Search Results for Computer security. - Narrowed by: 2007SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092007$0025092007$0026ps$003d300?dt=list2026-01-01T01:01:21ZInformation management & computer security. Volume 15, Number 5, Papers from the HAISA 2007 Symposiument://SD_ILS/0/SD_ILS:9441192026-01-01T01:01:21Z2026-01-01T01:01:21Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328737">Click to View</a><br/>Format: Electronic Resources<br/>Physics and theoretical computer science from numbers and languages to (quantum) cryptography securityent://SD_ILS/0/SD_ILS:9406992026-01-01T01:01:21Z2026-01-01T01:01:21Zby Gazeau, Jean-Pierre.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=305174">Click to View</a><br/>Format: Electronic Resources<br/>Security in distributed and networking systemsent://SD_ILS/0/SD_ILS:10138972026-01-01T01:01:21Z2026-01-01T01:01:21Zby Pan, Yi, 1960-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1193126">Click to View</a><br/>Format: Electronic Resources<br/>Best damn firewall book periodent://SD_ILS/0/SD_ILS:9442602026-01-01T01:01:21Z2026-01-01T01:01:21Zby Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=330100">Click to View</a><br/>Format: Electronic Resources<br/>The misuse of information systems the impact of security countermeasuresent://SD_ILS/0/SD_ILS:10580442026-01-01T01:01:21Z2026-01-01T01:01:21Zby D'Arcy, John P., 1975-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3016826">Click to View</a><br/>Format: Electronic Resources<br/>Techno Security's guide to managing risks : for IT managers, auditors, and investigatorsent://SD_ILS/0/SD_ILS:11882802026-01-01T01:01:21Z2026-01-01T01:01:21Zby Wiles, Jack.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">http://www.sciencedirect.com/science/book/9781597491389</a><br/>Format: Electronic Resources<br/>Network security assessment from vulnerability to patchent://SD_ILS/0/SD_ILS:9370382026-01-01T01:01:21Z2026-01-01T01:01:21Zby Manzuik, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=280219">Click to View</a><br/>Format: Electronic Resources<br/>Toward a safer and more secure cyberspaceent://SD_ILS/0/SD_ILS:10854522026-01-01T01:01:21Z2026-01-01T01:01:21Zby Goodman, Seymour E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3378311">Click to View</a><br/>Format: Electronic Resources<br/>Configuring Juniper Networks NetScreen & SSG firewallsent://SD_ILS/0/SD_ILS:11864282026-01-01T01:01:21Z2026-01-01T01:01:21Zby Cameron, Rob.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491181">http://www.sciencedirect.com/science/book/9781597491181</a><br/>Format: Electronic Resources<br/>Developer's guide to web application securityent://SD_ILS/0/SD_ILS:9385212026-01-01T01:01:21Z2026-01-01T01:01:21Zby Cross, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=289735">Click to View</a><br/>Format: Electronic Resources<br/>Security data visualization graphical techniques for network analysisent://SD_ILS/0/SD_ILS:10584542026-01-01T01:01:21Z2026-01-01T01:01:21Zby Conti, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3017625">Click to View</a><br/>Format: Electronic Resources<br/>Botnets : the killer web appent://SD_ILS/0/SD_ILS:11864442026-01-01T01:01:21Z2026-01-01T01:01:21Zby Schiller, Craig A.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491358">https://www.sciencedirect.com/science/book/9781597491358</a><br/>Format: Electronic Resources<br/>Developer's guide to web application securityent://SD_ILS/0/SD_ILS:11863712026-01-01T01:01:21Z2026-01-01T01:01:21Zby Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format: Electronic Resources<br/>Network security assessment : from vulnerability to patchent://SD_ILS/0/SD_ILS:11882732026-01-01T01:01:21Z2026-01-01T01:01:21Zby Manzuik, Steve.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491013">http://www.sciencedirect.com/science/book/9781597491013</a><br/>Format: Electronic Resources<br/>How to cheat at securing your networkent://SD_ILS/0/SD_ILS:11899832026-01-01T01:01:21Z2026-01-01T01:01:21Zby Dubrawsky, Ido.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492317">https://www.sciencedirect.com/science/book/9781597492317</a><br/>Format: Electronic Resources<br/>Snort : IDS and IPS toolkitent://SD_ILS/0/SD_ILS:11882712026-01-01T01:01:21Z2026-01-01T01:01:21Zby Beale, Jay.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490993">https://www.sciencedirect.com/science/book/9781597490993</a><br/>Format: Electronic Resources<br/>AVIEN malware defense guide for the Enterpriseent://SD_ILS/0/SD_ILS:11891042026-01-01T01:01:21Z2026-01-01T01:01:21Zby Harley, David.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491648">https://www.sciencedirect.com/science/book/9781597491648</a><br/>Format: Electronic Resources<br/>Microsoft windows security fundamentalsent://SD_ILS/0/SD_ILS:9396472026-01-01T01:01:21Z2026-01-01T01:01:21Zby Clercq, Jan de, 1968-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294637">Click to View</a><br/>Format: Electronic Resources<br/>Microsoft Vista for IT security professionalsent://SD_ILS/0/SD_ILS:9440752026-01-01T01:01:21Z2026-01-01T01:01:21Zby Piltzecker, Tony, 1975-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328623">Click to View</a><br/>Format: Electronic Resources<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:9442822026-01-01T01:01:21Z2026-01-01T01:01:21Zby Winkler, Ira.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=330200">Click to View</a><br/>Format: Electronic Resources<br/>Papers from the first European workshop on technological & security issues in digital rights management (EuDiRights)ent://SD_ILS/0/SD_ILS:9391602026-01-01T01:01:21Z2026-01-01T01:01:21Zby Yagüe, Mariemma.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=291585">Click to View</a><br/>Format: Electronic Resources<br/>The CEH prep guide the comprehensive guide to certified ethical hackingent://SD_ILS/0/SD_ILS:9427542026-01-01T01:01:21Z2026-01-01T01:01:21Zby Krutz, Ronald L., 1938-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=315200">Click to View</a><br/>Format: Electronic Resources<br/>A process for developing a common vocabulary in the information security areaent://SD_ILS/0/SD_ILS:9434782026-01-01T01:01:21Z2026-01-01T01:01:21Zby NATO Advanced Research Workshop on a Process for Developing a Common Vocabulary in the Information Security Area (2006 : Moscow, Russia)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=320313">Click to View</a><br/>Format: Electronic Resources<br/>Metasploit toolkit for penetration testing, exploit development, and vulnerability researchent://SD_ILS/0/SD_ILS:11863732026-01-01T01:01:21Z2026-01-01T01:01:21Zby Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">http://www.sciencedirect.com/science/book/9781597490740</a><br/>Format: Electronic Resources<br/>Microsoft Vista for IT security professionalsent://SD_ILS/0/SD_ILS:11864532026-01-01T01:01:21Z2026-01-01T01:01:21Zby Piltzecker, Tony, 1975-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491396">http://www.sciencedirect.com/science/book/9781597491396</a><br/>Format: Electronic Resources<br/>Microsoft windows security fundamentalsent://SD_ILS/0/SD_ILS:11857032026-01-01T01:01:21Z2026-01-01T01:01:21Zby Clercq, Jan de, 1968-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583408">https://www.sciencedirect.com/science/book/9781555583408</a><br/>Format: Electronic Resources<br/>Open source fuzzing tools.ent://SD_ILS/0/SD_ILS:11864742026-01-01T01:01:21Z2026-01-01T01:01:21Zby Rathaus, Noam.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491952">http://www.sciencedirect.com/science/book/9781597491952</a><br/>Format: Electronic Resources<br/>FISMA certification & accreditation handbookent://SD_ILS/0/SD_ILS:11882772026-01-01T01:01:21Z2026-01-01T01:01:21Zby Taylor, Laura.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">http://www.sciencedirect.com/science/book/9781597491167</a><br/>Format: Electronic Resources<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:11864602026-01-01T01:01:21Z2026-01-01T01:01:21Zby Winkler, Ira.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491686">https://www.sciencedirect.com/science/book/9781597491686</a><br/>Format: Electronic Resources<br/>Security+ study guide & DVD training systement://SD_ILS/0/SD_ILS:11864622026-01-01T01:01:21Z2026-01-01T01:01:21Zby Cross, Michael, 1965-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491532">https://www.sciencedirect.com/science/book/9781597491532</a><br/>Format: Electronic Resources<br/>Best damn firewall book periodent://SD_ILS/0/SD_ILS:11891152026-01-01T01:01:21Z2026-01-01T01:01:21Zby Behrens, Thorsten.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492188">https://www.sciencedirect.com/science/book/9781597492188</a><br/>Format: Electronic Resources<br/>The best damn IT security management book periodent://SD_ILS/0/SD_ILS:11892392026-01-01T01:01:21Z2026-01-01T01:01:21Zby Susan Snedaker.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492270">http://www.sciencedirect.com/science/book/9781597492270</a><br/>Format: Electronic Resources<br/>Integrated security systems design concepts, specifications, and implementationent://SD_ILS/0/SD_ILS:9382982026-01-01T01:01:21Z2026-01-01T01:01:21Zby Norman, Thomas L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=287955">Click to View</a><br/>Format: Electronic Resources<br/>How to cheat at configuring Open Source security toolsent://SD_ILS/0/SD_ILS:11864652026-01-01T01:01:21Z2026-01-01T01:01:21Zby Alder, Raven.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491709">http://www.sciencedirect.com/science/book/9781597491709</a><br/>Format: Electronic Resources<br/>Integrated security systems design : concepts, specifications, and implementationent://SD_ILS/0/SD_ILS:11879972026-01-01T01:01:21Z2026-01-01T01:01:21Zby Norman, Thomas L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679091">http://www.sciencedirect.com/science/book/9780750679091</a><br/>Format: Electronic Resources<br/>Security convergence managing enterprise security riskent://SD_ILS/0/SD_ILS:9404342026-01-01T01:01:21Z2026-01-01T01:01:21Zby Tyson, Dave.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=299507">Click to View</a><br/>Format: Electronic Resources<br/>Linux firewalls attack detection and response with iptables, psad, and fwsnortent://SD_ILS/0/SD_ILS:10584532026-01-01T01:01:21Z2026-01-01T01:01:21Zby Rash, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3017624">Click to View</a><br/>Format: Electronic Resources<br/>Software system reliability and securityent://SD_ILS/0/SD_ILS:9407012026-01-01T01:01:21Z2026-01-01T01:01:21Zby Broy, M., 1949-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=305176">Click to View</a><br/>Format: Electronic Resources<br/>How to cheat at securing SQL server 2005.ent://SD_ILS/0/SD_ILS:11864752026-01-01T01:01:21Z2026-01-01T01:01:21ZScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491969">http://www.sciencedirect.com/science/book/9781597491969</a><br/>Format: Electronic Resources<br/>Asterisk hacking.ent://SD_ILS/0/SD_ILS:11885822026-01-01T01:01:21Z2026-01-01T01:01:21Zby Brashars, Joshua.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491518">http://www.sciencedirect.com/science/book/9781597491518</a><br/>Format: Electronic Resources<br/>Stealing the network how to own a shadowent://SD_ILS/0/SD_ILS:9385222026-01-01T01:01:21Z2026-01-01T01:01:21Zby Long, Johnny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=289738">Click to View</a><br/>Format: Electronic Resources<br/>Role-based access controlent://SD_ILS/0/SD_ILS:9452212026-01-01T01:01:21Z2026-01-01T01:01:21Zby Ferraiolo, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338751">Click to View</a><br/>Format: Electronic Resources<br/>Security+ study guide & DVD training systement://SD_ILS/0/SD_ILS:9556242026-01-01T01:01:21Z2026-01-01T01:01:21Zby Cross, Michael, 1965-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=452863">Click to View</a><br/>Format: Electronic Resources<br/>Techno security's guide to e-discovery and digital forensicsent://SD_ILS/0/SD_ILS:9480152026-01-01T01:01:21Z2026-01-01T01:01:21Zby Wiles, Jack.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=405426">Click to View</a><br/>Format: Electronic Resources<br/>Küreselleşen ekonomi içerisinde ortaya çıkan yeni dağıtım kanallarıent://SD_ILS/0/SD_ILS:6709802026-01-01T01:01:21Z2026-01-01T01:01:21Zby Sencar, Özer, prepared<br/>Format: Books<br/>Optimizing and testing WLANs proven techniques for maximum performanceent://SD_ILS/0/SD_ILS:9423532026-01-01T01:01:21Z2026-01-01T01:01:21Zby Alexander, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=311499">Click to View</a><br/>Format: Electronic Resources<br/>Windows forensic analysis DVD toolkit,ent://SD_ILS/0/SD_ILS:9440762026-01-01T01:01:21Z2026-01-01T01:01:21Zby Carvey, Harlan A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328624">Click to View</a><br/>Format: Electronic Resources<br/>Uluslararası Katılımlı Bilgi Güvenliği ve Kriptoloji konferansı : bildiriler kitabı, 13-14 Aralık 2007 = Information Security & Cryptology Conference with International Participation : proceedings, 13-14 December 2007ent://SD_ILS/0/SD_ILS:11555782026-01-01T01:01:21Z2026-01-01T01:01:21Zby Uluslararası Katılımlı Bilgi Güvenliği ve Kriptoloji Konferansı (2007 : Ankara)<br/>Format: Books<br/>Windows forensic analysis : DVD toolkitent://SD_ILS/0/SD_ILS:11864552026-01-01T01:01:21Z2026-01-01T01:01:21Zby Carvey, Harlan A.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491563">http://www.sciencedirect.com/science/book/9781597491563</a><br/>Format: Electronic Resources<br/>How to cheat at VoIP securityent://SD_ILS/0/SD_ILS:11864632026-01-01T01:01:21Z2026-01-01T01:01:21Zby Porter, Thomas, PhD.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491693">http://www.sciencedirect.com/science/book/9781597491693</a><br/>Format: Electronic Resources<br/>WarDriving & wireless penetration testingent://SD_ILS/0/SD_ILS:11882752026-01-01T01:01:21Z2026-01-01T01:01:21Zby Hurley, Chris.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491112">http://www.sciencedirect.com/science/book/9781597491112</a><br/>Format: Electronic Resources<br/>Web application vulnerabilities : detect, exploit, preventent://SD_ILS/0/SD_ILS:11891052026-01-01T01:01:21Z2026-01-01T01:01:21Zby Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492096">http://www.sciencedirect.com/science/book/9781597492096</a><br/>Format: Electronic Resources<br/>Security convergence : managing enterprise security riskent://SD_ILS/0/SD_ILS:11864462026-01-01T01:01:21Z2026-01-01T01:01:21Zby Tyson, Dave.<br/><a href="http://www.sciencedirect.com/science/book/9780750684255">Available from ScienceDirect. Online version available for university members only. This requires an institutional login off-campus</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780750684255">https://www.sciencedirect.com/science/book/9780750684255</a><br/>Format: Electronic Resources<br/>PCI compliance : implementing effective PCI data security standardsent://SD_ILS/0/SD_ILS:11864662026-01-01T01:01:21Z2026-01-01T01:01:21Zby Bradley, Tony, 1969-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491655">http://www.sciencedirect.com/science/book/9781597491655</a><br/>Format: Electronic Resources<br/>Optimizing and testing WLANs : proven techniques for maximum performanceent://SD_ILS/0/SD_ILS:11880132026-01-01T01:01:21Z2026-01-01T01:01:21Zby Alexander, Tom.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679862">http://www.sciencedirect.com/science/book/9780750679862</a><br/>Format: Electronic Resources<br/>Physical and logical security convergence powered by enterprise security managementent://SD_ILS/0/SD_ILS:11890882026-01-01T01:01:21Z2026-01-01T01:01:21Zby Contos, Brian T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491228">https://www.sciencedirect.com/science/book/9781597491228</a><br/>Format: Electronic Resources<br/>Techno security's guide to e-discovery and digital forensicsent://SD_ILS/0/SD_ILS:11891132026-01-01T01:01:21Z2026-01-01T01:01:21Zby Wiles, Jack.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492232">http://www.sciencedirect.com/science/book/9781597492232</a><br/>Format: Electronic Resources<br/>Stealing the network : how to own a shadow: the chase for Knuthent://SD_ILS/0/SD_ILS:11882682026-01-01T01:01:21Z2026-01-01T01:01:21Zby Long, Johnny.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490818">http://www.sciencedirect.com/science/book/9781597490818</a><br/>Format: Electronic Resources<br/>The history of information security : a comprehensive handbookent://SD_ILS/0/SD_ILS:11865232026-01-01T01:01:21Z2026-01-01T01:01:21Zby Leeuw, Karl de.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444516084">http://www.sciencedirect.com/science/book/9780444516084</a><br/>Format: Electronic Resources<br/>Wi-Fi telephony : challenges and solutions for voice over WLANsent://SD_ILS/0/SD_ILS:11880122026-01-01T01:01:21Z2026-01-01T01:01:21Zby Chandra, Praphul.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679718">http://www.sciencedirect.com/science/book/9780750679718</a><br/>Format: Electronic Resources<br/>Cyber crime investigations : bridging the gaps between security professionals, law enforcement, and prosecutorsent://SD_ILS/0/SD_ILS:11864452026-01-01T01:01:21Z2026-01-01T01:01:21Zby Reyes, Anthony.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491334">https://www.sciencedirect.com/science/book/9781597491334</a><br/>Format: Electronic Resources<br/>The best damn cybercrime and digital forensics book periodent://SD_ILS/0/SD_ILS:11891172026-01-01T01:01:21Z2026-01-01T01:01:21Zby Cardwell, Kevin.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492287">http://www.sciencedirect.com/science/book/9781597492287</a><br/>Format: Electronic Resources<br/>CD and DVD forensicsent://SD_ILS/0/SD_ILS:11864322026-01-01T01:01:21Z2026-01-01T01:01:21Zby Crowley, Paul.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491280">https://www.sciencedirect.com/science/book/9781597491280</a><br/>Format: Electronic Resources<br/>