Search Results for Computer security. - Narrowed by: 2012SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092012$0025092012$0026ps$003d300?dt=list2025-12-30T07:43:34ZA multidisciplinary introduction to information securityent://SD_ILS/0/SD_ILS:10284162025-12-30T07:43:34Z2025-12-30T07:43:34Zby Mjølsnes, Stig F., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1648315">Click to View</a><br/>Format: Electronic Resources<br/>SQL injection attacks and defenseent://SD_ILS/0/SD_ILS:9972872025-12-30T07:43:34Z2025-12-30T07:43:34Zby Clarke, Justin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=953188">Click to View</a><br/>Format: Electronic Resources<br/>Coding for penetration testers building better toolsent://SD_ILS/0/SD_ILS:9835212025-12-30T07:43:34Z2025-12-30T07:43:34Zby Andress, Jason.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=773396">Click to View</a><br/>Format: Electronic Resources<br/>The tangled Web a guide to securing modern Web applicationsent://SD_ILS/0/SD_ILS:10099762025-12-30T07:43:34Z2025-12-30T07:43:34Zby Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137574">Click to View</a><br/>Format: Electronic Resources<br/>CISO's guide to penetration testing a framework to plan, manage, and maximize benefitsent://SD_ILS/0/SD_ILS:9874712025-12-30T07:43:34Z2025-12-30T07:43:34Zby Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826967">Click to View</a><br/>Format: Electronic Resources<br/>Hacking web apps detecting and preventing web application security problemsent://SD_ILS/0/SD_ILS:10003712025-12-30T07:43:34Z2025-12-30T07:43:34Zby Shema, Mike.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1012529">Click to View</a><br/>Format: Electronic Resources<br/>Low tech hacking street smarts for security professionalsent://SD_ILS/0/SD_ILS:9877872025-12-30T07:43:34Z2025-12-30T07:43:34Zby Wiles, Jack.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=829964">Click to View</a><br/>Format: Electronic Resources<br/>Microsoft Forefront Identity Manager 2010 R2 handbookent://SD_ILS/0/SD_ILS:10006802025-12-30T07:43:34Z2025-12-30T07:43:34Zby Nordström, Kent.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1019543">Click to View</a><br/>Format: Electronic Resources<br/>Microsoft SQL Server 2012 security cookbookent://SD_ILS/0/SD_ILS:10018912025-12-30T07:43:34Z2025-12-30T07:43:34Zby Bruchez, Rudi.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1036251">Click to View</a><br/>Format: Electronic Resources<br/>IBM i security administration and complianceent://SD_ILS/0/SD_ILS:9937152025-12-30T07:43:34Z2025-12-30T07:43:34Zby Woodbury, Carol.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=906259">Click to View</a><br/>Format: Electronic Resources<br/>Oracle 11g anti-hacker's cookbookent://SD_ILS/0/SD_ILS:10033492025-12-30T07:43:34Z2025-12-30T07:43:34Zby Neagu, Adrian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1057945">Click to View</a><br/>Format: Electronic Resources<br/>Securing WebLogic Server 12c learn to develop, administer, and troubleshot your WebLogic Serverent://SD_ILS/0/SD_ILS:10049592025-12-30T07:43:34Z2025-12-30T07:43:34Zby Masini, Luca.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1085228">Click to View</a><br/>Format: Electronic Resources<br/>Spring Security 3.1 secure your web applications from hackers with the step-by-step guideent://SD_ILS/0/SD_ILS:10065082025-12-30T07:43:34Z2025-12-30T07:43:34Zby Winch, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108351">Click to View</a><br/>Format: Electronic Resources<br/>Advances in intelligence and security informaticsent://SD_ILS/0/SD_ILS:9930232025-12-30T07:43:34Z2025-12-30T07:43:34Zby Mao, Wenji.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=892251">Click to View</a><br/>Format: Electronic Resources<br/>Low tech hacking street smarts for security professionalsent://SD_ILS/0/SD_ILS:1371062025-12-30T07:43:34Z2025-12-30T07:43:34Zby Wiles, Jack.<br/><a href="http://ezproxy.lb.polyu.edu.hk/login?url=http://www.sciencedirect.com/science/book/9781597496650">ScienceDirect e-book</a>
ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496650">http://www.sciencedirect.com/science/book/9781597496650</a><br/>Format: Electronic Resources<br/>Handbook on securing cyber-physical critical infrastructureent://SD_ILS/0/SD_ILS:9900032025-12-30T07:43:34Z2025-12-30T07:43:34Zby Das, Sajal K.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=858728">Click to View</a><br/>Format: Electronic Resources<br/>Advanced penetration testing for highly-secured environments the ultimate security guide : learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guideent://SD_ILS/0/SD_ILS:9966062025-12-30T07:43:34Z2025-12-30T07:43:34Zby Allen, Lee.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=946941">Click to View</a><br/>Format: Electronic Resources<br/>Advances in intelligence and security informaticsent://SD_ILS/0/SD_ILS:1333812025-12-30T07:43:34Z2025-12-30T07:43:34Zby Mao, Wenji.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123972002">http://www.sciencedirect.com/science/book/9780123972002</a><br/>Format: Electronic Resources<br/>Safeguarding critical e-documents implementing a program for securing confidential information assetsent://SD_ILS/0/SD_ILS:9871482025-12-30T07:43:34Z2025-12-30T07:43:34Zby Smallwood, Robert F., 1959-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=821999">Click to View</a><br/>Format: Electronic Resources<br/>Client-side attacks and defenseent://SD_ILS/0/SD_ILS:10019052025-12-30T07:43:34Z2025-12-30T07:43:34Zby Shimonski, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1036349">Click to View</a><br/>Format: Electronic Resources<br/>Embedded systems security practical methods for safe and secure software and systems developmentent://SD_ILS/0/SD_ILS:9925552025-12-30T07:43:34Z2025-12-30T07:43:34Zby Kleidermacher, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=886256">Click to View</a><br/>Format: Electronic Resources<br/>Nmap 6 network exploration and security auditing cookbook ; a complete guide to mastering Nmap 6 and its scripting engine, covering practical tasks for penetration testers and system administratorsent://SD_ILS/0/SD_ILS:10049612025-12-30T07:43:34Z2025-12-30T07:43:34Zby Calderon Pale, Paulino.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1085230">Click to View</a><br/>Format: Electronic Resources<br/>Asset protection through security awarenessent://SD_ILS/0/SD_ILS:9874512025-12-30T07:43:34Z2025-12-30T07:43:34Zby Speed, Tyler Justin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826927">Click to View</a><br/>Format: Electronic Resources<br/>Information security management handbook. Volume 5ent://SD_ILS/0/SD_ILS:9855102025-12-30T07:43:34Z2025-12-30T07:43:34Zby Tipton, Harold F.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=800925">Click to View</a><br/>Format: Electronic Resources<br/>Information security management handbook. Volume 6ent://SD_ILS/0/SD_ILS:9920722025-12-30T07:43:34Z2025-12-30T07:43:34Zby Tipton, Harold F.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=877141">Click to View</a><br/>Format: Electronic Resources<br/>Getting started with Citrix XenApp 6.5 design and implement Citrix farms based on XenApp 6.5ent://SD_ILS/0/SD_ILS:9998702025-12-30T07:43:34Z2025-12-30T07:43:34Zby Musumeci, Guillermo.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=995550">Click to View</a><br/>Format: Electronic Resources<br/>BackTrack 5 cookbook over 80 recipes to execute many of the best known and little known penetration testing aspects of BackTrack 5ent://SD_ILS/0/SD_ILS:10064962025-12-30T07:43:34Z2025-12-30T07:43:34Zby Pritchett, Willie.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108337">Click to View</a><br/>Format: Electronic Resources<br/>Software safety and security tools for analysis and verificationent://SD_ILS/0/SD_ILS:9967432025-12-30T07:43:34Z2025-12-30T07:43:34Zby NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security (2011 : Bayrischzell, Germany)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948331">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity public sector threats and responsesent://SD_ILS/0/SD_ILS:9874582025-12-30T07:43:34Z2025-12-30T07:43:34Zby Andreasson, Kim J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826942">Click to View</a><br/>Format: Electronic Resources<br/>Security metrics : a beginner's guideent://SD_ILS/0/SD_ILS:2798682025-12-30T07:43:34Z2025-12-30T07:43:34Zby Wong, Caroline<br/>Format: Books<br/>Official (ISC)2 guide to the CAP CBKent://SD_ILS/0/SD_ILS:9990032025-12-30T07:43:34Z2025-12-30T07:43:34Zby Howard, Patrick D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=981531">Click to View</a><br/>Format: Electronic Resources<br/>TBMM'de fiziksel ve sanal güvenlik analizient://SD_ILS/0/SD_ILS:998382025-12-30T07:43:34Z2025-12-30T07:43:34Zby Yıldırım, Hakan<br/>Format: Books<br/>Reliability and availability of cloud computingent://SD_ILS/0/SD_ILS:1398622025-12-30T07:43:34Z2025-12-30T07:43:34Zby Bauer, Eric<br/>Format: Books<br/>Cybersecurity for industrial control systems SCADA, DCS, PLC, HMI, and SISent://SD_ILS/0/SD_ILS:9874492025-12-30T07:43:34Z2025-12-30T07:43:34Zby Macaulay, Tyson.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826923">Click to View</a><br/>Format: Electronic Resources<br/>Securing SQL servers protecting your database from attackersent://SD_ILS/0/SD_ILS:9989532025-12-30T07:43:34Z2025-12-30T07:43:34Zby Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=980013">Click to View</a><br/>Format: Electronic Resources<br/>Cyber conflict competing national perspectivesent://SD_ILS/0/SD_ILS:10085102025-12-30T07:43:34Z2025-12-30T07:43:34Zby Ventre, Daniel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1124641">Click to View</a><br/>Format: Electronic Resources<br/>CASP CompTIA Advanced Security Practitioner study guide (exam cas-001)ent://SD_ILS/0/SD_ILS:9865062025-12-30T07:43:34Z2025-12-30T07:43:34Zby Gregg, Michael H.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=817999">Click to View</a><br/>Format: Electronic Resources<br/>Mastering windows network forensics and investigationent://SD_ILS/0/SD_ILS:9865492025-12-30T07:43:34Z2025-12-30T07:43:34Zby Anson, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=818114">Click to View</a><br/>Format: Electronic Resources<br/>Encase computer forensics the official ENCE : Encase certified examiner study guideent://SD_ILS/0/SD_ILS:9870562025-12-30T07:43:34Z2025-12-30T07:43:34Zby Bunting, Steve V.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=821657">Click to View</a><br/>Format: Electronic Resources<br/>Windows forensic analysis toolkit advanced analysis techniques for Windows 7ent://SD_ILS/0/SD_ILS:9899252025-12-30T07:43:34Z2025-12-30T07:43:34Zby Carvey, Harlan A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=850700">Click to View</a><br/>Format: Electronic Resources<br/>CISSP Certified Information Systems Security Professional study guideent://SD_ILS/0/SD_ILS:9919332025-12-30T07:43:34Z2025-12-30T07:43:34Zby Stewart, James Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=875861">Click to View</a><br/>Format: Electronic Resources<br/>Malware forensics field guide for Windows systems digital forensics field guidesent://SD_ILS/0/SD_ILS:9951892025-12-30T07:43:34Z2025-12-30T07:43:34Zby Malin, Cameron H.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=921016">Click to View</a><br/>Format: Electronic Resources<br/>Visual cryptography and secret image sharingent://SD_ILS/0/SD_ILS:10207412025-12-30T07:43:34Z2025-12-30T07:43:34Zby Cimato, Stelvio.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1449352">Click to View</a><br/>Format: Electronic Resources<br/>Metasploit penetration testing cookbook over 70 recipes to master the most widely used penetration testing frameworkent://SD_ILS/0/SD_ILS:9971912025-12-30T07:43:34Z2025-12-30T07:43:34Zby Singh, Abhinav.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=952079">Click to View</a><br/>Format: Electronic Resources<br/>Practical malware analysis the hands-on guide to dissecting malicious softwareent://SD_ILS/0/SD_ILS:10099722025-12-30T07:43:34Z2025-12-30T07:43:34Zby Sikorski, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137570">Click to View</a><br/>Format: Electronic Resources<br/>Wiki at war conflict in a socially networked worldent://SD_ILS/0/SD_ILS:10630162025-12-30T07:43:34Z2025-12-30T07:43:34Zby Carafano, James Jay, 1955-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3038033">Click to View</a><br/>Format: Electronic Resources<br/>Access contested security, identity, and resistance in Asian cyberspace information revolution and global politicsent://SD_ILS/0/SD_ILS:10819582025-12-30T07:43:34Z2025-12-30T07:43:34Zby Deibert, Ronald.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3339362">Click to View</a><br/>Format: Electronic Resources<br/>Data mining tools for malware detectionent://SD_ILS/0/SD_ILS:9874612025-12-30T07:43:34Z2025-12-30T07:43:34Zby Masud, Mehedy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826949">Click to View</a><br/>Format: Electronic Resources<br/>Embedded systems security practical methods for safe and secure software and systems developmentent://SD_ILS/0/SD_ILS:1333762025-12-30T07:43:34Z2025-12-30T07:43:34Zby Kleidermacher, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123868862">http://www.sciencedirect.com/science/book/9780123868862</a><br/>Format: Electronic Resources<br/>Cyber security policy guidebookent://SD_ILS/0/SD_ILS:9865732025-12-30T07:43:34Z2025-12-30T07:43:34Zby Bayuk, Jennifer L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=818205">Click to View</a><br/>Format: Electronic Resources<br/>PCI compliance understand and implement effective PCI data security standard complianceent://SD_ILS/0/SD_ILS:9996312025-12-30T07:43:34Z2025-12-30T07:43:34Zby Williams, Branden R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=989201">Click to View</a><br/>Format: Electronic Resources<br/>The new global ecosystem in advanced computing : implications for U.S. competitiveness and national securityent://SD_ILS/0/SD_ILS:10864072025-12-30T07:43:34Z2025-12-30T07:43:34Zby National Research Council (U.S.). Policy and Global Affairs, issuing body.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3379287">Click to View</a><br/>Format: Electronic Resources<br/>Handbook on soft computing for video surveillanceent://SD_ILS/0/SD_ILS:9916702025-12-30T07:43:34Z2025-12-30T07:43:34Zby Pal, Sankar K.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=870695">Click to View</a><br/>Format: Electronic Resources<br/>Information Systems: Crossroads for Organization, Management, Accounting and Engineering ItAIS: The Italian Association for Information Systemsent://SD_ILS/0/SD_ILS:1379932025-12-30T07:43:34Z2025-12-30T07:43:34Zby De Marco, Marco.<br/><a href="http://dx.doi.org/10.1007/978-3-7908-2789-7">http://dx.doi.org/10.1007/978-3-7908-2789-7</a><br/>Format: Electronic Resources<br/>