Search Results for Computer security. - Narrowed by: 2004SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092004$0025092004$0026ps$003d300?dt=list2025-12-30T19:38:13ZComputer security : art and scienceent://SD_ILS/0/SD_ILS:645062025-12-30T19:38:13Z2025-12-30T19:38:13Zby Bishop, Matt (Matthew A.)<br/>Format: Books<br/>Defense and detection strategies against Internet wormsent://SD_ILS/0/SD_ILS:9310192025-12-30T19:38:13Z2025-12-30T19:38:13Zby Nazario, Jose.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227660">Click to View</a><br/>Format: Electronic Resources<br/>Privacy protection and computer forensicsent://SD_ILS/0/SD_ILS:9310512025-12-30T19:38:13Z2025-12-30T19:38:13Zby Caloyannides, Michael A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227692">Click to View</a><br/>Format: Electronic Resources<br/>Bluetooth securityent://SD_ILS/0/SD_ILS:9310092025-12-30T19:38:13Z2025-12-30T19:38:13Zby Gehrmann, Christian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227650">Click to View</a><br/>Format: Electronic Resources<br/>Outsourcing information securityent://SD_ILS/0/SD_ILS:9310182025-12-30T19:38:13Z2025-12-30T19:38:13Zby Axelrod, C. Warren.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227659">Click to View</a><br/>Format: Electronic Resources<br/>Cyber adversary characterization auditing the hacker mindent://SD_ILS/0/SD_ILS:9394692025-12-30T19:38:13Z2025-12-30T19:38:13Zby Parker, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294071">Click to View</a><br/>Format: Electronic Resources<br/>How to cheat at Configuring ISA Server 2004ent://SD_ILS/0/SD_ILS:9338772025-12-30T19:38:13Z2025-12-30T19:38:13Zby Shinder, Dr. Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254853">Click to View</a><br/>Format: Electronic Resources<br/>Hacking the code ASP. NET web application securityent://SD_ILS/0/SD_ILS:9395062025-12-30T19:38:13Z2025-12-30T19:38:13Zby Burnett, Mark (Mark M.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294160">Click to View</a><br/>Format: Electronic Resources<br/>Security sage's guide to hardening the network infrastructureent://SD_ILS/0/SD_ILS:9395712025-12-30T19:38:13Z2025-12-30T19:38:13Zby Andrés, Steven.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294359">Click to View</a><br/>Format: Electronic Resources<br/>Network security foundationsent://SD_ILS/0/SD_ILS:9350402025-12-30T19:38:13Z2025-12-30T19:38:13Zby Strebe, Matthew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=267332">Click to View</a><br/>Format: Electronic Resources<br/>Innocent code a security wake-up call for Web programmersent://SD_ILS/0/SD_ILS:9294742025-12-30T19:38:13Z2025-12-30T19:38:13Zby Huseby, Sverre H.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=210558">Click to View</a><br/>Format: Electronic Resources<br/>Stealing the network how to own a continentent://SD_ILS/0/SD_ILS:9395802025-12-30T19:38:13Z2025-12-30T19:38:13Zby Rogers, Russ.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294377">Click to View</a><br/>Format: Electronic Resources<br/>MCSE designing security for a Windows Server 2003 network : exam 70-298 study guide & DVD training systement://SD_ILS/0/SD_ILS:9395332025-12-30T19:38:13Z2025-12-30T19:38:13Zby Khnaser, Elias N.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294253">Click to View</a><br/>Format: Electronic Resources<br/>Wireless operational securityent://SD_ILS/0/SD_ILS:11881042025-12-30T19:38:13Z2025-12-30T19:38:13Zby Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583170">http://www.sciencedirect.com/science/book/9781555583170</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583170">https://www.sciencedirect.com/science/book/9781555583170</a><br/>Format: Electronic Resources<br/>Implementing homeland security for enterprise ITent://SD_ILS/0/SD_ILS:11880992025-12-30T19:38:13Z2025-12-30T19:38:13Zby Erbschloe, Michael.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">http://www.sciencedirect.com/science/book/9781555583125</a><br/>Format: Electronic Resources<br/>Cyber adversary characterization : auditing the hacker mindent://SD_ILS/0/SD_ILS:11883692025-12-30T19:38:13Z2025-12-30T19:38:13Zby Parker, Tom.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836111">http://www.sciencedirect.com/science/book/9781931836111</a><br/>Format: Electronic Resources<br/>Stealing the network : how to own a continentent://SD_ILS/0/SD_ILS:11883672025-12-30T19:38:13Z2025-12-30T19:38:13Zby 131ah.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836050">http://www.sciencedirect.com/science/book/9781931836050</a><br/>Format: Electronic Resources<br/>Zero day exploit : countdown to darknessent://SD_ILS/0/SD_ILS:11884892025-12-30T19:38:13Z2025-12-30T19:38:13Zby Shein, Rob.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836098">http://www.sciencedirect.com/science/book/9781931836098</a><br/>Format: Electronic Resources<br/>Ethereal packet sniffingent://SD_ILS/0/SD_ILS:9394852025-12-30T19:38:13Z2025-12-30T19:38:13Zby Orebaugh, Angela.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294122">Click to View</a><br/>Format: Electronic Resources<br/>Snort 2.1 intrusion detectionent://SD_ILS/0/SD_ILS:11883662025-12-30T19:38:13Z2025-12-30T19:38:13Zby Beale, Jay.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836043">https://www.sciencedirect.com/science/book/9781931836043</a><br/>Format: Electronic Resources<br/>İnternette güvenlik ve Hacker Cracker meselesi : el kitabıent://SD_ILS/0/SD_ILS:700052025-12-30T19:38:13Z2025-12-30T19:38:13Zby Güven, Mehmet<br/>Format: Books<br/>Click, click, who's there? a family-based non-technical approach to help parents protect their children onlineent://SD_ILS/0/SD_ILS:9452752025-12-30T19:38:13Z2025-12-30T19:38:13Zby Koh.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338852">Click to View</a><br/>Format: Electronic Resources<br/>Microsoft Windows güvenliği windows XP ve windows 2000 içinent://SD_ILS/0/SD_ILS:11656552025-12-30T19:38:13Z2025-12-30T19:38:13Zby Bott, Ed.<br/>Format: Books<br/>Implementing PKI Services on z/OSent://SD_ILS/0/SD_ILS:10755722025-12-30T19:38:13Z2025-12-30T19:38:13Zby Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306877">Click to View</a><br/>Format: Electronic Resources<br/>Programmer's ultimate security deskrefent://SD_ILS/0/SD_ILS:11884092025-12-30T19:38:13Z2025-12-30T19:38:13Zby Foster, James C.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781932266726">https://www.sciencedirect.com/science/book/9781932266726</a><br/>Format: Electronic Resources<br/>Check Point Next Generation with application intelligence security administrationent://SD_ILS/0/SD_ILS:11884142025-12-30T19:38:13Z2025-12-30T19:38:13Zby Tobkin, Chris.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781932266894">https://www.sciencedirect.com/science/book/9781932266894</a><br/>Format: Electronic Resources<br/>Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionalsent://SD_ILS/0/SD_ILS:11882422025-12-30T19:38:13Z2025-12-30T19:38:13Zby Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490054">http://www.sciencedirect.com/science/book/9781597490054</a><br/>Format: Electronic Resources<br/>A practical guide to managing information securityent://SD_ILS/0/SD_ILS:9312912025-12-30T19:38:13Z2025-12-30T19:38:13Zby Purser, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=231645">Click to View</a><br/>Format: Electronic Resources<br/>Security assessment : case studies for implementing the NSA IAMent://SD_ILS/0/SD_ILS:11884162025-12-30T19:38:13Z2025-12-30T19:38:13Zby Rogers, Russ.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266962">http://www.sciencedirect.com/science/book/9781932266962</a><br/>Format: Electronic Resources<br/>WarDriving drive, detect, defend: a guide to wireless securityent://SD_ILS/0/SD_ILS:9396002025-12-30T19:38:13Z2025-12-30T19:38:13Zby Hurley, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294441">Click to View</a><br/>Format: Electronic Resources<br/>Programmer's ultimate security deskrefent://SD_ILS/0/SD_ILS:9395592025-12-30T19:38:13Z2025-12-30T19:38:13Zby Foster, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294328">Click to View</a><br/>Format: Electronic Resources<br/>Internet applications the emerging global computer.ent://SD_ILS/0/SD_ILS:10920462025-12-30T19:38:13Z2025-12-30T19:38:13Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411450">Click to View</a><br/>Format: Electronic Resources<br/>Implementing SSH strategies for optimizing the Secure Shellent://SD_ILS/0/SD_ILS:9297212025-12-30T19:38:13Z2025-12-30T19:38:13Zby Dwivedi, Himanshu.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=215119">Click to View</a><br/>Format: Electronic Resources<br/>Security sage's guide to hardening the network infrastructureent://SD_ILS/0/SD_ILS:11883642025-12-30T19:38:13Z2025-12-30T19:38:13Zby Andrés, Steven.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836012">https://www.sciencedirect.com/science/book/9781931836012</a><br/>Format: Electronic Resources<br/>Ethereal : packet sniffingent://SD_ILS/0/SD_ILS:11884112025-12-30T19:38:13Z2025-12-30T19:38:13Zby Orebaugh, Angela.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266825">http://www.sciencedirect.com/science/book/9781932266825</a><br/>Format: Electronic Resources<br/>Managing and securing a Cisco structured wireless-aware networkent://SD_ILS/0/SD_ILS:11884152025-12-30T19:38:13Z2025-12-30T19:38:13Zby Wall, David.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781932266917">https://www.sciencedirect.com/science/book/9781932266917</a><br/>Format: Electronic Resources<br/>Nessus network auditingent://SD_ILS/0/SD_ILS:9395402025-12-30T19:38:13Z2025-12-30T19:38:13Zby Beale, Jay.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294281">Click to View</a><br/>Format: Electronic Resources<br/>Virtual private networking a construction, operation and utilization guideent://SD_ILS/0/SD_ILS:9587982025-12-30T19:38:13Z2025-12-30T19:38:13Zby Held, Gilbert, 1943-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=470565">Click to View</a><br/>Format: Electronic Resources<br/>zSeries Trusted Key Entry (TKE) version 4.2 updateent://SD_ILS/0/SD_ILS:10753712025-12-30T19:38:13Z2025-12-30T19:38:13Zby Kappeler, Patrick.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306676">Click to View</a><br/>Format: Electronic Resources<br/>IBM eserver zSeries 990 (z990) cryptography implementationent://SD_ILS/0/SD_ILS:10754862025-12-30T19:38:13Z2025-12-30T19:38:13Zby Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306791">Click to View</a><br/>Format: Electronic Resources<br/>Linux on IBM e-server zSeries and S/390 best security practicesent://SD_ILS/0/SD_ILS:10755302025-12-30T19:38:13Z2025-12-30T19:38:13Zby Geiselhart, Gregory.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306835">Click to View</a><br/>Format: Electronic Resources<br/>Lotus security handbookent://SD_ILS/0/SD_ILS:10755332025-12-30T19:38:13Z2025-12-30T19:38:13Zby Tworek, William.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306838">Click to View</a><br/>Format: Electronic Resources<br/>Network and security issues for internet mobile entertainmentent://SD_ILS/0/SD_ILS:9385962025-12-30T19:38:13Z2025-12-30T19:38:13Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=289848">Click to View</a><br/>Format: Electronic Resources<br/>Dijital kaleent://SD_ILS/0/SD_ILS:570962025-12-30T19:38:13Z2025-12-30T19:38:13Zby Brown, Dan<br/>Format: Books<br/>Digital fortressent://SD_ILS/0/SD_ILS:825612025-12-30T19:38:13Z2025-12-30T19:38:13Zby Brown, Dan<br/>Format: Books<br/>Digital fortressent://SD_ILS/0/SD_ILS:11598212025-12-30T19:38:13Z2025-12-30T19:38:13Zby Brown, Dan.<br/>Format: Books<br/>Degunking your email, snam, and virusesent://SD_ILS/0/SD_ILS:10874312025-12-30T19:38:13Z2025-12-30T19:38:13Zby Duntemann, Jeff.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3384731">Click to View</a><br/>Format: Electronic Resources<br/>Integrated identity management using IBM Tivoli security solutionsent://SD_ILS/0/SD_ILS:10750522025-12-30T19:38:13Z2025-12-30T19:38:13Zby Bücker, Axel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306357">Click to View</a><br/>Format: Electronic Resources<br/>iSeries Access for Windows V5R2 hot topics tailored images, application administration, SSL, and Kerberosent://SD_ILS/0/SD_ILS:10753942025-12-30T19:38:13Z2025-12-30T19:38:13Zby Schulz, Jeremy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306699">Click to View</a><br/>Format: Electronic Resources<br/>Intelligent watermarking techniquesent://SD_ILS/0/SD_ILS:9312692025-12-30T19:38:13Z2025-12-30T19:38:13Zby Pan, Jeng-Shyang.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=231561">Click to View</a><br/>Format: Electronic Resources<br/>Control and security of E-commerceent://SD_ILS/0/SD_ILS:9586772025-12-30T19:38:13Z2025-12-30T19:38:13Zby Smith, Gordon E. (Gordon Edward)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=469918">Click to View</a><br/>Format: Electronic Resources<br/>The disaster recovery handbook a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assetsent://SD_ILS/0/SD_ILS:10546192025-12-30T19:38:13Z2025-12-30T19:38:13Zby Wallace, Michael, 1960-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3001767">Click to View</a><br/>Format: Electronic Resources<br/>Protecting your library's digital sources the essential guide to planning and preservationent://SD_ILS/0/SD_ILS:9300962025-12-30T19:38:13Z2025-12-30T19:38:13Zby Kahn, Miriam (Miriam B.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=218937">Click to View</a><br/>Format: Electronic Resources<br/>WarDriving : drive, detect, defend : a guide to wireless securityent://SD_ILS/0/SD_ILS:11883652025-12-30T19:38:13Z2025-12-30T19:38:13Zby Hurley, Chris.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836036">https://www.sciencedirect.com/science/book/9781931836036</a><br/>Format: Electronic Resources<br/>CYA : securing Exchange Server 2003 and Outlook Web Access : cover your a** by getting it right the first timeent://SD_ILS/0/SD_ILS:11883722025-12-30T19:38:13Z2025-12-30T19:38:13Zby Walther, Henrik.<br/><a href="http://www.sciencedirect.com/science/book/9781931836258">Available from ScienceDirect. Online version available for university members only. This requires an institutional login off-campus</a>
ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836241">http://www.sciencedirect.com/science/book/9781931836241</a><br/>Format: Electronic Resources<br/>Policy-based network management : solutions for the next generationent://SD_ILS/0/SD_ILS:11881952025-12-30T19:38:13Z2025-12-30T19:38:13Zby Strassner, John.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558608597">http://www.sciencedirect.com/science/book/9781558608597</a><br/>Format: Electronic Resources<br/>CYA : securing IIS 6.0 : cover your a** by getting it right the first timeent://SD_ILS/0/SD_ILS:11883732025-12-30T19:38:13Z2025-12-30T19:38:13Zby Cheah, Chun Hai.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836258">http://www.sciencedirect.com/science/book/9781931836258</a><br/>Format: Electronic Resources<br/>Windows Server 2003 security infrastructuresent://SD_ILS/0/SD_ILS:11880842025-12-30T19:38:13Z2025-12-30T19:38:13Zby Clercq, Jan de, 1968-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582838">http://www.sciencedirect.com/science/book/9781555582838</a><br/>Format: Electronic Resources<br/>HP Nonstop server security : a practical handbookent://SD_ILS/0/SD_ILS:11881012025-12-30T19:38:13Z2025-12-30T19:38:13Zby Hill, Terri.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583149">http://www.sciencedirect.com/science/book/9781555583149</a><br/>Format: Electronic Resources<br/>Hacking the code : ASP.NET web application securityent://SD_ILS/0/SD_ILS:11884062025-12-30T19:38:13Z2025-12-30T19:38:13Zby Burnett, Mark (Mark M.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266658">http://www.sciencedirect.com/science/book/9781932266658</a><br/>Format: Electronic Resources<br/>Information securityent://SD_ILS/0/SD_ILS:11853992025-12-30T19:38:13Z2025-12-30T19:38:13Zby Zelkowitz, Marvin V., 1945-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780120121601">https://www.sciencedirect.com/science/book/9780120121601</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/bookseries/00652458/60">https://www.sciencedirect.com/science/bookseries/00652458/60</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/publication?issn=00652458&volume=60">https://www.sciencedirect.com/science/publication?issn=00652458&volume=60</a><br/>Format: Electronic Resources<br/>Architectural issuesent://SD_ILS/0/SD_ILS:11867222025-12-30T19:38:13Z2025-12-30T19:38:13Zby Zelkowitz, Marvin V., 1945-<br/><a href="http://www.sciencedirect.com/science/bookseries/00652458/61">to access electronic resource</a>
ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780120121618">http://www.sciencedirect.com/science/book/9780120121618</a><br/>Format: Electronic Resources<br/>Best damn Windows server 2003 book periodent://SD_ILS/0/SD_ILS:11883702025-12-30T19:38:13Z2025-12-30T19:38:13Zby Snedaker, Susan.<br/>MacEwan University Access <a href="http://www.sciencedirect.com/science/book/9781931836128">(Unlimited Concurrent Users)</a> from ScienceDirect
ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836128">https://www.sciencedirect.com/science/book/9781931836128</a><br/>Format: Electronic Resources<br/>Deploying Citrix MetaFrame presentation server 3.0 with Windows server 2003 terminal servicesent://SD_ILS/0/SD_ILS:11884012025-12-30T19:38:13Z2025-12-30T19:38:13Zby Wilson, Concepción S. (Concepción Shimizu), 1940-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266504">http://www.sciencedirect.com/science/book/9781932266504</a><br/>Format: Electronic Resources<br/>