Search Results for COMPUTER NETWORKS. - Narrowed by: Open source software.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dCOMPUTER$002bNETWORKS.$0026qf$003dSUBJECT$002509Subject$002509Open$002bsource$002bsoftware.$002509Open$002bsource$002bsoftware.$0026ic$003dtrue$0026ps$003d300?dt=list2026-04-07T09:09:32ZInstant OpenNMS Starter a short, fast, and focused guide on OpenNMS that delivers immediate resultsent://SD_ILS/0/SD_ILS:10162642026-04-07T09:09:32Z2026-04-07T09:09:32Zby Hachey, Ghislain.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1274887">Click to View</a><br/>Format: Electronic Resources<br/>Zenoss Core network and system monitoring a step-by-step guide to configuring, using, and adapting the free open-source network monitoring systement://SD_ILS/0/SD_ILS:9964892026-04-07T09:09:32Z2026-04-07T09:09:32Zby Badger, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=945561">Click to View</a><br/>Format: Electronic Resources<br/>Nessus, Snort, & Ethereal power tools customizing open source security applicationsent://SD_ILS/0/SD_ILS:9338632026-04-07T09:09:32Z2026-04-07T09:09:32Zby Archibald, Neil.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254839">Click to View</a><br/>Format: Electronic Resources<br/>Nessus, Snort, & Ethereal power tools : customizing open source security applicationsent://SD_ILS/0/SD_ILS:11882472026-04-07T09:09:32Z2026-04-07T09:09:32Zby Archibald, Neil.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490207">http://www.sciencedirect.com/science/book/9781597490207</a><br/>Format: Electronic Resources<br/>How to cheat at configuring Open Source security toolsent://SD_ILS/0/SD_ILS:11864652026-04-07T09:09:32Z2026-04-07T09:09:32Zby Alder, Raven.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491709">http://www.sciencedirect.com/science/book/9781597491709</a><br/>Format: Electronic Resources<br/>Implementing Samba 4 : exploit the real power of Samba 4 Server by leveraging the benefits of an active directory domain controllerent://SD_ILS/0/SD_ILS:10296712026-04-07T09:09:32Z2026-04-07T09:09:32Zby Leal, Marcelo, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1666516">Click to View</a><br/>Format: Electronic Resources<br/>BackTrack testing wireless network securityent://SD_ILS/0/SD_ILS:10138472026-04-07T09:09:32Z2026-04-07T09:09:32Zby Cardwell, Kevin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1192679">Click to View</a><br/>Format: Electronic Resources<br/>Moodle security learn how to install and configure Moodle in the most secure way possibleent://SD_ILS/0/SD_ILS:9962652026-04-07T09:09:32Z2026-04-07T09:09:32Zby Miletić, Darko.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=943988">Click to View</a><br/>Format: Electronic Resources<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:11882482026-04-07T09:09:32Z2026-04-07T09:09:32Zby Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490214">https://www.sciencedirect.com/science/book/9781597490214</a><br/>Format: Electronic Resources<br/>Advanced dynamic-system simulation model replication and Monte Carlo studiesent://SD_ILS/0/SD_ILS:10084352026-04-07T09:09:32Z2026-04-07T09:09:32Zby Korn, Granino A. (Granino Arthur), 1922-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1124314">Click to View</a><br/>Format: Electronic Resources<br/>