Search Results for Computer security. - Narrowed by: 2012 SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092012$0025092012$0026ps$003d300?dt=list 2025-12-30T07:43:34Z A multidisciplinary introduction to information security ent://SD_ILS/0/SD_ILS:1028416 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Mj&oslash;lsnes, Stig F., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1648315">Click to View</a><br/>Format:&#160;Electronic Resources<br/> SQL injection attacks and defense ent://SD_ILS/0/SD_ILS:997287 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Clarke, Justin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=953188">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Coding for penetration testers building better tools ent://SD_ILS/0/SD_ILS:983521 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Andress, Jason.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=773396">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The tangled Web a guide to securing modern Web applications ent://SD_ILS/0/SD_ILS:1009976 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137574">Click to View</a><br/>Format:&#160;Electronic Resources<br/> CISO's guide to penetration testing a framework to plan, manage, and maximize benefits ent://SD_ILS/0/SD_ILS:987471 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826967">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking web apps detecting and preventing web application security problems ent://SD_ILS/0/SD_ILS:1000371 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Shema, Mike.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1012529">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Low tech hacking street smarts for security professionals ent://SD_ILS/0/SD_ILS:987787 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Wiles, Jack.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=829964">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Forefront Identity Manager 2010 R2 handbook ent://SD_ILS/0/SD_ILS:1000680 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Nordstr&ouml;m, Kent.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1019543">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Microsoft SQL Server 2012 security cookbook ent://SD_ILS/0/SD_ILS:1001891 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Bruchez, Rudi.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1036251">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IBM i security administration and compliance ent://SD_ILS/0/SD_ILS:993715 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Woodbury, Carol.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=906259">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Oracle 11g anti-hacker's cookbook ent://SD_ILS/0/SD_ILS:1003349 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Neagu, Adrian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1057945">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing WebLogic Server 12c learn to develop, administer, and troubleshot your WebLogic Server ent://SD_ILS/0/SD_ILS:1004959 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Masini, Luca.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1085228">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Spring Security 3.1 secure your web applications from hackers with the step-by-step guide ent://SD_ILS/0/SD_ILS:1006508 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Winch, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108351">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Advances in intelligence and security informatics ent://SD_ILS/0/SD_ILS:993023 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Mao, Wenji.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=892251">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Low tech hacking street smarts for security professionals ent://SD_ILS/0/SD_ILS:137106 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Wiles, Jack.<br/><a href="http://ezproxy.lb.polyu.edu.hk/login?url=http://www.sciencedirect.com/science/book/9781597496650">ScienceDirect e-book</a> ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496650">http://www.sciencedirect.com/science/book/9781597496650</a><br/>Format:&#160;Electronic Resources<br/> Handbook on securing cyber-physical critical infrastructure ent://SD_ILS/0/SD_ILS:990003 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Das, Sajal K.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=858728">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Advanced penetration testing for highly-secured environments the ultimate security guide : learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide ent://SD_ILS/0/SD_ILS:996606 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Allen, Lee.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=946941">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Advances in intelligence and security informatics ent://SD_ILS/0/SD_ILS:133381 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Mao, Wenji.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123972002">http://www.sciencedirect.com/science/book/9780123972002</a><br/>Format:&#160;Electronic Resources<br/> Safeguarding critical e-documents implementing a program for securing confidential information assets ent://SD_ILS/0/SD_ILS:987148 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Smallwood, Robert F., 1959-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=821999">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Client-side attacks and defense ent://SD_ILS/0/SD_ILS:1001905 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Shimonski, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1036349">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Embedded systems security practical methods for safe and secure software and systems development ent://SD_ILS/0/SD_ILS:992555 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Kleidermacher, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=886256">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Nmap 6 network exploration and security auditing cookbook ; a complete guide to mastering Nmap 6 and its scripting engine, covering practical tasks for penetration testers and system administrators ent://SD_ILS/0/SD_ILS:1004961 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Calderon Pale, Paulino.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1085230">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Asset protection through security awareness ent://SD_ILS/0/SD_ILS:987451 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Speed, Tyler Justin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826927">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information security management handbook. Volume 5 ent://SD_ILS/0/SD_ILS:985510 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Tipton, Harold F.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=800925">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information security management handbook. Volume 6 ent://SD_ILS/0/SD_ILS:992072 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Tipton, Harold F.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=877141">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Getting started with Citrix XenApp 6.5 design and implement Citrix farms based on XenApp 6.5 ent://SD_ILS/0/SD_ILS:999870 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Musumeci, Guillermo.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=995550">Click to View</a><br/>Format:&#160;Electronic Resources<br/> BackTrack 5 cookbook over 80 recipes to execute many of the best known and little known penetration testing aspects of BackTrack 5 ent://SD_ILS/0/SD_ILS:1006496 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Pritchett, Willie.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108337">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Software safety and security tools for analysis and verification ent://SD_ILS/0/SD_ILS:996743 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security (2011 : Bayrischzell, Germany)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948331">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity public sector threats and responses ent://SD_ILS/0/SD_ILS:987458 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Andreasson, Kim J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826942">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security metrics : a beginner's guide ent://SD_ILS/0/SD_ILS:279868 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Wong, Caroline<br/>Format:&#160;Books<br/> Official (ISC)2 guide to the CAP CBK ent://SD_ILS/0/SD_ILS:999003 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Howard, Patrick D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=981531">Click to View</a><br/>Format:&#160;Electronic Resources<br/> TBMM'de fiziksel ve sanal g&uuml;venlik analizi ent://SD_ILS/0/SD_ILS:99838 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Y&#305;ld&#305;r&#305;m, Hakan<br/>Format:&#160;Books<br/> Reliability and availability of cloud computing ent://SD_ILS/0/SD_ILS:139862 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Bauer, Eric<br/>Format:&#160;Books<br/> Cybersecurity for industrial control systems SCADA, DCS, PLC, HMI, and SIS ent://SD_ILS/0/SD_ILS:987449 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Macaulay, Tyson.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826923">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing SQL servers protecting your database from attackers ent://SD_ILS/0/SD_ILS:998953 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=980013">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber conflict competing national perspectives ent://SD_ILS/0/SD_ILS:1008510 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Ventre, Daniel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1124641">Click to View</a><br/>Format:&#160;Electronic Resources<br/> CASP CompTIA Advanced Security Practitioner study guide (exam cas-001) ent://SD_ILS/0/SD_ILS:986506 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Gregg, Michael H.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=817999">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mastering windows network forensics and investigation ent://SD_ILS/0/SD_ILS:986549 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Anson, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=818114">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Encase computer forensics the official ENCE : Encase certified examiner study guide ent://SD_ILS/0/SD_ILS:987056 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Bunting, Steve V.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=821657">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Windows forensic analysis toolkit advanced analysis techniques for Windows 7 ent://SD_ILS/0/SD_ILS:989925 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Carvey, Harlan A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=850700">Click to View</a><br/>Format:&#160;Electronic Resources<br/> CISSP Certified Information Systems Security Professional study guide ent://SD_ILS/0/SD_ILS:991933 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Stewart, James Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=875861">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Malware forensics field guide for Windows systems digital forensics field guides ent://SD_ILS/0/SD_ILS:995189 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Malin, Cameron H.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=921016">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Visual cryptography and secret image sharing ent://SD_ILS/0/SD_ILS:1020741 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Cimato, Stelvio.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1449352">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Metasploit penetration testing cookbook over 70 recipes to master the most widely used penetration testing framework ent://SD_ILS/0/SD_ILS:997191 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Singh, Abhinav.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=952079">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Practical malware analysis the hands-on guide to dissecting malicious software ent://SD_ILS/0/SD_ILS:1009972 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Sikorski, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137570">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Wiki at war conflict in a socially networked world ent://SD_ILS/0/SD_ILS:1063016 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Carafano, James Jay, 1955-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3038033">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Access contested security, identity, and resistance in Asian cyberspace information revolution and global politics ent://SD_ILS/0/SD_ILS:1081958 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Deibert, Ronald.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3339362">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data mining tools for malware detection ent://SD_ILS/0/SD_ILS:987461 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Masud, Mehedy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826949">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Embedded systems security practical methods for safe and secure software and systems development ent://SD_ILS/0/SD_ILS:133376 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Kleidermacher, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123868862">http://www.sciencedirect.com/science/book/9780123868862</a><br/>Format:&#160;Electronic Resources<br/> Cyber security policy guidebook ent://SD_ILS/0/SD_ILS:986573 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Bayuk, Jennifer L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=818205">Click to View</a><br/>Format:&#160;Electronic Resources<br/> PCI compliance understand and implement effective PCI data security standard compliance ent://SD_ILS/0/SD_ILS:999631 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Williams, Branden R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=989201">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The new global ecosystem in advanced computing : implications for U.S. competitiveness and national security ent://SD_ILS/0/SD_ILS:1086407 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;National Research Council (U.S.). Policy and Global Affairs, issuing body.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3379287">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Handbook on soft computing for video surveillance ent://SD_ILS/0/SD_ILS:991670 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;Pal, Sankar K.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=870695">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information Systems: Crossroads for Organization, Management, Accounting and Engineering ItAIS: The Italian Association for Information Systems ent://SD_ILS/0/SD_ILS:137993 2025-12-30T07:43:34Z 2025-12-30T07:43:34Z by&#160;De Marco, Marco.<br/><a href="http://dx.doi.org/10.1007/978-3-7908-2789-7">http://dx.doi.org/10.1007/978-3-7908-2789-7</a><br/>Format:&#160;Electronic Resources<br/>