Search Results for Computer security. - Narrowed by: 2013 SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092013$0025092013$0026ps$003d300?dt=list 2026-03-30T14:21:55Z Computer and information security handbook ent://SD_ILS/0/SD_ILS:1014191 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1195617">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Siber g&uuml;venlik ent://SD_ILS/0/SD_ILS:668303 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Canl&#305;, Mustafa<br/>Format:&#160;Books<br/> Yaz&#305;l&#305;m g&uuml;venli&#287;i sald&#305;r&#305; ve savunma ent://SD_ILS/0/SD_ILS:291569 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Demir, B&uuml;nyamin<br/>Format:&#160;Books<br/> Web application defender's cookbook battling hackers and protecting users ent://SD_ILS/0/SD_ILS:1006627 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Barnett, Ryan C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108733">Click to View</a><br/>Format:&#160;Electronic Resources<br/> An introduction to information security and ISO27001:2013 : a pocket guide ent://SD_ILS/0/SD_ILS:1020992 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Watkins, Steve G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1463578">Click to View</a><br/>Format:&#160;Electronic Resources<br/> ISO27001 / ISO27002 : a pocket guide ent://SD_ILS/0/SD_ILS:1020993 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Calder, Alan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1463579">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking for dummies ent://SD_ILS/0/SD_ILS:1006251 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Beaver, Kevin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1106542">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IBM mainframe security beyond the basics : a practical guide from a z/OS and RACF perspective ent://SD_ILS/0/SD_ILS:1019878 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Dattani, Dinesh D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1411689">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data visualization. Part 2 ent://SD_ILS/0/SD_ILS:1024206 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Assam, Tarek.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1579356">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Practical anonymity hiding in plain sight online ent://SD_ILS/0/SD_ILS:1007614 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Loshin, Peter.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115167">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Pragmatic security metrics applying metametrics to information security ent://SD_ILS/0/SD_ILS:1010972 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Brotby, W. Krag.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1153198">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Professional penetration testing creating and learning in a hacking lab ent://SD_ILS/0/SD_ILS:1007616 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Wilhelm, Thomas.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115172">Click to View</a><br/>Format:&#160;Electronic Resources<br/> FISMA and the risk management framework the new practice of federal cyber security ent://SD_ILS/0/SD_ILS:1004011 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Gantz, Stephen D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1074427">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Getting started with FortiGate ent://SD_ILS/0/SD_ILS:1023474 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Fabbri, Rosato.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572901">Click to View</a><br/>Format:&#160;Electronic Resources<br/> OAuth 2.0 identity and access management patterns ent://SD_ILS/0/SD_ILS:1023480 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Spasovski, Martin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572907">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Instant Java password and authentication security ent://SD_ILS/0/SD_ILS:1023486 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Mayoral, Fernando.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572913">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Intelligent systems for security informatics ent://SD_ILS/0/SD_ILS:1009493 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Yang, Christopher.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1133729">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data hiding exposing concealed data in multimedia, operating systems, mobile devices, and network protocols ent://SD_ILS/0/SD_ILS:1003916 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Raggo, Michael T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073014">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyberspace and cybersecurity ent://SD_ILS/0/SD_ILS:1020695 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Kostopoulos, George K., 1939- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1446799">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Safety management for software-based equipment ent://SD_ILS/0/SD_ILS:1013439 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Boulanger, Jean-Louis.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1187169">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Enterprise security a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise ent://SD_ILS/0/SD_ILS:1005995 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Woody, Aaron.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1103988">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Linux malware incident response : a practitioner's guide to forensic collection and examination of volatile data : an excerpt from Malware forensics field guide for Linux systems ent://SD_ILS/0/SD_ILS:1007625 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Malin, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115185">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information security risk assessment toolkit practical assessments through data collection and data analysis ent://SD_ILS/0/SD_ILS:1002837 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Talabis, Mark Ryan N.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1047930">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Logging and log management the authoritative guide to understanding the concepts surrounding logging and log management ent://SD_ILS/0/SD_ILS:1004458 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Chuvakin, Anton A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1077419">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The true cost of information security breaches and cyber crime ent://SD_ILS/0/SD_ILS:1021273 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Krausz, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1477418">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information security management principles ent://SD_ILS/0/SD_ILS:1014889 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Alexander, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1213992">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Secure multi-party computation ent://SD_ILS/0/SD_ILS:1009923 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Prabhakaran, Manoj M.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137458">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security risks in social media technologies : safe practices in public service applications ent://SD_ILS/0/SD_ILS:1023776 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Oxley, Alan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1574994">Click to View</a><br/>Format:&#160;Electronic Resources<br/> What should go on the internet? : privacy, freedom, and security online ent://SD_ILS/0/SD_ILS:1111834 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Engel, Mary, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4533280">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Simple steps to data encryption a practical guide to secure computing ent://SD_ILS/0/SD_ILS:1007623 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Loshin, Pete.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115182">Click to View</a><br/>Format:&#160;Electronic Resources<br/> UTM security with Fortinet Mastering FortiOS ent://SD_ILS/0/SD_ILS:1003496 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Tam, Kenneth.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1068442">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Advanced persistent threat understanding the danger and how to protect your organization ent://SD_ILS/0/SD_ILS:1003921 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Cole, Eric.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073020">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineers ent://SD_ILS/0/SD_ILS:1003922 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;O'Connor, T. J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073021">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Federated identity primer ent://SD_ILS/0/SD_ILS:1004672 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Rountree, Derrick.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1081145">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Sicherheit in kommunikationsnetzen ent://SD_ILS/0/SD_ILS:1022091 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Sorge, Christoph.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1524463">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security patterns in practice : designing secure architectures using software patterns ent://SD_ILS/0/SD_ILS:1015811 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Fernandez, Eduardo B., 1936- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1245159">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Seven deadly clicks : essential lessons for online safety and success ent://SD_ILS/0/SD_ILS:1149147 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Strupeck, Margo, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=6031486">Click to View</a><br/>Format:&#160;Electronic Resources<br/> SolarWinds Server &amp; Application Monitor : deployment and administration : an intuitive guide to implementing and calibrating SolarWinds Server &amp; Application Monitor with minimum hassle ent://SD_ILS/0/SD_ILS:1024621 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Brant, Justin M.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1582950">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Windows 2012 server network security securing your windows network systems and infrastructure ent://SD_ILS/0/SD_ILS:1007610 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Rountree, Derrick.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115160">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Web penetration testing with Kali Linux : a practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux ent://SD_ILS/0/SD_ILS:1020047 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Muniz, Joseph.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1420531">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Instant Spring Security starter learn the fundamentals of web authentication and authorization using Spring Security ent://SD_ILS/0/SD_ILS:1016268 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Jagielski, Piotr.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1274894">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The practice of network security monitoring : understanding incident detection and response ent://SD_ILS/0/SD_ILS:1023457 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Bejtlich, Richard.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572876">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The basics of hacking and penetration testing ethical hacking and penetration testing made easy ent://SD_ILS/0/SD_ILS:1015867 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Engebretson, Pat (Patrick Henry), 1974-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1249222">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The benefits and security risks of web-based applications for business trend report ent://SD_ILS/0/SD_ILS:1014733 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Kotwica, Kathleen.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1210948">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Microsoft DirectAccess best practices and troubleshooting ent://SD_ILS/0/SD_ILS:1019261 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Krause, Jordan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1389355">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Metasploit penetration testing cookbook ent://SD_ILS/0/SD_ILS:1021280 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Agarwal, Monika.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1477469">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Risk management framework a lab-based approach to securing information systems ent://SD_ILS/0/SD_ILS:1007622 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Broad, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115181">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Using social media for global security ent://SD_ILS/0/SD_ILS:1007845 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Gupta, Ravi.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1118756">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Citrix Access Gateway VPX 5.04 essentials a practical step-by-step guide to provide secure remote access using the Citrix Access Gateway VPX ent://SD_ILS/0/SD_ILS:1008015 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Mallett, Andrew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1119760">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mobile access safety beyond BYOD ent://SD_ILS/0/SD_ILS:1008414 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Assing, Dominique.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1124007">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Risk propagation assessment for network security application to airport communication network design ent://SD_ILS/0/SD_ILS:1012096 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Ben Mahmoud, Mohamed Slim.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1168523">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Technocrime, policing and surveillance ent://SD_ILS/0/SD_ILS:1000567 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Leman-Langlois, St&eacute;phane, 1965-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1016143">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Applied cyber security and the smart grid implementing security controls into the modern power infrastructure ent://SD_ILS/0/SD_ILS:1007626 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Knapp, Eric D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115187">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Consent in European data protection law ent://SD_ILS/0/SD_ILS:1012142 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Kosta, Eleni.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1170052">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Windows server 2012 security from end to edge and beyond architecting, designing, planning, and deploying Windows server 2012 security solutions ent://SD_ILS/0/SD_ILS:1007612 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115164">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber security for educational leaders a guide to understanding and implementing technology policies ent://SD_ILS/0/SD_ILS:1010656 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Sianjina, Rayton R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1143733">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Biohackers the politics of open science ent://SD_ILS/0/SD_ILS:1088207 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Delfanti, Alessandro.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3386719">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Advances in cyber security : technology, operations, and experiences ent://SD_ILS/0/SD_ILS:1123247 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Hsu, D. Frank (Derbiau Frank), 1948- editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4803841">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Digital whoness identity, privacy and freedom in the cyberworld ent://SD_ILS/0/SD_ILS:1015068 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Capurro, Rafael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1215540">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Learning Metasploit exploitation and development ent://SD_ILS/0/SD_ILS:1015710 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Balapure, Aditya.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1236046">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The complete guide to physical security ent://SD_ILS/0/SD_ILS:1007002 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Baker, Paul R., 1958-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1112600">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Wireless reconnaissance in penetration testing ent://SD_ILS/0/SD_ILS:1003426 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Neely, Matthew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1059696">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Sailing safe in cyberspace : protect your identity and data ent://SD_ILS/0/SD_ILS:1019643 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Kaushik, Anjali, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1400595">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Spring Security 3.x cookbook ent://SD_ILS/0/SD_ILS:1022304 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Mankale, Anjana.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1532014">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Investigative computer forensics the practical guide for lawyers, accountants, investigators, and business executives ent://SD_ILS/0/SD_ILS:986492 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Laykin, Erik.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=817953">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information security analyst ent://SD_ILS/0/SD_ILS:1132046 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Mara, Wil, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5154494">Click to View</a><br/>Format:&#160;Electronic Resources<br/> BackTrack testing wireless network security ent://SD_ILS/0/SD_ILS:1013847 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Cardwell, Kevin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1192679">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The basics of web hacking tools and techniques to attack the Web ent://SD_ILS/0/SD_ILS:1015545 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Pauli, Joshua J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1222592">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Group policy fundamentals, security, and the managed desktop ent://SD_ILS/0/SD_ILS:1006089 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Moskowitz, Jeremy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1104500">Click to View</a><br/>Format:&#160;Electronic Resources<br/> FISMA compliance handbook ent://SD_ILS/0/SD_ILS:1007607 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Taylor, Laura P.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115157">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Social media security : leveraging social networking while mitigating risk ent://SD_ILS/0/SD_ILS:1007617 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Cross, Michael, 1965-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115173">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network intrusion analysis methodologies, tools, and techniques for incident analysis and response ent://SD_ILS/0/SD_ILS:1003376 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Fichera, Joe, 1966-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1058152">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice ent://SD_ILS/0/SD_ILS:1003926 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Winterfeld, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073026">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hyper-V Replica essentials : ensure business continuity and improve your disaster recovery policy using Hyper-V Replica ent://SD_ILS/0/SD_ILS:1019264 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Krstevski, Vangel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1389358">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information protection playbook ent://SD_ILS/0/SD_ILS:1019990 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Kane, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1418381">Click to View</a><br/>Format:&#160;Electronic Resources<br/> American exceptionalism, the French exception, and digital media law ent://SD_ILS/0/SD_ILS:1018352 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Eko, Lyombe.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1358660">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Redefining information warfare boundaries for an Army in a wireless world ent://SD_ILS/0/SD_ILS:1018544 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Porche, Isaac, 1968-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1365200">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Convergence : illicit networks and national security in the age of globalization ent://SD_ILS/0/SD_ILS:1102033 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Miklaucic, Michael, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3571653">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Iris biometric model for secured network access ent://SD_ILS/0/SD_ILS:1012479 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Khoury, Franjieh El.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1177222">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Automatic defense against zero-day polymorphic worms in communication networks ent://SD_ILS/0/SD_ILS:1015261 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Mohammed, Mohssen, 1982- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1220106">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IT Security Risk Management Perceived IT Security Risks in the Context of Cloud Computing ent://SD_ILS/0/SD_ILS:140502 2026-03-30T14:21:55Z 2026-03-30T14:21:55Z by&#160;Ackermann, Tobias. author.<br/><a href="http://dx.doi.org/10.1007/978-3-658-01115-4">http://dx.doi.org/10.1007/978-3-658-01115-4</a><br/>Format:&#160;Electronic Resources<br/>