Linda<br/>Author Volonino, Linda, Robinson, Stephen R., Volonino, Charles P.<br/>Format: Books<br/>Call Number TK5105.59 V64 2004<br/>Publisher Pearson/Prentice Hall,<br/>Publication Date 2004<br/>ISBN 9780131840270<br/>
Defense and detection strategies against Internet worms
ent://SD_ILS/0/SD_ILS:417839
2024-06-26T11:21:18Z
2024-06-26T11:21:18Z
by Nazario, Jose<br/>Author Nazario, Jose<br/>Format: Books<br/>Call Number QA76.9.A25 N394 2004<br/>Publisher Artech House,<br/>Publication Date 2004<br/>ISBN 9781580535373<br/>
Designing network security
ent://SD_ILS/0/SD_ILS:135032
2024-06-26T11:21:18Z
2024-06-26T11:21:18Z
by Kaeo, Merike<br/>Author Kaeo, Merike<br/>Format: Books<br/>Call Number TK5105.59 K34 2004<br/>Edition 2nd ed.<br/>Publisher Cisco Press,<br/>Publication Date 2004<br/>ISBN 9781587051173<br/>
Security + guide to network security fundamentals
ent://SD_ILS/0/SD_ILS:364391
2024-06-26T11:21:18Z
2024-06-26T11:21:18Z
by Cisco Learning Institute<br/>Author Cisco Learning Institute, Campbell, Paul, Calvert, Ben, Boswell, Steven<br/>Format: Books<br/>Call Number TK5105.59 C57 2003<br/>Publisher Thomson Learning,<br/>Publication Date 2003<br/>ISBN 9780619212940<br/>
Security + guide to network security fundamentals
ent://SD_ILS/0/SD_ILS:602181
2024-06-26T11:21:18Z
2024-06-26T11:21:18Z
by Cisco Learning Institute<br/>Author Cisco Learning Institute, Campbell, Paul, Calvert, Ben, Boswell, Steven<br/>Format: Computer file<br/>Call Number CP 3021<br/>Publisher Thomson Learning,<br/>Publication Date 2003<br/>
Network intrusion detection
ent://SD_ILS/0/SD_ILS:386349
2024-06-26T11:21:18Z
2024-06-26T11:21:18Z
by Northcutt, Stephen<br/>Author Northcutt, Stephen, Novak, Judy<br/>Format: Books<br/>Call Number TK5105.59 N673 2003<br/>Edition 3rd ed.<br/>Publisher New Riders,<br/>Publication Date 2003<br/>ISBN 9780735712652<br/>
Network security : a beginner's guide
ent://SD_ILS/0/SD_ILS:347401
2024-06-26T11:21:18Z
2024-06-26T11:21:18Z
by Maiwald, Eric<br/>Author Maiwald, Eric<br/>Format: Books<br/>Call Number TK5105.59 M35 2003<br/>Edition 2nd ed.<br/>Publisher McGraw-Hill/Osborne,<br/>Publication Date 2003<br/>ISBN 9780072229578<br/>
Packet filtering personal firewall based on microsoft's internet protocol helper API
ent://SD_ILS/0/SD_ILS:326714
2024-06-26T11:21:18Z
2024-06-26T11:21:18Z
by Abdul Hanan Abdullah<br/>Author Abdul Hanan Abdullah, Lau, Sei Ping, International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format: Books<br/>Call Number TK5105.59 A32 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>
Authentication protocol : methods review
ent://SD_ILS/0/SD_ILS:326821
2024-06-26T11:21:18Z
2024-06-26T11:21:18Z
by Cahyo Crysdian<br/>Author Cahyo Crysdian, Abdul Hanan Abdullah, International Technical Conference on Circuits, Systems, Computer and Communications (2002 : Thailand)<br/>Format: Books<br/>Call Number QA76.9.A25 C35 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>
Network intrusion detection : an analyst's handbook
ent://SD_ILS/0/SD_ILS:159454
2024-06-26T11:21:18Z
2024-06-26T11:21:18Z
by Northcutt, Stephen<br/>Author Northcutt, Stephen, Novak, Judy, McLachlan, Donald<br/>Format: Books<br/>Call Number TK5105.59 N673 2000<br/>Edition 2nd ed.<br/>Publisher New Riders,<br/>Publication Date 2001<br/>ISBN 9780735710085<br/>
Network security : a beginner's guide
ent://SD_ILS/0/SD_ILS:340640
2024-06-26T11:21:18Z
2024-06-26T11:21:18Z
by Maiwald, Eric<br/>Author Maiwald, Eric<br/>Format: Books<br/>Call Number TK5105.59 M35 2001<br/>Publisher McGraw-Hill/Osborne,<br/>Publication Date 2001<br/>ISBN 9780072133240<br/>
Network intrusion detection : an analyst's handbook
ent://SD_ILS/0/SD_ILS:155582
2024-06-26T11:21:18Z
2024-06-26T11:21:18Z
by Northcutt, Stephen<br/>Author Northcutt, Stephen<br/>Format: Books<br/>Call Number TK5105.59 N673 1999<br/>Publisher New Riders,<br/>Publication Date 1999<br/>ISBN 9780735708686<br/>
Designing network security
ent://SD_ILS/0/SD_ILS:129261
2024-06-26T11:21:18Z
2024-06-26T11:21:18Z
by Kaeo, Merike<br/>Author Kaeo, Merike<br/>Format: Books<br/>Call Number TK5105.59 K34 1999<br/>Publisher Cisci Press,<br/>Publication Date 1999<br/>ISBN 9781578700431<br/>
Network and Internet security
ent://SD_ILS/0/SD_ILS:424640
2024-06-26T11:21:18Z
2024-06-26T11:21:18Z
by Ahuja, Vijay<br/>Author Ahuja, Vijay<br/>Format: Books<br/>Call Number TK5105.59 A38 1996<br/>Publisher AP Professional,<br/>Publication Date 1996<br/>ISBN 9780120455959<br/>
The computer privacy handbook
ent://SD_ILS/0/SD_ILS:410431
2024-06-26T11:21:18Z
2024-06-26T11:21:18Z
by Bacard, Andre<br/>Author Bacard, Andre<br/>Format: Books<br/>Call Number QA76.9.A25 B32 1995<br/>Publisher Peachpit Press,<br/>Publication Date 1995<br/>ISBN 9781566091718<br/>