Search Results for Computer security. - Narrowed by: 2013SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092013$0025092013$0026ps$003d300?dt=list2026-03-30T14:21:55ZComputer and information security handbookent://SD_ILS/0/SD_ILS:10141912026-03-30T14:21:55Z2026-03-30T14:21:55Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1195617">Click to View</a><br/>Format: Electronic Resources<br/>Siber güvenlikent://SD_ILS/0/SD_ILS:6683032026-03-30T14:21:55Z2026-03-30T14:21:55Zby Canlı, Mustafa<br/>Format: Books<br/>Yazılım güvenliği saldırı ve savunmaent://SD_ILS/0/SD_ILS:2915692026-03-30T14:21:55Z2026-03-30T14:21:55Zby Demir, Bünyamin<br/>Format: Books<br/>Web application defender's cookbook battling hackers and protecting usersent://SD_ILS/0/SD_ILS:10066272026-03-30T14:21:55Z2026-03-30T14:21:55Zby Barnett, Ryan C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108733">Click to View</a><br/>Format: Electronic Resources<br/>An introduction to information security and ISO27001:2013 : a pocket guideent://SD_ILS/0/SD_ILS:10209922026-03-30T14:21:55Z2026-03-30T14:21:55Zby Watkins, Steve G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1463578">Click to View</a><br/>Format: Electronic Resources<br/>ISO27001 / ISO27002 : a pocket guideent://SD_ILS/0/SD_ILS:10209932026-03-30T14:21:55Z2026-03-30T14:21:55Zby Calder, Alan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1463579">Click to View</a><br/>Format: Electronic Resources<br/>Hacking for dummiesent://SD_ILS/0/SD_ILS:10062512026-03-30T14:21:55Z2026-03-30T14:21:55Zby Beaver, Kevin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1106542">Click to View</a><br/>Format: Electronic Resources<br/>IBM mainframe security beyond the basics : a practical guide from a z/OS and RACF perspectiveent://SD_ILS/0/SD_ILS:10198782026-03-30T14:21:55Z2026-03-30T14:21:55Zby Dattani, Dinesh D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1411689">Click to View</a><br/>Format: Electronic Resources<br/>Data visualization. Part 2ent://SD_ILS/0/SD_ILS:10242062026-03-30T14:21:55Z2026-03-30T14:21:55Zby Assam, Tarek.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1579356">Click to View</a><br/>Format: Electronic Resources<br/>Practical anonymity hiding in plain sight onlineent://SD_ILS/0/SD_ILS:10076142026-03-30T14:21:55Z2026-03-30T14:21:55Zby Loshin, Peter.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115167">Click to View</a><br/>Format: Electronic Resources<br/>Pragmatic security metrics applying metametrics to information securityent://SD_ILS/0/SD_ILS:10109722026-03-30T14:21:55Z2026-03-30T14:21:55Zby Brotby, W. Krag.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1153198">Click to View</a><br/>Format: Electronic Resources<br/>Professional penetration testing creating and learning in a hacking labent://SD_ILS/0/SD_ILS:10076162026-03-30T14:21:55Z2026-03-30T14:21:55Zby Wilhelm, Thomas.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115172">Click to View</a><br/>Format: Electronic Resources<br/>FISMA and the risk management framework the new practice of federal cyber securityent://SD_ILS/0/SD_ILS:10040112026-03-30T14:21:55Z2026-03-30T14:21:55Zby Gantz, Stephen D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1074427">Click to View</a><br/>Format: Electronic Resources<br/>Getting started with FortiGateent://SD_ILS/0/SD_ILS:10234742026-03-30T14:21:55Z2026-03-30T14:21:55Zby Fabbri, Rosato.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572901">Click to View</a><br/>Format: Electronic Resources<br/>OAuth 2.0 identity and access management patternsent://SD_ILS/0/SD_ILS:10234802026-03-30T14:21:55Z2026-03-30T14:21:55Zby Spasovski, Martin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572907">Click to View</a><br/>Format: Electronic Resources<br/>Instant Java password and authentication securityent://SD_ILS/0/SD_ILS:10234862026-03-30T14:21:55Z2026-03-30T14:21:55Zby Mayoral, Fernando.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572913">Click to View</a><br/>Format: Electronic Resources<br/>Intelligent systems for security informaticsent://SD_ILS/0/SD_ILS:10094932026-03-30T14:21:55Z2026-03-30T14:21:55Zby Yang, Christopher.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1133729">Click to View</a><br/>Format: Electronic Resources<br/>Data hiding exposing concealed data in multimedia, operating systems, mobile devices, and network protocolsent://SD_ILS/0/SD_ILS:10039162026-03-30T14:21:55Z2026-03-30T14:21:55Zby Raggo, Michael T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073014">Click to View</a><br/>Format: Electronic Resources<br/>Cyberspace and cybersecurityent://SD_ILS/0/SD_ILS:10206952026-03-30T14:21:55Z2026-03-30T14:21:55Zby Kostopoulos, George K., 1939- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1446799">Click to View</a><br/>Format: Electronic Resources<br/>Safety management for software-based equipmentent://SD_ILS/0/SD_ILS:10134392026-03-30T14:21:55Z2026-03-30T14:21:55Zby Boulanger, Jean-Louis.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1187169">Click to View</a><br/>Format: Electronic Resources<br/>Enterprise security a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterpriseent://SD_ILS/0/SD_ILS:10059952026-03-30T14:21:55Z2026-03-30T14:21:55Zby Woody, Aaron.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1103988">Click to View</a><br/>Format: Electronic Resources<br/>Linux malware incident response : a practitioner's guide to forensic collection and examination of volatile data : an excerpt from Malware forensics field guide for Linux systemsent://SD_ILS/0/SD_ILS:10076252026-03-30T14:21:55Z2026-03-30T14:21:55Zby Malin, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115185">Click to View</a><br/>Format: Electronic Resources<br/>Information security risk assessment toolkit practical assessments through data collection and data analysisent://SD_ILS/0/SD_ILS:10028372026-03-30T14:21:55Z2026-03-30T14:21:55Zby Talabis, Mark Ryan N.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1047930">Click to View</a><br/>Format: Electronic Resources<br/>Logging and log management the authoritative guide to understanding the concepts surrounding logging and log managementent://SD_ILS/0/SD_ILS:10044582026-03-30T14:21:55Z2026-03-30T14:21:55Zby Chuvakin, Anton A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1077419">Click to View</a><br/>Format: Electronic Resources<br/>The true cost of information security breaches and cyber crimeent://SD_ILS/0/SD_ILS:10212732026-03-30T14:21:55Z2026-03-30T14:21:55Zby Krausz, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1477418">Click to View</a><br/>Format: Electronic Resources<br/>Information security management principlesent://SD_ILS/0/SD_ILS:10148892026-03-30T14:21:55Z2026-03-30T14:21:55Zby Alexander, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1213992">Click to View</a><br/>Format: Electronic Resources<br/>Secure multi-party computationent://SD_ILS/0/SD_ILS:10099232026-03-30T14:21:55Z2026-03-30T14:21:55Zby Prabhakaran, Manoj M.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137458">Click to View</a><br/>Format: Electronic Resources<br/>Security risks in social media technologies : safe practices in public service applicationsent://SD_ILS/0/SD_ILS:10237762026-03-30T14:21:55Z2026-03-30T14:21:55Zby Oxley, Alan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1574994">Click to View</a><br/>Format: Electronic Resources<br/>What should go on the internet? : privacy, freedom, and security onlineent://SD_ILS/0/SD_ILS:11118342026-03-30T14:21:55Z2026-03-30T14:21:55Zby Engel, Mary, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4533280">Click to View</a><br/>Format: Electronic Resources<br/>Simple steps to data encryption a practical guide to secure computingent://SD_ILS/0/SD_ILS:10076232026-03-30T14:21:55Z2026-03-30T14:21:55Zby Loshin, Pete.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115182">Click to View</a><br/>Format: Electronic Resources<br/>UTM security with Fortinet Mastering FortiOSent://SD_ILS/0/SD_ILS:10034962026-03-30T14:21:55Z2026-03-30T14:21:55Zby Tam, Kenneth.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1068442">Click to View</a><br/>Format: Electronic Resources<br/>Advanced persistent threat understanding the danger and how to protect your organizationent://SD_ILS/0/SD_ILS:10039212026-03-30T14:21:55Z2026-03-30T14:21:55Zby Cole, Eric.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073020">Click to View</a><br/>Format: Electronic Resources<br/>Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineersent://SD_ILS/0/SD_ILS:10039222026-03-30T14:21:55Z2026-03-30T14:21:55Zby O'Connor, T. J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073021">Click to View</a><br/>Format: Electronic Resources<br/>Federated identity primerent://SD_ILS/0/SD_ILS:10046722026-03-30T14:21:55Z2026-03-30T14:21:55Zby Rountree, Derrick.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1081145">Click to View</a><br/>Format: Electronic Resources<br/>Sicherheit in kommunikationsnetzenent://SD_ILS/0/SD_ILS:10220912026-03-30T14:21:55Z2026-03-30T14:21:55Zby Sorge, Christoph.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1524463">Click to View</a><br/>Format: Electronic Resources<br/>Security patterns in practice : designing secure architectures using software patternsent://SD_ILS/0/SD_ILS:10158112026-03-30T14:21:55Z2026-03-30T14:21:55Zby Fernandez, Eduardo B., 1936- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1245159">Click to View</a><br/>Format: Electronic Resources<br/>Seven deadly clicks : essential lessons for online safety and successent://SD_ILS/0/SD_ILS:11491472026-03-30T14:21:55Z2026-03-30T14:21:55Zby Strupeck, Margo, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=6031486">Click to View</a><br/>Format: Electronic Resources<br/>SolarWinds Server & Application Monitor : deployment and administration : an intuitive guide to implementing and calibrating SolarWinds Server & Application Monitor with minimum hassleent://SD_ILS/0/SD_ILS:10246212026-03-30T14:21:55Z2026-03-30T14:21:55Zby Brant, Justin M.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1582950">Click to View</a><br/>Format: Electronic Resources<br/>Windows 2012 server network security securing your windows network systems and infrastructureent://SD_ILS/0/SD_ILS:10076102026-03-30T14:21:55Z2026-03-30T14:21:55Zby Rountree, Derrick.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115160">Click to View</a><br/>Format: Electronic Resources<br/>Web penetration testing with Kali Linux : a practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linuxent://SD_ILS/0/SD_ILS:10200472026-03-30T14:21:55Z2026-03-30T14:21:55Zby Muniz, Joseph.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1420531">Click to View</a><br/>Format: Electronic Resources<br/>Instant Spring Security starter learn the fundamentals of web authentication and authorization using Spring Securityent://SD_ILS/0/SD_ILS:10162682026-03-30T14:21:55Z2026-03-30T14:21:55Zby Jagielski, Piotr.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1274894">Click to View</a><br/>Format: Electronic Resources<br/>The practice of network security monitoring : understanding incident detection and responseent://SD_ILS/0/SD_ILS:10234572026-03-30T14:21:55Z2026-03-30T14:21:55Zby Bejtlich, Richard.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572876">Click to View</a><br/>Format: Electronic Resources<br/>The basics of hacking and penetration testing ethical hacking and penetration testing made easyent://SD_ILS/0/SD_ILS:10158672026-03-30T14:21:55Z2026-03-30T14:21:55Zby Engebretson, Pat (Patrick Henry), 1974-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1249222">Click to View</a><br/>Format: Electronic Resources<br/>The benefits and security risks of web-based applications for business trend reportent://SD_ILS/0/SD_ILS:10147332026-03-30T14:21:55Z2026-03-30T14:21:55Zby Kotwica, Kathleen.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1210948">Click to View</a><br/>Format: Electronic Resources<br/>Microsoft DirectAccess best practices and troubleshootingent://SD_ILS/0/SD_ILS:10192612026-03-30T14:21:55Z2026-03-30T14:21:55Zby Krause, Jordan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1389355">Click to View</a><br/>Format: Electronic Resources<br/>Metasploit penetration testing cookbookent://SD_ILS/0/SD_ILS:10212802026-03-30T14:21:55Z2026-03-30T14:21:55Zby Agarwal, Monika.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1477469">Click to View</a><br/>Format: Electronic Resources<br/>Risk management framework a lab-based approach to securing information systemsent://SD_ILS/0/SD_ILS:10076222026-03-30T14:21:55Z2026-03-30T14:21:55Zby Broad, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115181">Click to View</a><br/>Format: Electronic Resources<br/>Using social media for global securityent://SD_ILS/0/SD_ILS:10078452026-03-30T14:21:55Z2026-03-30T14:21:55Zby Gupta, Ravi.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1118756">Click to View</a><br/>Format: Electronic Resources<br/>Citrix Access Gateway VPX 5.04 essentials a practical step-by-step guide to provide secure remote access using the Citrix Access Gateway VPXent://SD_ILS/0/SD_ILS:10080152026-03-30T14:21:55Z2026-03-30T14:21:55Zby Mallett, Andrew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1119760">Click to View</a><br/>Format: Electronic Resources<br/>Mobile access safety beyond BYODent://SD_ILS/0/SD_ILS:10084142026-03-30T14:21:55Z2026-03-30T14:21:55Zby Assing, Dominique.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1124007">Click to View</a><br/>Format: Electronic Resources<br/>Risk propagation assessment for network security application to airport communication network designent://SD_ILS/0/SD_ILS:10120962026-03-30T14:21:55Z2026-03-30T14:21:55Zby Ben Mahmoud, Mohamed Slim.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1168523">Click to View</a><br/>Format: Electronic Resources<br/>Technocrime, policing and surveillanceent://SD_ILS/0/SD_ILS:10005672026-03-30T14:21:55Z2026-03-30T14:21:55Zby Leman-Langlois, Stéphane, 1965-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1016143">Click to View</a><br/>Format: Electronic Resources<br/>Applied cyber security and the smart grid implementing security controls into the modern power infrastructureent://SD_ILS/0/SD_ILS:10076262026-03-30T14:21:55Z2026-03-30T14:21:55Zby Knapp, Eric D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115187">Click to View</a><br/>Format: Electronic Resources<br/>Consent in European data protection lawent://SD_ILS/0/SD_ILS:10121422026-03-30T14:21:55Z2026-03-30T14:21:55Zby Kosta, Eleni.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1170052">Click to View</a><br/>Format: Electronic Resources<br/>Windows server 2012 security from end to edge and beyond architecting, designing, planning, and deploying Windows server 2012 security solutionsent://SD_ILS/0/SD_ILS:10076122026-03-30T14:21:55Z2026-03-30T14:21:55Zby Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115164">Click to View</a><br/>Format: Electronic Resources<br/>Cyber security for educational leaders a guide to understanding and implementing technology policiesent://SD_ILS/0/SD_ILS:10106562026-03-30T14:21:55Z2026-03-30T14:21:55Zby Sianjina, Rayton R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1143733">Click to View</a><br/>Format: Electronic Resources<br/>Biohackers the politics of open scienceent://SD_ILS/0/SD_ILS:10882072026-03-30T14:21:55Z2026-03-30T14:21:55Zby Delfanti, Alessandro.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3386719">Click to View</a><br/>Format: Electronic Resources<br/>Advances in cyber security : technology, operations, and experiencesent://SD_ILS/0/SD_ILS:11232472026-03-30T14:21:55Z2026-03-30T14:21:55Zby Hsu, D. Frank (Derbiau Frank), 1948- editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4803841">Click to View</a><br/>Format: Electronic Resources<br/>Digital whoness identity, privacy and freedom in the cyberworldent://SD_ILS/0/SD_ILS:10150682026-03-30T14:21:55Z2026-03-30T14:21:55Zby Capurro, Rafael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1215540">Click to View</a><br/>Format: Electronic Resources<br/>Learning Metasploit exploitation and developmentent://SD_ILS/0/SD_ILS:10157102026-03-30T14:21:55Z2026-03-30T14:21:55Zby Balapure, Aditya.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1236046">Click to View</a><br/>Format: Electronic Resources<br/>The complete guide to physical securityent://SD_ILS/0/SD_ILS:10070022026-03-30T14:21:55Z2026-03-30T14:21:55Zby Baker, Paul R., 1958-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1112600">Click to View</a><br/>Format: Electronic Resources<br/>Wireless reconnaissance in penetration testingent://SD_ILS/0/SD_ILS:10034262026-03-30T14:21:55Z2026-03-30T14:21:55Zby Neely, Matthew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1059696">Click to View</a><br/>Format: Electronic Resources<br/>Sailing safe in cyberspace : protect your identity and dataent://SD_ILS/0/SD_ILS:10196432026-03-30T14:21:55Z2026-03-30T14:21:55Zby Kaushik, Anjali, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1400595">Click to View</a><br/>Format: Electronic Resources<br/>Spring Security 3.x cookbookent://SD_ILS/0/SD_ILS:10223042026-03-30T14:21:55Z2026-03-30T14:21:55Zby Mankale, Anjana.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1532014">Click to View</a><br/>Format: Electronic Resources<br/>Investigative computer forensics the practical guide for lawyers, accountants, investigators, and business executivesent://SD_ILS/0/SD_ILS:9864922026-03-30T14:21:55Z2026-03-30T14:21:55Zby Laykin, Erik.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=817953">Click to View</a><br/>Format: Electronic Resources<br/>Information security analystent://SD_ILS/0/SD_ILS:11320462026-03-30T14:21:55Z2026-03-30T14:21:55Zby Mara, Wil, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5154494">Click to View</a><br/>Format: Electronic Resources<br/>BackTrack testing wireless network securityent://SD_ILS/0/SD_ILS:10138472026-03-30T14:21:55Z2026-03-30T14:21:55Zby Cardwell, Kevin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1192679">Click to View</a><br/>Format: Electronic Resources<br/>The basics of web hacking tools and techniques to attack the Webent://SD_ILS/0/SD_ILS:10155452026-03-30T14:21:55Z2026-03-30T14:21:55Zby Pauli, Joshua J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1222592">Click to View</a><br/>Format: Electronic Resources<br/>Group policy fundamentals, security, and the managed desktopent://SD_ILS/0/SD_ILS:10060892026-03-30T14:21:55Z2026-03-30T14:21:55Zby Moskowitz, Jeremy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1104500">Click to View</a><br/>Format: Electronic Resources<br/>FISMA compliance handbookent://SD_ILS/0/SD_ILS:10076072026-03-30T14:21:55Z2026-03-30T14:21:55Zby Taylor, Laura P.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115157">Click to View</a><br/>Format: Electronic Resources<br/>Social media security : leveraging social networking while mitigating riskent://SD_ILS/0/SD_ILS:10076172026-03-30T14:21:55Z2026-03-30T14:21:55Zby Cross, Michael, 1965-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115173">Click to View</a><br/>Format: Electronic Resources<br/>Network intrusion analysis methodologies, tools, and techniques for incident analysis and responseent://SD_ILS/0/SD_ILS:10033762026-03-30T14:21:55Z2026-03-30T14:21:55Zby Fichera, Joe, 1966-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1058152">Click to View</a><br/>Format: Electronic Resources<br/>The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practiceent://SD_ILS/0/SD_ILS:10039262026-03-30T14:21:55Z2026-03-30T14:21:55Zby Winterfeld, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073026">Click to View</a><br/>Format: Electronic Resources<br/>Hyper-V Replica essentials : ensure business continuity and improve your disaster recovery policy using Hyper-V Replicaent://SD_ILS/0/SD_ILS:10192642026-03-30T14:21:55Z2026-03-30T14:21:55Zby Krstevski, Vangel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1389358">Click to View</a><br/>Format: Electronic Resources<br/>Information protection playbookent://SD_ILS/0/SD_ILS:10199902026-03-30T14:21:55Z2026-03-30T14:21:55Zby Kane, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1418381">Click to View</a><br/>Format: Electronic Resources<br/>American exceptionalism, the French exception, and digital media lawent://SD_ILS/0/SD_ILS:10183522026-03-30T14:21:55Z2026-03-30T14:21:55Zby Eko, Lyombe.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1358660">Click to View</a><br/>Format: Electronic Resources<br/>Redefining information warfare boundaries for an Army in a wireless worldent://SD_ILS/0/SD_ILS:10185442026-03-30T14:21:55Z2026-03-30T14:21:55Zby Porche, Isaac, 1968-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1365200">Click to View</a><br/>Format: Electronic Resources<br/>Convergence : illicit networks and national security in the age of globalizationent://SD_ILS/0/SD_ILS:11020332026-03-30T14:21:55Z2026-03-30T14:21:55Zby Miklaucic, Michael, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3571653">Click to View</a><br/>Format: Electronic Resources<br/>Iris biometric model for secured network accessent://SD_ILS/0/SD_ILS:10124792026-03-30T14:21:55Z2026-03-30T14:21:55Zby Khoury, Franjieh El.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1177222">Click to View</a><br/>Format: Electronic Resources<br/>Automatic defense against zero-day polymorphic worms in communication networksent://SD_ILS/0/SD_ILS:10152612026-03-30T14:21:55Z2026-03-30T14:21:55Zby Mohammed, Mohssen, 1982- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1220106">Click to View</a><br/>Format: Electronic Resources<br/>IT Security Risk Management Perceived IT Security Risks in the Context of Cloud Computingent://SD_ILS/0/SD_ILS:1405022026-03-30T14:21:55Z2026-03-30T14:21:55Zby Ackermann, Tobias. author.<br/><a href="http://dx.doi.org/10.1007/978-3-658-01115-4">http://dx.doi.org/10.1007/978-3-658-01115-4</a><br/>Format: Electronic Resources<br/>