Search Results for Computer networks. - Narrowed by: Computer security.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bnetworks.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?dt=list2026-01-11T00:02:56ZZabbix network monitoring essentials : your one-stop solution to efficient network monitoring with zabbixent://SD_ILS/0/SD_ILS:10460482026-01-11T00:02:56Z2026-01-11T00:02:56Zby Vacche, Andrea Dalle, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1973849">Click to View</a><br/>Format: Electronic Resources<br/>Information assurance dependability and security in networked systemsent://SD_ILS/0/SD_ILS:9440162026-01-11T00:02:56Z2026-01-11T00:02:56Zby Qian, Yi, 1962-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328312">Click to View</a><br/>Format: Electronic Resources<br/>Identity management concepts, technologies, and systemsent://SD_ILS/0/SD_ILS:9725072026-01-11T00:02:56Z2026-01-11T00:02:56Zby Bertino, Elisa.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=634511">Click to View</a><br/>Format: Electronic Resources<br/>Secure computer and network systems modeling, analysis and designent://SD_ILS/0/SD_ILS:9463852026-01-11T00:02:56Z2026-01-11T00:02:56Zby Ye, Nong.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=351427">Click to View</a><br/>Format: Electronic Resources<br/>Intrusion prevention and active response deploying network and host IPSent://SD_ILS/0/SD_ILS:9307142026-01-11T00:02:56Z2026-01-11T00:02:56Zby Henmi, Anne.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=226578">Click to View</a><br/>Format: Electronic Resources<br/>Securing IM and P2P applications for the enterpriseent://SD_ILS/0/SD_ILS:9338712026-01-11T00:02:56Z2026-01-11T00:02:56Zby Piccard, Paul L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254847">Click to View</a><br/>Format: Electronic Resources<br/>Information assurance : dependability and security in networked systemsent://SD_ILS/0/SD_ILS:11891952026-01-11T00:02:56Z2026-01-11T00:02:56Zby Qian, Yi, 1962-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123735669">https://www.sciencedirect.com/science/book/9780123735669</a><br/>Format: Electronic Resources<br/>Cybersecurity today and tomorrow pay now or pay laterent://SD_ILS/0/SD_ILS:10825832026-01-11T00:02:56Z2026-01-11T00:02:56Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3375180">Click to View</a><br/>Format: Electronic Resources<br/>Mission-critical network planningent://SD_ILS/0/SD_ILS:9310112026-01-11T00:02:56Z2026-01-11T00:02:56Zby Liotine, Matthew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227652">Click to View</a><br/>Format: Electronic Resources<br/>Cyber smart : five habits to protect your family, money, and identity from cyber criminalsent://SD_ILS/0/SD_ILS:11439062026-01-11T00:02:56Z2026-01-11T00:02:56Zby McDonough, Bart, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5612908">Click to View</a><br/>Format: Electronic Resources<br/>Dns security : defending the domain name systement://SD_ILS/0/SD_ILS:11132152026-01-11T00:02:56Z2026-01-11T00:02:56Zby Liska, Allan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4556898">Click to View</a><br/>Format: Electronic Resources<br/>Data breach preparation and response : breaches are certain, impact is notent://SD_ILS/0/SD_ILS:11132162026-01-11T00:02:56Z2026-01-11T00:02:56Zby Fowler, Kevvie, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4556899">Click to View</a><br/>Format: Electronic Resources<br/>Security in fixed and wireless networksent://SD_ILS/0/SD_ILS:11155852026-01-11T00:02:56Z2026-01-11T00:02:56Zby Schäfer, Günter, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4658592">Click to View</a><br/>Format: Electronic Resources<br/>Building a corporate culture of security : strategies for strengthening organizational resiliencyent://SD_ILS/0/SD_ILS:11083492026-01-11T00:02:56Z2026-01-11T00:02:56Zby Sullivant, John, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4425984">Click to View</a><br/>Format: Electronic Resources<br/>Web application security is a stack : how to CYA (Cover Your Apps) completelyent://SD_ILS/0/SD_ILS:10538362026-01-11T00:02:56Z2026-01-11T00:02:56Zby Vittie, Lori Mac, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192126">Click to View</a><br/>Format: Electronic Resources<br/>Computational network science : an algorithmic approachent://SD_ILS/0/SD_ILS:10381842026-01-11T00:02:56Z2026-01-11T00:02:56Zby Hexmoor, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1798312">Click to View</a><br/>Format: Electronic Resources<br/>Assessing information security : strategies, tactics, logic and frameworkent://SD_ILS/0/SD_ILS:10538342026-01-11T00:02:56Z2026-01-11T00:02:56Zby Vladimirov, A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192124">Click to View</a><br/>Format: Electronic Resources<br/>Practical anonymity hiding in plain sight onlineent://SD_ILS/0/SD_ILS:10076142026-01-11T00:02:56Z2026-01-11T00:02:56Zby Loshin, Peter.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115167">Click to View</a><br/>Format: Electronic Resources<br/>Data visualization. Part 2ent://SD_ILS/0/SD_ILS:10242062026-01-11T00:02:56Z2026-01-11T00:02:56Zby Assam, Tarek.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1579356">Click to View</a><br/>Format: Electronic Resources<br/>Security risk management building an information security risk management program from the ground upent://SD_ILS/0/SD_ILS:9768042026-01-11T00:02:56Z2026-01-11T00:02:56Zby Wheeler, Evan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=685406">Click to View</a><br/>Format: Electronic Resources<br/>Adaptive security management architectureent://SD_ILS/0/SD_ILS:9722382026-01-11T00:02:56Z2026-01-11T00:02:56Zby Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=625004">Click to View</a><br/>Format: Electronic Resources<br/>Security data visualization graphical techniques for network analysisent://SD_ILS/0/SD_ILS:10584542026-01-11T00:02:56Z2026-01-11T00:02:56Zby Conti, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3017625">Click to View</a><br/>Format: Electronic Resources<br/>Developer's guide to web application securityent://SD_ILS/0/SD_ILS:9385212026-01-11T00:02:56Z2026-01-11T00:02:56Zby Cross, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=289735">Click to View</a><br/>Format: Electronic Resources<br/>Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasuresent://SD_ILS/0/SD_ILS:9394832026-01-11T00:02:56Z2026-01-11T00:02:56Zby Contos, Brian T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294116">Click to View</a><br/>Format: Electronic Resources<br/>Buffer overflow attacks detect, exploit, preventent://SD_ILS/0/SD_ILS:9302072026-01-11T00:02:56Z2026-01-11T00:02:56Zby Foster, James C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=222803">Click to View</a><br/>Format: Electronic Resources<br/>Host integrity monitoring using Osiris and Samhainent://SD_ILS/0/SD_ILS:9316062026-01-11T00:02:56Z2026-01-11T00:02:56Zby Wotring, Brian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=233599">Click to View</a><br/>Format: Electronic Resources<br/>Network security evaluation using the NSA IEMent://SD_ILS/0/SD_ILS:9338662026-01-11T00:02:56Z2026-01-11T00:02:56Zby Fuller, Ed.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254842">Click to View</a><br/>Format: Electronic Resources<br/>Silence on the wire a field guide to passive reconnaissance and indirect attacksent://SD_ILS/0/SD_ILS:9365792026-01-11T00:02:56Z2026-01-11T00:02:56Zby Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273504">Click to View</a><br/>Format: Electronic Resources<br/>Hacking the code ASP. NET web application securityent://SD_ILS/0/SD_ILS:9395062026-01-11T00:02:56Z2026-01-11T00:02:56Zby Burnett, Mark (Mark M.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294160">Click to View</a><br/>Format: Electronic Resources<br/>Ethereal packet sniffingent://SD_ILS/0/SD_ILS:9394852026-01-11T00:02:56Z2026-01-11T00:02:56Zby Orebaugh, Angela.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294122">Click to View</a><br/>Format: Electronic Resources<br/>Security sage's guide to hardening the network infrastructureent://SD_ILS/0/SD_ILS:9395712026-01-11T00:02:56Z2026-01-11T00:02:56Zby Andrés, Steven.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294359">Click to View</a><br/>Format: Electronic Resources<br/>How to cheat at Configuring ISA Server 2004ent://SD_ILS/0/SD_ILS:9338772026-01-11T00:02:56Z2026-01-11T00:02:56Zby Shinder, Dr. Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254853">Click to View</a><br/>Format: Electronic Resources<br/>Network security foundationsent://SD_ILS/0/SD_ILS:9350402026-01-11T00:02:56Z2026-01-11T00:02:56Zby Strebe, Matthew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=267332">Click to View</a><br/>Format: Electronic Resources<br/>Snort 2.0 intrusion detectionent://SD_ILS/0/SD_ILS:9395752026-01-11T00:02:56Z2026-01-11T00:02:56Zby Beale, Jay.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294371">Click to View</a><br/>Format: Electronic Resources<br/>Hack proofing ColdFusionent://SD_ILS/0/SD_ILS:9394982026-01-11T00:02:56Z2026-01-11T00:02:56Zby Meyer, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294151">Click to View</a><br/>Format: Electronic Resources<br/>The five technological forces disrupting security : how social, mobile, cloud and iot are fundamentally changing the practice of physical securityent://SD_ILS/0/SD_ILS:11288832026-01-11T00:02:56Z2026-01-11T00:02:56Zby Van Till, Steve, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4981408">Click to View</a><br/>Format: Electronic Resources<br/>Security and privacy in the digital era. Volume 1ent://SD_ILS/0/SD_ILS:11152702026-01-11T00:02:56Z2026-01-11T00:02:56Zby Guerrier, Claudine, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4648717">Click to View</a><br/>Format: Electronic Resources<br/>Understanding bitcoin : cryptography, engineering and economics.ent://SD_ILS/0/SD_ILS:10401802026-01-11T00:02:56Z2026-01-11T00:02:56Zby Franco, Pedro, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1823060">Click to View</a><br/>Format: Electronic Resources<br/>Computer forensics with FTK : enhance your computer forensics knowledge through illustrations, tips, tricks, and practical real-world scenariosent://SD_ILS/0/SD_ILS:10291072026-01-11T00:02:56Z2026-01-11T00:02:56Zby Carbone, Fernando, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1657797">Click to View</a><br/>Format: Electronic Resources<br/>Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013ent://SD_ILS/0/SD_ILS:10350102026-01-11T00:02:56Z2026-01-11T00:02:56Zby Ginodman, Veniamin, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1752831">Click to View</a><br/>Format: Electronic Resources<br/>Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanningent://SD_ILS/0/SD_ILS:10361782026-01-11T00:02:56Z2026-01-11T00:02:56Zby Hutchens, Justin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1771381">Click to View</a><br/>Format: Electronic Resources<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:9556372026-01-11T00:02:56Z2026-01-11T00:02:56Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=453166">Click to View</a><br/>Format: Electronic Resources<br/>Fuzzing for software security testing and quality assuranceent://SD_ILS/0/SD_ILS:9563292026-01-11T00:02:56Z2026-01-11T00:02:56Zby Takanen, Ari.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456884">Click to View</a><br/>Format: Electronic Resources<br/>Role-based access controlent://SD_ILS/0/SD_ILS:9452212026-01-11T00:02:56Z2026-01-11T00:02:56Zby Ferraiolo, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338751">Click to View</a><br/>Format: Electronic Resources<br/>Toward a safer and more secure cyberspaceent://SD_ILS/0/SD_ILS:10854522026-01-11T00:02:56Z2026-01-11T00:02:56Zby Goodman, Seymour E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3378311">Click to View</a><br/>Format: Electronic Resources<br/>How to cheat at designing security for a Windows Server 2003 networkent://SD_ILS/0/SD_ILS:9338562026-01-11T00:02:56Z2026-01-11T00:02:56Zby Amini, Rob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254832">Click to View</a><br/>Format: Electronic Resources<br/>Hacking web apps detecting and preventing web application security problemsent://SD_ILS/0/SD_ILS:10003712026-01-11T00:02:56Z2026-01-11T00:02:56Zby Shema, Mike.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1012529">Click to View</a><br/>Format: Electronic Resources<br/>Securing information and communications systems principles, technologies, and applicationsent://SD_ILS/0/SD_ILS:9563262026-01-11T00:02:56Z2026-01-11T00:02:56Zby Furnell, Steven, 1970-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456881">Click to View</a><br/>Format: Electronic Resources<br/>Nessus, Snort, & Ethereal power tools customizing open source security applicationsent://SD_ILS/0/SD_ILS:9338632026-01-11T00:02:56Z2026-01-11T00:02:56Zby Archibald, Neil.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254839">Click to View</a><br/>Format: Electronic Resources<br/>Cisco security professional's guide to secure intrusion detection systemsent://SD_ILS/0/SD_ILS:11884082026-01-11T00:02:56Z2026-01-11T00:02:56Zby Burton, James.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266696">http://www.sciencedirect.com/science/book/9781932266696</a><br/>Format: Electronic Resources<br/>Insider threat : protecting the enterprise from sabotage, spying, and theftent://SD_ILS/0/SD_ILS:11882592026-01-11T00:02:56Z2026-01-11T00:02:56Zby Cole, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format: Electronic Resources<br/>Botnets : the killer web appent://SD_ILS/0/SD_ILS:11864442026-01-11T00:02:56Z2026-01-11T00:02:56Zby Schiller, Craig A.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491358">https://www.sciencedirect.com/science/book/9781597491358</a><br/>Format: Electronic Resources<br/>How to cheat at designing security for a Windows Server 2003 networkent://SD_ILS/0/SD_ILS:11882812026-01-11T00:02:56Z2026-01-11T00:02:56Zby Amini, Rob.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492430">https://www.sciencedirect.com/science/book/9781597492430</a><br/>Format: Electronic Resources<br/>The tangled Web a guide to securing modern Web applicationsent://SD_ILS/0/SD_ILS:10099762026-01-11T00:02:56Z2026-01-11T00:02:56Zby Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137574">Click to View</a><br/>Format: Electronic Resources<br/>How to cheat at securing your networkent://SD_ILS/0/SD_ILS:11899832026-01-11T00:02:56Z2026-01-11T00:02:56Zby Dubrawsky, Ido.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492317">https://www.sciencedirect.com/science/book/9781597492317</a><br/>Format: Electronic Resources<br/>Developer's guide to web application securityent://SD_ILS/0/SD_ILS:11863712026-01-11T00:02:56Z2026-01-11T00:02:56Zby Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format: Electronic Resources<br/>Hacking a terror network : the silent threat of covert channelsent://SD_ILS/0/SD_ILS:11883632026-01-11T00:02:56Z2026-01-11T00:02:56Zby Rogers, Russ.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994985">https://www.sciencedirect.com/science/book/9781928994985</a><br/>Format: Electronic Resources<br/>Snort 2.1 intrusion detectionent://SD_ILS/0/SD_ILS:11883662026-01-11T00:02:56Z2026-01-11T00:02:56Zby Beale, Jay.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836043">https://www.sciencedirect.com/science/book/9781931836043</a><br/>Format: Electronic Resources<br/>Snort : IDS and IPS toolkitent://SD_ILS/0/SD_ILS:11882712026-01-11T00:02:56Z2026-01-11T00:02:56Zby Beale, Jay.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490993">https://www.sciencedirect.com/science/book/9781597490993</a><br/>Format: Electronic Resources<br/>Hack the stack : using snort and ethereal to master the 8 layers of an insecure networkent://SD_ILS/0/SD_ILS:11864272026-01-11T00:02:56Z2026-01-11T00:02:56Zby Gregg, Michael (Michael C.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">http://www.sciencedirect.com/science/book/9781597491099</a><br/>Format: Electronic Resources<br/>Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasuresent://SD_ILS/0/SD_ILS:11864392026-01-11T00:02:56Z2026-01-11T00:02:56Zby Contos, Brian T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491297">https://www.sciencedirect.com/science/book/9781597491297</a><br/>Format: Electronic Resources<br/>Hack proofing your networkent://SD_ILS/0/SD_ILS:11883572026-01-11T00:02:56Z2026-01-11T00:02:56Zby Ahmad, David R. Mirza.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994701">https://www.sciencedirect.com/science/book/9781928994701</a><br/>Format: Electronic Resources<br/>Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviorsent://SD_ILS/0/SD_ILS:11462142026-01-11T00:02:56Z2026-01-11T00:02:56Zby Carpenter, Perry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5763515">Click to View</a><br/>Format: Electronic Resources<br/>The business of cybersecurity : foundations and ideologiesent://SD_ILS/0/SD_ILS:11463812026-01-11T00:02:56Z2026-01-11T00:02:56Zby Sathnur, Ashwini, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5770273">Click to View</a><br/>Format: Electronic Resources<br/>Understanding security issuesent://SD_ILS/0/SD_ILS:11325292026-01-11T00:02:56Z2026-01-11T00:02:56Zby Donaldson, Scott E., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5157542">Click to View</a><br/>Format: Electronic Resources<br/>Security and resilience in intelligent data-centric systems and communication networksent://SD_ILS/0/SD_ILS:11301612026-01-11T00:02:56Z2026-01-11T00:02:56Zby Ficco, Massimo, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5090270">Click to View</a><br/>Format: Electronic Resources<br/>IT-Sicherheitsanalysen : Ein prozessorientiertes Vorgehensmodellent://SD_ILS/0/SD_ILS:11247972026-01-11T00:02:56Z2026-01-11T00:02:56Zby Simić, Daniela, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4830572">Click to View</a><br/>Format: Electronic Resources<br/>Cyber security awareness for CEOs and managementent://SD_ILS/0/SD_ILS:11045662026-01-11T00:02:56Z2026-01-11T00:02:56Zby Willson, David, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4189279">Click to View</a><br/>Format: Electronic Resources<br/>Network performance and security : testing and analyzing using open source and low-cost toolsent://SD_ILS/0/SD_ILS:11090632026-01-11T00:02:56Z2026-01-11T00:02:56Zby Chapman, Chris, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4452265">Click to View</a><br/>Format: Electronic Resources<br/>Network attacks & exploitation : a frameworkent://SD_ILS/0/SD_ILS:11031442026-01-11T00:02:56Z2026-01-11T00:02:56Zby Monte, Matthew, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040351">Click to View</a><br/>Format: Electronic Resources<br/>Pragmatic security metrics applying metametrics to information securityent://SD_ILS/0/SD_ILS:10109722026-01-11T00:02:56Z2026-01-11T00:02:56Zby Brotby, W. Krag.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1153198">Click to View</a><br/>Format: Electronic Resources<br/>Cyber adversary characterization auditing the hacker mindent://SD_ILS/0/SD_ILS:9394692026-01-11T00:02:56Z2026-01-11T00:02:56Zby Parker, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294071">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity operations handbookent://SD_ILS/0/SD_ILS:9426132026-01-11T00:02:56Z2026-01-11T00:02:56Zby Rittinghouse, John W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=313612">Click to View</a><br/>Format: Electronic Resources<br/>Empirical research for software security : foundations and experienceent://SD_ILS/0/SD_ILS:11329732026-01-11T00:02:56Z2026-01-11T00:02:56Zby ben Othmane, Lotfi, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5164090">Click to View</a><br/>Format: Electronic Resources<br/>Threat modeling : designing for securityent://SD_ILS/0/SD_ILS:10270482026-01-11T00:02:56Z2026-01-11T00:02:56Zby Shostack, Adam.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629177">Click to View</a><br/>Format: Electronic Resources<br/>Enterprise information security and privacyent://SD_ILS/0/SD_ILS:9563312026-01-11T00:02:56Z2026-01-11T00:02:56Zby Axelrod, C. Warren.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456886">Click to View</a><br/>Format: Electronic Resources<br/>Network security a practical guideent://SD_ILS/0/SD_ILS:9403342026-01-11T00:02:56Z2026-01-11T00:02:56Zby Poole, Owen.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=298471">Click to View</a><br/>Format: Electronic Resources<br/>Information security a manager's guide to thwarting data thieves and hackersent://SD_ILS/0/SD_ILS:9452882026-01-11T00:02:56Z2026-01-11T00:02:56Zby Alexander, Philip, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=339307">Click to View</a><br/>Format: Electronic Resources<br/>The misuse of information systems the impact of security countermeasuresent://SD_ILS/0/SD_ILS:10580442026-01-11T00:02:56Z2026-01-11T00:02:56Zby D'Arcy, John P., 1975-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3016826">Click to View</a><br/>Format: Electronic Resources<br/>Information security best practices : 205 basic rulesent://SD_ILS/0/SD_ILS:11883182026-01-11T00:02:56Z2026-01-11T00:02:56Zby Stefanek, George L.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781878707963">https://www.sciencedirect.com/science/book/9781878707963</a><br/>Format: Electronic Resources<br/>Siber güvenlikent://SD_ILS/0/SD_ILS:6683032026-01-11T00:02:56Z2026-01-11T00:02:56Zby Canlı, Mustafa<br/>Format: Books<br/>Cybercrime and business : strategies for global corporate securityent://SD_ILS/0/SD_ILS:11265202026-01-11T00:02:56Z2026-01-11T00:02:56Zby Moskowitz, Sanford, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4863624">Click to View</a><br/>Format: Electronic Resources<br/>Essential skills for hackersent://SD_ILS/0/SD_ILS:11045682026-01-11T00:02:56Z2026-01-11T00:02:56Zby Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4189281">Click to View</a><br/>Format: Electronic Resources<br/>You : for sale protecting your personal data and privacy onlineent://SD_ILS/0/SD_ILS:10537572026-01-11T00:02:56Z2026-01-11T00:02:56Zby Sumner, Stuart, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2187472">Click to View</a><br/>Format: Electronic Resources<br/>Security intelligence : a practitioner's guide to solving enterprise security challengesent://SD_ILS/0/SD_ILS:10427352026-01-11T00:02:56Z2026-01-11T00:02:56Zby Li, Qing, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1895130">Click to View</a><br/>Format: Electronic Resources<br/>Cyber resilience best practicesent://SD_ILS/0/SD_ILS:11044672026-01-11T00:02:56Z2026-01-11T00:02:56Zby AXELOS Limited, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4187569">Click to View</a><br/>Format: Electronic Resources<br/>Application security in the ISO 27001:2013 environmentent://SD_ILS/0/SD_ILS:11069872026-01-11T00:02:56Z2026-01-11T00:02:56Zby Vasudevan, Vinod, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4395800">Click to View</a><br/>Format: Electronic Resources<br/>The defendeŕs dilemma : charting a course toward cybersecurityent://SD_ILS/0/SD_ILS:10508522026-01-11T00:02:56Z2026-01-11T00:02:56Zby Libicki, Martin C., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2075897">Click to View</a><br/>Format: Electronic Resources<br/>Cyber security and IT infrastructure protectionent://SD_ILS/0/SD_ILS:10189412026-01-11T00:02:56Z2026-01-11T00:02:56Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1377640">Click to View</a><br/>Format: Electronic Resources<br/>The basics of digital privacy : simple tools to protect your personal information and your identity onlineent://SD_ILS/0/SD_ILS:10235692026-01-11T00:02:56Z2026-01-11T00:02:56Zby Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1573362">Click to View</a><br/>Format: Electronic Resources<br/>Biohackers the politics of open scienceent://SD_ILS/0/SD_ILS:10882072026-01-11T00:02:56Z2026-01-11T00:02:56Zby Delfanti, Alessandro.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3386719">Click to View</a><br/>Format: Electronic Resources<br/>ISO27001 / ISO27002 : a pocket guideent://SD_ILS/0/SD_ILS:10209932026-01-11T00:02:56Z2026-01-11T00:02:56Zby Calder, Alan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1463579">Click to View</a><br/>Format: Electronic Resources<br/>An introduction to information security and ISO27001:2013 : a pocket guideent://SD_ILS/0/SD_ILS:10209922026-01-11T00:02:56Z2026-01-11T00:02:56Zby Watkins, Steve G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1463578">Click to View</a><br/>Format: Electronic Resources<br/>Web application defender's cookbook battling hackers and protecting usersent://SD_ILS/0/SD_ILS:10066272026-01-11T00:02:56Z2026-01-11T00:02:56Zby Barnett, Ryan C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108733">Click to View</a><br/>Format: Electronic Resources<br/>Computer Forensics jumpstartent://SD_ILS/0/SD_ILS:9736802026-01-11T00:02:56Z2026-01-11T00:02:56Zby Solomon, Michael R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=661659">Click to View</a><br/>Format: Electronic Resources<br/>Mac security bibleent://SD_ILS/0/SD_ILS:9603772026-01-11T00:02:56Z2026-01-11T00:02:56Zby Kissell, Joe.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=477803">Click to View</a><br/>Format: Electronic Resources<br/>Hacking the art of exploitationent://SD_ILS/0/SD_ILS:10099552026-01-11T00:02:56Z2026-01-11T00:02:56Zby Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137538">Click to View</a><br/>Format: Electronic Resources<br/>Techno security's guide to e-discovery and digital forensicsent://SD_ILS/0/SD_ILS:9480152026-01-11T00:02:56Z2026-01-11T00:02:56Zby Wiles, Jack.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=405426">Click to View</a><br/>Format: Electronic Resources<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:9338582026-01-11T00:02:56Z2026-01-11T00:02:56Zby Long, Johnny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254834">Click to View</a><br/>Format: Electronic Resources<br/>Insider threat protecting the enterprise from sabotage, spying, and theftent://SD_ILS/0/SD_ILS:9338732026-01-11T00:02:56Z2026-01-11T00:02:56Zby Cole, Eric.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254849">Click to View</a><br/>Format: Electronic Resources<br/>Innocent code a security wake-up call for Web programmersent://SD_ILS/0/SD_ILS:9294742026-01-11T00:02:56Z2026-01-11T00:02:56Zby Huseby, Sverre H.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=210558">Click to View</a><br/>Format: Electronic Resources<br/>Configuring Symantec Antivirus, Corporate Editionent://SD_ILS/0/SD_ILS:9394622026-01-11T00:02:56Z2026-01-11T00:02:56Zby Hunter, Laura E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294056">Click to View</a><br/>Format: Electronic Resources<br/>Hacking the art of exploitationent://SD_ILS/0/SD_ILS:9365672026-01-11T00:02:56Z2026-01-11T00:02:56Zby Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273488">Click to View</a><br/>Format: Electronic Resources<br/>İnternet üzerinden yapılan işlemlerde elektronik para ve dijital imzaent://SD_ILS/0/SD_ILS:4885702026-01-11T00:02:56Z2026-01-11T00:02:56Zby Berber, Leyla Keser<br/>Format: Books<br/>Hack proofing Windows 2000ent://SD_ILS/0/SD_ILS:9395012026-01-11T00:02:56Z2026-01-11T00:02:56Zby Todd, Chad.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294154">Click to View</a><br/>Format: Electronic Resources<br/>Cyber security in parallel and distributed computing : concepts, techniques, applications and case studiesent://SD_ILS/0/SD_ILS:11456862026-01-11T00:02:56Z2026-01-11T00:02:56Zby Le, Dac-Nhuong, 1983- editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5741215">Click to View</a><br/>Format: Electronic Resources<br/>Windows registry forensics : advanced digital forensic analysis of the windows registryent://SD_ILS/0/SD_ILS:11086862026-01-11T00:02:56Z2026-01-11T00:02:56Zby Carvey, Harlan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4438754">Click to View</a><br/>Format: Electronic Resources<br/>Hiding behind the keyboard : uncovering covert communication methods with forensic analysisent://SD_ILS/0/SD_ILS:11090622026-01-11T00:02:56Z2026-01-11T00:02:56Zby Shavers, Brett, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4452264">Click to View</a><br/>Format: Electronic Resources<br/>Dissecting the hack : the V3rb0ten networkent://SD_ILS/0/SD_ILS:10530002026-01-11T00:02:56Z2026-01-11T00:02:56Zby Street, Jayson E., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2098440">Click to View</a><br/>Format: Electronic Resources<br/>Hacking point of sale : payment application secrets, threats, and solutionsent://SD_ILS/0/SD_ILS:10270462026-01-11T00:02:56Z2026-01-11T00:02:56Zby Gomzin, Slava.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629175">Click to View</a><br/>Format: Electronic Resources<br/>Windows forensic analysis toolkit : advanced analysis techniques for Windows 8ent://SD_ILS/0/SD_ILS:10291622026-01-11T00:02:56Z2026-01-11T00:02:56Zby Carvey, Harlan A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1659012">Click to View</a><br/>Format: Electronic Resources<br/>Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linuxent://SD_ILS/0/SD_ILS:10317372026-01-11T00:02:56Z2026-01-11T00:02:56Zby Buchanan, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1688607">Click to View</a><br/>Format: Electronic Resources<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:10322662026-01-11T00:02:56Z2026-01-11T00:02:56Zby Andress, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1699255">Click to View</a><br/>Format: Electronic Resources<br/>Cyber threat! : how to manage the growing risk of cyber attacksent://SD_ILS/0/SD_ILS:10342962026-01-11T00:02:56Z2026-01-11T00:02:56Zby Ulsch, N. MacDonnell, 1951- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1742833">Click to View</a><br/>Format: Electronic Resources<br/>Network intrusion analysis methodologies, tools, and techniques for incident analysis and responseent://SD_ILS/0/SD_ILS:10033762026-01-11T00:02:56Z2026-01-11T00:02:56Zby Fichera, Joe, 1966-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1058152">Click to View</a><br/>Format: Electronic Resources<br/>IBM mainframe security beyond the basics : a practical guide from a z/OS and RACF perspectiveent://SD_ILS/0/SD_ILS:10198782026-01-11T00:02:56Z2026-01-11T00:02:56Zby Dattani, Dinesh D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1411689">Click to View</a><br/>Format: Electronic Resources<br/>Information protection playbookent://SD_ILS/0/SD_ILS:10199902026-01-11T00:02:56Z2026-01-11T00:02:56Zby Kane, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1418381">Click to View</a><br/>Format: Electronic Resources<br/>Hacking for dummiesent://SD_ILS/0/SD_ILS:10062512026-01-11T00:02:56Z2026-01-11T00:02:56Zby Beaver, Kevin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1106542">Click to View</a><br/>Format: Electronic Resources<br/>Linux malware incident response : a practitioner's guide to forensic collection and examination of volatile data : an excerpt from Malware forensics field guide for Linux systemsent://SD_ILS/0/SD_ILS:10076252026-01-11T00:02:56Z2026-01-11T00:02:56Zby Malin, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115185">Click to View</a><br/>Format: Electronic Resources<br/>Windows forensic analysis toolkit advanced analysis techniques for Windows 7ent://SD_ILS/0/SD_ILS:9899252026-01-11T00:02:56Z2026-01-11T00:02:56Zby Carvey, Harlan A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=850700">Click to View</a><br/>Format: Electronic Resources<br/>A multidisciplinary introduction to information securityent://SD_ILS/0/SD_ILS:10284162026-01-11T00:02:56Z2026-01-11T00:02:56Zby Mjølsnes, Stig F., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1648315">Click to View</a><br/>Format: Electronic Resources<br/>Oracle Identity and Access Manager 11g for administrators administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasksent://SD_ILS/0/SD_ILS:9968352026-01-11T00:02:56Z2026-01-11T00:02:56Zby Kumar, Atul.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948559">Click to View</a><br/>Format: Electronic Resources<br/>Microsoft Forefront UAG 2010 administrator's handbook take full command of Microsoft Forefront Unified Access Gateway to secure your business applications and provide dynamic remote access with DirectAccessent://SD_ILS/0/SD_ILS:9968442026-01-11T00:02:56Z2026-01-11T00:02:56Zby Ben-Ari, Erez.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948568">Click to View</a><br/>Format: Electronic Resources<br/>IT audit, control, and securityent://SD_ILS/0/SD_ILS:9721352026-01-11T00:02:56Z2026-01-11T00:02:56Zby Moeller, Robert R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=624573">Click to View</a><br/>Format: Electronic Resources<br/>The definitive guide to the C&A transformation the first publication of a comprehensive view of the C&A transformationent://SD_ILS/0/SD_ILS:9654532026-01-11T00:02:56Z2026-01-11T00:02:56Zby Mehan, Julie E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=547041">Click to View</a><br/>Format: Electronic Resources<br/>Practical embedded security building secure resource-constrained systemsent://SD_ILS/0/SD_ILS:9425072026-01-11T00:02:56Z2026-01-11T00:02:56Zby Stapko, Timothy John.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=312846">Click to View</a><br/>Format: Electronic Resources<br/>Trust and security in collaborative computingent://SD_ILS/0/SD_ILS:10302552026-01-11T00:02:56Z2026-01-11T00:02:56Zby Zou, Xukai, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1679354">Click to View</a><br/>Format: Electronic Resources<br/>Windows forensic analysis DVD toolkit,ent://SD_ILS/0/SD_ILS:9440762026-01-11T00:02:56Z2026-01-11T00:02:56Zby Carvey, Harlan A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328624">Click to View</a><br/>Format: Electronic Resources<br/>Dr. Tom Shinder's configuring ISA Server 2004ent://SD_ILS/0/SD_ILS:9394792026-01-11T00:02:56Z2026-01-11T00:02:56Zby Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294094">Click to View</a><br/>Format: Electronic Resources<br/>MCSE designing security for a Windows Server 2003 network : exam 70-298 study guide & DVD training systement://SD_ILS/0/SD_ILS:9395332026-01-11T00:02:56Z2026-01-11T00:02:56Zby Khnaser, Elias N.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294253">Click to View</a><br/>Format: Electronic Resources<br/>Defense and detection strategies against Internet wormsent://SD_ILS/0/SD_ILS:9310192026-01-11T00:02:56Z2026-01-11T00:02:56Zby Nazario, Jose.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227660">Click to View</a><br/>Format: Electronic Resources<br/>Security secrets, intruders and ID tags.ent://SD_ILS/0/SD_ILS:10920432026-01-11T00:02:56Z2026-01-11T00:02:56Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411447">Click to View</a><br/>Format: Electronic Resources<br/>Role-based access controlent://SD_ILS/0/SD_ILS:9309912026-01-11T00:02:56Z2026-01-11T00:02:56Zby Ferraiolo, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227631">Click to View</a><br/>Format: Electronic Resources<br/>Configuring ISA server 2000 building firewalls for windows 2000ent://SD_ILS/0/SD_ILS:9394602026-01-11T00:02:56Z2026-01-11T00:02:56Zby Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294054">Click to View</a><br/>Format: Electronic Resources<br/>Best practices in computer network defense : incident detection and responseent://SD_ILS/0/SD_ILS:10276412026-01-11T00:02:56Z2026-01-11T00:02:56Zby Hathaway, Melissa E., editor of compilation.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1637648">Click to View</a><br/>Format: Electronic Resources<br/>Applied network security monitoring : collection, detection, and analysisent://SD_ILS/0/SD_ILS:10236592026-01-11T00:02:56Z2026-01-11T00:02:56Zby Sanders, Chris, 1986-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1574451">Click to View</a><br/>Format: Electronic Resources<br/>SQL injection attacks and defenseent://SD_ILS/0/SD_ILS:9972872026-01-11T00:02:56Z2026-01-11T00:02:56Zby Clarke, Justin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=953188">Click to View</a><br/>Format: Electronic Resources<br/>Data mining tools for malware detectionent://SD_ILS/0/SD_ILS:9874612026-01-11T00:02:56Z2026-01-11T00:02:56Zby Masud, Mehedy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826949">Click to View</a><br/>Format: Electronic Resources<br/>Web commerce security design and developmentent://SD_ILS/0/SD_ILS:9789752026-01-11T00:02:56Z2026-01-11T00:02:56Zby Nahari, Hadi.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706729">Click to View</a><br/>Format: Electronic Resources<br/>Securing the cloud cloud computer security techniques and tacticsent://SD_ILS/0/SD_ILS:9770552026-01-11T00:02:56Z2026-01-11T00:02:56Zby Winkler, J. R. (Joachim R.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=686827">Click to View</a><br/>Format: Electronic Resources<br/>Computing and Network Sustainability Proceedings of IRSCNS 2016ent://SD_ILS/0/SD_ILS:4817722026-01-11T00:02:56Z2026-01-11T00:02:56Zby Vishwakarma, H.R . editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3935-5">http://dx.doi.org/10.1007/978-981-10-3935-5</a><br/>Format: Electronic Resources<br/>The basics of information security understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:1335922026-01-11T00:02:56Z2026-01-11T00:02:56Zby Andress, Jason.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Electronic Resources<br/>Windows Registry Forensics : Advanced Digital Forensic Analysis of the Windows Registry.ent://SD_ILS/0/SD_ILS:11835262026-01-11T00:02:56Z2026-01-11T00:02:56Zby Carvey, Harlan.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495806">https://www.sciencedirect.com/science/book/9781597495806</a><br/>Format: Electronic Resources<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:11838152026-01-11T00:02:56Z2026-01-11T00:02:56Zby Andress, Jason.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496537">https://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Electronic Resources<br/>Windows forensic analysis : DVD toolkitent://SD_ILS/0/SD_ILS:11864552026-01-11T00:02:56Z2026-01-11T00:02:56Zby Carvey, Harlan A.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491563">http://www.sciencedirect.com/science/book/9781597491563</a><br/>Format: Electronic Resources<br/>How to cheat at Windows system administration using command line scriptsent://SD_ILS/0/SD_ILS:11864252026-01-11T00:02:56Z2026-01-11T00:02:56Zby Bhardwaj, Pawan K.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491051">http://www.sciencedirect.com/science/book/9781597491051</a><br/>Format: Electronic Resources<br/>Host integrity monitoring : using Osiris and Samhainent://SD_ILS/0/SD_ILS:11882452026-01-11T00:02:56Z2026-01-11T00:02:56Zby Wotring, Brian.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490184">http://www.sciencedirect.com/science/book/9781597490184</a><br/>Format: Electronic Resources<br/>Intrusion prevention and active response : deploying network and host IPSent://SD_ILS/0/SD_ILS:11884002026-01-11T00:02:56Z2026-01-11T00:02:56Zby Rash, Michael.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266474">http://www.sciencedirect.com/science/book/9781932266474</a><br/>Format: Electronic Resources<br/>Wireless operational securityent://SD_ILS/0/SD_ILS:11881042026-01-11T00:02:56Z2026-01-11T00:02:56Zby Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583170">http://www.sciencedirect.com/science/book/9781555583170</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583170">https://www.sciencedirect.com/science/book/9781555583170</a><br/>Format: Electronic Resources<br/>E-com : elektronik ticaretle gelen müthiş değişım : e-business uygulamaları iş dünyasında neleri değiştirecek?ent://SD_ILS/0/SD_ILS:6777042026-01-11T00:02:56Z2026-01-11T00:02:56Zby IBM.<br/>Format: Books<br/>Security-Aware Design for Cyber-Physical Systems A Platform-Based Approachent://SD_ILS/0/SD_ILS:4809682026-01-11T00:02:56Z2026-01-11T00:02:56Zby Lin, Chung-Wei. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-51328-7">http://dx.doi.org/10.1007/978-3-319-51328-7</a><br/>Format: Electronic Resources<br/>The basics of IT audit : purposes, processes, and practical informationent://SD_ILS/0/SD_ILS:10227292026-01-11T00:02:56Z2026-01-11T00:02:56Zby Gantz, Stephen D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1550527">Click to View</a><br/>Format: Electronic Resources<br/>Securing the cloud : cloud computer security techniques and tacticsent://SD_ILS/0/SD_ILS:11837432026-01-11T00:02:56Z2026-01-11T00:02:56Zby Winkler, J. R. (Joachim R.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format: Electronic Resources<br/>Seven deadliest wireless technologies attacksent://SD_ILS/0/SD_ILS:11780192026-01-11T00:02:56Z2026-01-11T00:02:56Zby Haines, Brad.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495417">https://www.sciencedirect.com/science/book/9781597495417</a><br/>Format: Electronic Resources<br/>Seven deadliest USB attacksent://SD_ILS/0/SD_ILS:11780202026-01-11T00:02:56Z2026-01-11T00:02:56Zby Anderson, Brian (Brian James)<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495530">https://www.sciencedirect.com/science/book/9781597495530</a><br/>Format: Electronic Resources<br/>Seven deadliest social network attacksent://SD_ILS/0/SD_ILS:11780312026-01-11T00:02:56Z2026-01-11T00:02:56Zby Timm, Carl.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495455">https://www.sciencedirect.com/science/book/9781597495455</a><br/>Format: Electronic Resources<br/>Zero day exploit : countdown to darknessent://SD_ILS/0/SD_ILS:11884892026-01-11T00:02:56Z2026-01-11T00:02:56Zby Shein, Rob.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836098">http://www.sciencedirect.com/science/book/9781931836098</a><br/>Format: Electronic Resources<br/>Internet security : a jumpstart for systems administrators and IT managersent://SD_ILS/0/SD_ILS:11880902026-01-11T00:02:56Z2026-01-11T00:02:56Zby Speed, Tim.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582982">http://www.sciencedirect.com/science/book/9781555582982</a><br/>Format: Electronic Resources<br/>Cybersecurity operations handbookent://SD_ILS/0/SD_ILS:11880952026-01-11T00:02:56Z2026-01-11T00:02:56Zby Rittinghouse, John W.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583064">https://www.sciencedirect.com/science/book/9781555583064</a><br/>Format: Electronic Resources<br/>Snort 2.0 intrusion detectionent://SD_ILS/0/SD_ILS:11883872026-01-11T00:02:56Z2026-01-11T00:02:56Zby Beale, Jay.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836746">http://www.sciencedirect.com/science/book/9781931836746</a><br/>Format: Electronic Resources<br/>Hack proofing ColdFusionent://SD_ILS/0/SD_ILS:11883582026-01-11T00:02:56Z2026-01-11T00:02:56Zby Meyer, Greg.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994770">http://www.sciencedirect.com/science/book/9781928994770</a><br/>Format: Electronic Resources<br/>Hack proofing your Web applicationsent://SD_ILS/0/SD_ILS:11883432026-01-11T00:02:56Z2026-01-11T00:02:56Zby Traxler, Julie.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994312">https://www.sciencedirect.com/science/book/9781928994312</a><br/>Format: Electronic Resources<br/>Hack proofing Sun Solaris 8ent://SD_ILS/0/SD_ILS:11884852026-01-11T00:02:56Z2026-01-11T00:02:56Zby Miles, Wyman.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994442">http://www.sciencedirect.com/science/book/9781928994442</a><br/>Format: Electronic Resources<br/>Securing the cloud cloud computer security techniques and tacticsent://SD_ILS/0/SD_ILS:1372012026-01-11T00:02:56Z2026-01-11T00:02:56Zby Winkler, J. R. (Joachim R.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format: Electronic Resources<br/>Microsoft forefront security administration guideent://SD_ILS/0/SD_ILS:11891202026-01-11T00:02:56Z2026-01-11T00:02:56Zby Varsalone, Jesse.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492447">https://www.sciencedirect.com/science/book/9781597492447</a><br/>Format: Electronic Resources<br/>Techno security's guide to e-discovery and digital forensicsent://SD_ILS/0/SD_ILS:11891132026-01-11T00:02:56Z2026-01-11T00:02:56Zby Wiles, Jack.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492232">http://www.sciencedirect.com/science/book/9781597492232</a><br/>Format: Electronic Resources<br/>Securing IM and P2P applications for the enterpriseent://SD_ILS/0/SD_ILS:11842632026-01-11T00:02:56Z2026-01-11T00:02:56Zby Piccard, Paul L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490177">http://www.sciencedirect.com/science/book/9781597490177</a>
ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499965">http://www.sciencedirect.com/science/book/9781597499965</a><br/>Format: Electronic Resources<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:11882482026-01-11T00:02:56Z2026-01-11T00:02:56Zby Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490214">https://www.sciencedirect.com/science/book/9781597490214</a><br/>Format: Electronic Resources<br/>Implementing homeland security for enterprise ITent://SD_ILS/0/SD_ILS:11880992026-01-11T00:02:56Z2026-01-11T00:02:56Zby Erbschloe, Michael.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">http://www.sciencedirect.com/science/book/9781555583125</a><br/>Format: Electronic Resources<br/>Cyber adversary characterization : auditing the hacker mindent://SD_ILS/0/SD_ILS:11883692026-01-11T00:02:56Z2026-01-11T00:02:56Zby Parker, Tom.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836111">http://www.sciencedirect.com/science/book/9781931836111</a><br/>Format: Electronic Resources<br/>Configuring Symantec Antivirus, Corporate Editionent://SD_ILS/0/SD_ILS:11883892026-01-11T00:02:56Z2026-01-11T00:02:56Zby Hunter, Laura E.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836814">http://www.sciencedirect.com/science/book/9781931836814</a><br/>Format: Electronic Resources<br/>Scene of the cybercrime : computer forensics handbookent://SD_ILS/0/SD_ILS:11884942026-01-11T00:02:56Z2026-01-11T00:02:56Zby Shinder, Debra Littlejohn, author.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836654">https://www.sciencedirect.com/science/book/9781931836654</a><br/>Format: Electronic Resources<br/>Hack proofing Windows 2000ent://SD_ILS/0/SD_ILS:11883812026-01-11T00:02:56Z2026-01-11T00:02:56Zby Todd, Chad.<br/><a href="http://www.sciencedirect.com/science/book/9781931836494">Available from ScienceDirect. Online version available for university members only. This requires an institutional login off-campus</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836494">https://www.sciencedirect.com/science/book/9781931836494</a><br/>Format: Electronic Resources<br/>Dissecting the hack : the forb1dd3n networkent://SD_ILS/0/SD_ILS:11813792026-01-11T00:02:56Z2026-01-11T00:02:56Zby Street, Jayson E.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495684">https://www.sciencedirect.com/science/book/9781597495684</a><br/>Format: Electronic Resources<br/>Google hacking for penetration testers. Volume 2ent://SD_ILS/0/SD_ILS:11891022026-01-11T00:02:56Z2026-01-11T00:02:56Zby Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491761">https://www.sciencedirect.com/science/book/9781597491761</a><br/>Format: Electronic Resources<br/>Practical embedded security : building secure resource-constrained systemsent://SD_ILS/0/SD_ILS:11891682026-01-11T00:02:56Z2026-01-11T00:02:56Zby Stapko, Timothy John.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780750682152">https://www.sciencedirect.com/science/book/9780750682152</a><br/>Format: Electronic Resources<br/>Securing Windows server 2008 : prevent attacks from outside and inside your organization.ent://SD_ILS/0/SD_ILS:11896212026-01-11T00:02:56Z2026-01-11T00:02:56ZScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492805">https://www.sciencedirect.com/science/book/9781597492805</a><br/>Format: Electronic Resources<br/>Scene of the cybercrime.ent://SD_ILS/0/SD_ILS:11896652026-01-11T00:02:56Z2026-01-11T00:02:56Zby Cross, Michael, 1965-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492768">https://www.sciencedirect.com/science/book/9781597492768</a><br/>Format: Electronic Resources<br/>Syngress force emerging threat analysis : from mischief to maliciousent://SD_ILS/0/SD_ILS:11863392026-01-11T00:02:56Z2026-01-11T00:02:56Zby Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">http://www.sciencedirect.com/science/book/9781597490566</a><br/>Format: Electronic Resources<br/>OSSEC host-based intrusion detection guideent://SD_ILS/0/SD_ILS:11896202026-01-11T00:02:56Z2026-01-11T00:02:56Zby Hay, Andrew.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492409">http://www.sciencedirect.com/science/book/9781597492409</a><br/>Format: Electronic Resources<br/>Techno Security's guide to managing risks : for IT managers, auditors, and investigatorsent://SD_ILS/0/SD_ILS:11882802026-01-11T00:02:56Z2026-01-11T00:02:56Zby Wiles, Jack.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">http://www.sciencedirect.com/science/book/9781597491389</a><br/>Format: Electronic Resources<br/>Investigative computer forensics the practical guide for lawyers, accountants, investigators, and business executivesent://SD_ILS/0/SD_ILS:9864922026-01-11T00:02:56Z2026-01-11T00:02:56Zby Laykin, Erik.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=817953">Click to View</a><br/>Format: Electronic Resources<br/>Seven deadliest Microsoft attacksent://SD_ILS/0/SD_ILS:11774792026-01-11T00:02:56Z2026-01-11T00:02:56Zby Kraus, Rob.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495516">https://www.sciencedirect.com/science/book/9781597495516</a><br/>Format: Electronic Resources<br/>Stealing the network : how to own the boxent://SD_ILS/0/SD_ILS:11883912026-01-11T00:02:56Z2026-01-11T00:02:56Zby Russell, Ryan, 1969-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836876">https://www.sciencedirect.com/science/book/9781931836876</a><br/>Format: Electronic Resources<br/>Computer Communication, Networking and Internet Security Proceedings of IC3T 2016ent://SD_ILS/0/SD_ILS:4817142026-01-11T00:02:56Z2026-01-11T00:02:56Zby Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3226-4">http://dx.doi.org/10.1007/978-981-10-3226-4</a><br/>Format: Electronic Resources<br/>Multimedia security technologies for digital rights managementent://SD_ILS/0/SD_ILS:11869942026-01-11T00:02:56Z2026-01-11T00:02:56Zby Zeng, Wenjun, 1967-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123694768">http://www.sciencedirect.com/science/book/9780123694768</a><br/>Format: Electronic Resources<br/>Computer securityent://SD_ILS/0/SD_ILS:11759622026-01-11T00:02:56Z2026-01-11T00:02:56Zby Carroll, John M. (John Millar), 1925-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780409900323">https://www.sciencedirect.com/science/book/9780409900323</a><br/>Format: Electronic Resources<br/>