Search Results for Computer security. - Narrowed by: 2014SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092014$0025092014$0026ps$003d300?dt=list2026-03-29T19:32:31ZComputer security handbookent://SD_ILS/0/SD_ILS:10287392026-03-29T19:32:31Z2026-03-29T19:32:31Zby Bosworth, Seymour, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1652940">Click to View</a><br/>Format: Electronic Resources<br/>Computer security : awareness for the homeent://SD_ILS/0/SD_ILS:11271612026-03-29T19:32:31Z2026-03-29T19:32:31Zby Cyborski, Shannon, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4876967">Click to View</a><br/>Format: Electronic Resources<br/>Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013ent://SD_ILS/0/SD_ILS:10350102026-03-29T19:32:31Z2026-03-29T19:32:31Zby Ginodman, Veniamin, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1752831">Click to View</a><br/>Format: Electronic Resources<br/>Threat modeling : designing for securityent://SD_ILS/0/SD_ILS:10270482026-03-29T19:32:31Z2026-03-29T19:32:31Zby Shostack, Adam.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629177">Click to View</a><br/>Format: Electronic Resources<br/>Assessing information security : strategies, tactics, logic and frameworkent://SD_ILS/0/SD_ILS:10538342026-03-29T19:32:31Z2026-03-29T19:32:31Zby Vladimirov, A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192124">Click to View</a><br/>Format: Electronic Resources<br/>Cyber security and IT infrastructure protectionent://SD_ILS/0/SD_ILS:10189412026-03-29T19:32:31Z2026-03-29T19:32:31Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1377640">Click to View</a><br/>Format: Electronic Resources<br/>Hacking point of sale : payment application secrets, threats, and solutionsent://SD_ILS/0/SD_ILS:10270462026-03-29T19:32:31Z2026-03-29T19:32:31Zby Gomzin, Slava.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629175">Click to View</a><br/>Format: Electronic Resources<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:10322662026-03-29T19:32:31Z2026-03-29T19:32:31Zby Andress, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1699255">Click to View</a><br/>Format: Electronic Resources<br/>Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linuxent://SD_ILS/0/SD_ILS:10317372026-03-29T19:32:31Z2026-03-29T19:32:31Zby Buchanan, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1688607">Click to View</a><br/>Format: Electronic Resources<br/>Applied network security monitoring : collection, detection, and analysisent://SD_ILS/0/SD_ILS:10236592026-03-29T19:32:31Z2026-03-29T19:32:31Zby Sanders, Chris, 1986-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1574451">Click to View</a><br/>Format: Electronic Resources<br/>Hacking with Kali : practical penetration testing techniquesent://SD_ILS/0/SD_ILS:10076192026-03-29T19:32:31Z2026-03-29T19:32:31Zby Broad, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115177">Click to View</a><br/>Format: Electronic Resources<br/>Computer forensics with FTK : enhance your computer forensics knowledge through illustrations, tips, tricks, and practical real-world scenariosent://SD_ILS/0/SD_ILS:10291072026-03-29T19:32:31Z2026-03-29T19:32:31Zby Carbone, Fernando, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1657797">Click to View</a><br/>Format: Electronic Resources<br/>Untangle network security : secure your network against threats and vulnerabilities using the unparalleled Untangle NGFWent://SD_ILS/0/SD_ILS:10405102026-03-29T19:32:31Z2026-03-29T19:32:31Zby El-Bawab, Abd El-Monem A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1831903">Click to View</a><br/>Format: Electronic Resources<br/>Security architect : careers in information securityent://SD_ILS/0/SD_ILS:10330652026-03-29T19:32:31Z2026-03-29T19:32:31Zby Collins, Jon, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1713960">Click to View</a><br/>Format: Electronic Resources<br/>Penetration testing services procurement guideent://SD_ILS/0/SD_ILS:10370842026-03-29T19:32:31Z2026-03-29T19:32:31Zby Creasey, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778765">Click to View</a><br/>Format: Electronic Resources<br/>Procuring penetration testing services.ent://SD_ILS/0/SD_ILS:10370852026-03-29T19:32:31Z2026-03-29T19:32:31Z<a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778766">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity and cyberwarent://SD_ILS/0/SD_ILS:1506302026-03-29T19:32:31Z2026-03-29T19:32:31Zby Singer, Peter Warren<br/>Format: Books<br/>Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtuallyent://SD_ILS/0/SD_ILS:10281452026-03-29T19:32:31Z2026-03-29T19:32:31Zby Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1644005">Click to View</a><br/>Format: Electronic Resources<br/>Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanningent://SD_ILS/0/SD_ILS:10361782026-03-29T19:32:31Z2026-03-29T19:32:31Zby Hutchens, Justin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1771381">Click to View</a><br/>Format: Electronic Resources<br/>At the nexus of cybersecurity and public policy : some basic concepts and issuesent://SD_ILS/0/SD_ILS:10864542026-03-29T19:32:31Z2026-03-29T19:32:31Zby Clark, David, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3379336">Click to View</a><br/>Format: Electronic Resources<br/>Data-driven security : analysis, visualization and dashboardsent://SD_ILS/0/SD_ILS:10258192026-03-29T19:32:31Z2026-03-29T19:32:31Zby Jacobs, Jay.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1599321">Click to View</a><br/>Format: Electronic Resources<br/>Security leader insights for information protection : lessons and strategies from leading security professionalsent://SD_ILS/0/SD_ILS:10322652026-03-29T19:32:31Z2026-03-29T19:32:31Zby Fahy, Bob, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1699254">Click to View</a><br/>Format: Electronic Resources<br/>Chinese cybersecurity and defenseent://SD_ILS/0/SD_ILS:10358412026-03-29T19:32:31Z2026-03-29T19:32:31Zby Ventre, Daniel, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1765106">Click to View</a><br/>Format: Electronic Resources<br/>Information security breaches : avoidance and treatment based on ISO27001ent://SD_ILS/0/SD_ILS:10370822026-03-29T19:32:31Z2026-03-29T19:32:31Zby Krausz, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778763">Click to View</a><br/>Format: Electronic Resources<br/>Cyber essentials : a pocket guideent://SD_ILS/0/SD_ILS:10370882026-03-29T19:32:31Z2026-03-29T19:32:31Zby Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778769">Click to View</a><br/>Format: Electronic Resources<br/>Datennutzungs- und datenschutzverträge : muster, klauseln, erläuterungenent://SD_ILS/0/SD_ILS:10534912026-03-29T19:32:31Z2026-03-29T19:32:31Zby Moos, Flemming, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2129586">Click to View</a><br/>Format: Electronic Resources<br/>Implementing NetScaler VPX : leverage the features of NetScaler VPX to optimize and deploy responsive web services and applications on multiple virtualization platformsent://SD_ILS/0/SD_ILS:10299022026-03-29T19:32:31Z2026-03-29T19:32:31Zby Sandbu, Marius, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1674868">Click to View</a><br/>Format: Electronic Resources<br/>Core software security : security at the sourceent://SD_ILS/0/SD_ILS:10227052026-03-29T19:32:31Z2026-03-29T19:32:31Zby Ransome, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1547083">Click to View</a><br/>Format: Electronic Resources<br/>ISO27001 in a Windows environment : the best practice handbook for a Microsoft Windows environmentent://SD_ILS/0/SD_ILS:10370872026-03-29T19:32:31Z2026-03-29T19:32:31Zby Honan, Brian, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778768">Click to View</a><br/>Format: Electronic Resources<br/>Cyber securityent://SD_ILS/0/SD_ILS:10257192026-03-29T19:32:31Z2026-03-29T19:32:31Zby Voeller, John G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1598809">Click to View</a><br/>Format: Electronic Resources<br/>Communications and information infrastructure securityent://SD_ILS/0/SD_ILS:10257202026-03-29T19:32:31Z2026-03-29T19:32:31Zby Voeller, John G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1598810">Click to View</a><br/>Format: Electronic Resources<br/>Network securityent://SD_ILS/0/SD_ILS:10385512026-03-29T19:32:31Z2026-03-29T19:32:31Zby Perez, Andre, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1800888">Click to View</a><br/>Format: Electronic Resources<br/>Detection and intelligent systems for homeland security.ent://SD_ILS/0/SD_ILS:10257272026-03-29T19:32:31Z2026-03-29T19:32:31Zby Voeller, John G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1598817">Click to View</a><br/>Format: Electronic Resources<br/>Network and system securityent://SD_ILS/0/SD_ILS:10185012026-03-29T19:32:31Z2026-03-29T19:32:31Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1364061">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity : managing systems, conducting testing, and investigating intrusionsent://SD_ILS/0/SD_ILS:10215162026-03-29T19:32:31Z2026-03-29T19:32:31Zby Mowbray, Thomas J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1481185">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity for executives : a practical guideent://SD_ILS/0/SD_ILS:10325942026-03-29T19:32:31Z2026-03-29T19:32:31Zby Touhill, Gregory J., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1707094">Click to View</a><br/>Format: Electronic Resources<br/>The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac Memoryent://SD_ILS/0/SD_ILS:10341002026-03-29T19:32:31Z2026-03-29T19:32:31Zby Ligh, Michael Hale, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1740753">Click to View</a><br/>Format: Electronic Resources<br/>Integrated security systems design : a complete reference for building enterprise-wide digital security systemsent://SD_ILS/0/SD_ILS:10373432026-03-29T19:32:31Z2026-03-29T19:32:31Zby Norman, Thomas, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1781681">Click to View</a><br/>Format: Electronic Resources<br/>Penetration testing : a hands-on introduction to hackingent://SD_ILS/0/SD_ILS:10451932026-03-29T19:32:31Z2026-03-29T19:32:31Zby Weidman, Georgia, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1931614">Click to View</a><br/>Format: Electronic Resources<br/>Targeted cyber attacks : multi-staged attacks driven by exploits and malwareent://SD_ILS/0/SD_ILS:10297842026-03-29T19:32:31Z2026-03-29T19:32:31Zby Sood, Aditya K., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1673591">Click to View</a><br/>Format: Electronic Resources<br/>Penetration testing with backbox : an introductory guide to performing crucial penetration testing operations using backboxent://SD_ILS/0/SD_ILS:10268632026-03-29T19:32:31Z2026-03-29T19:32:31Zby Uygur, Stefan Umit.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1611819">Click to View</a><br/>Format: Electronic Resources<br/>Cryptography for security and privacy in cloud computingent://SD_ILS/0/SD_ILS:10209882026-03-29T19:32:31Z2026-03-29T19:32:31Zby Rass, Stefan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1463547">Click to View</a><br/>Format: Electronic Resources<br/>Learning Nessus for penetration testing.ent://SD_ILS/0/SD_ILS:10235072026-03-29T19:32:31Z2026-03-29T19:32:31Zby Kumar, Himanshu.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572937">Click to View</a><br/>Format: Electronic Resources<br/>VMware vSphere resource management essentials : optimum solutions to help you manage your VMware vSphere resources effectivelyent://SD_ILS/0/SD_ILS:10283282026-03-29T19:32:31Z2026-03-29T19:32:31Zby Frappier, Jonathan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1647193">Click to View</a><br/>Format: Electronic Resources<br/>Cloud management and securityent://SD_ILS/0/SD_ILS:10323382026-03-29T19:32:31Z2026-03-29T19:32:31Zby Abbadi, Imad M., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1701403">Click to View</a><br/>Format: Electronic Resources<br/>Hyper-V security : secure your Hyper-V hosts, their guests, and critical services from intruders and malwareent://SD_ILS/0/SD_ILS:10440472026-03-29T19:32:31Z2026-03-29T19:32:31Zby Siron, Eric, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1911524">Click to View</a><br/>Format: Electronic Resources<br/>Mastering metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approachent://SD_ILS/0/SD_ILS:10253642026-03-29T19:32:31Z2026-03-29T19:32:31Zby Jaswal, Nipun, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1593853">Click to View</a><br/>Format: Electronic Resources<br/>Disaster recovery using VMware vSphere replication and vCenter site recovery manager : learn to deploy and use vSphere Replication 5.5 as a standalone disaster recovery solution and to orchestrate disaster recovery using vCenter site recovery manager 5.5ent://SD_ILS/0/SD_ILS:10322122026-03-29T19:32:31Z2026-03-29T19:32:31Zby GB, Abhilash, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1698729">Click to View</a><br/>Format: Electronic Resources<br/>Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment toolsent://SD_ILS/0/SD_ILS:10317542026-03-29T19:32:31Z2026-03-29T19:32:31Zby Makan, Keith, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1688642">Click to View</a><br/>Format: Electronic Resources<br/>Examining robustness and vulnerability of networked systemsent://SD_ILS/0/SD_ILS:10334292026-03-29T19:32:31Z2026-03-29T19:32:31Zby Butenko, Sergiy, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1720838">Click to View</a><br/>Format: Electronic Resources<br/>Cyber security and resiliency policy frameworkent://SD_ILS/0/SD_ILS:10398772026-03-29T19:32:31Z2026-03-29T19:32:31Zby Vaseashta, A. (Ashok), editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1818046">Click to View</a><br/>Format: Electronic Resources<br/>Puppet reporting and monitoring : create insightful reports for your server infrastructure using Puppetent://SD_ILS/0/SD_ILS:10281462026-03-29T19:32:31Z2026-03-29T19:32:31Zby Duffy, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1644006">Click to View</a><br/>Format: Electronic Resources<br/>vSphere design best practices : apply industry-accepted best practices to design reliable high-performance datacenters for your business needsent://SD_ILS/0/SD_ILS:10317592026-03-29T19:32:31Z2026-03-29T19:32:31Zby Bolander, Brian, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1688647">Click to View</a><br/>Format: Electronic Resources<br/>Security careers : skills, compensation, and career pathsent://SD_ILS/0/SD_ILS:10257032026-03-29T19:32:31Z2026-03-29T19:32:31Zby Walker, Stephen W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1598238">Click to View</a><br/>Format: Electronic Resources<br/>The basics of digital privacy : simple tools to protect your personal information and your identity onlineent://SD_ILS/0/SD_ILS:10235692026-03-29T19:32:31Z2026-03-29T19:32:31Zby Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1573362">Click to View</a><br/>Format: Electronic Resources<br/>Online security for the business travelerent://SD_ILS/0/SD_ILS:10362512026-03-29T19:32:31Z2026-03-29T19:32:31Zby Gonzalez, Deborah, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1772301">Click to View</a><br/>Format: Electronic Resources<br/>CyberWar, CyberTerror, CyberCrime and CyberActivism : an in-depth guide to the role of standards in cybersecurity enviromentent://SD_ILS/0/SD_ILS:10370812026-03-29T19:32:31Z2026-03-29T19:32:31Zby Mehan, Julie E., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778762">Click to View</a><br/>Format: Electronic Resources<br/>Cyber blockadesent://SD_ILS/0/SD_ILS:10394232026-03-29T19:32:31Z2026-03-29T19:32:31Zby Russell, Alison Lawlor, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1810129">Click to View</a><br/>Format: Electronic Resources<br/>Collaboration with cloud computing : security, social media, and unified communicationsent://SD_ILS/0/SD_ILS:10299612026-03-29T19:32:31Z2026-03-29T19:32:31Zby Messier, Ric, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1675198">Click to View</a><br/>Format: Electronic Resources<br/>Praxishandbuch Datenschutz im unternehmenent://SD_ILS/0/SD_ILS:10280562026-03-29T19:32:31Z2026-03-29T19:32:31Zby Behling, Thorsten B., editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1642773">Click to View</a><br/>Format: Electronic Resources<br/>Learning pentesting for Android devices : a practical guide to learning penetration testing for Android devices and applicationsent://SD_ILS/0/SD_ILS:10281522026-03-29T19:32:31Z2026-03-29T19:32:31Zby Gupta, Aditya, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1644013">Click to View</a><br/>Format: Electronic Resources<br/>Perspectives on privacy : increasing regulation in the USA, Canada, Australia and European countriesent://SD_ILS/0/SD_ILS:10189182026-03-29T19:32:31Z2026-03-29T19:32:31Zby Dörr, Dieter, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1377214">Click to View</a><br/>Format: Electronic Resources<br/>Cyber threat! : how to manage the growing risk of cyber attacksent://SD_ILS/0/SD_ILS:10342962026-03-29T19:32:31Z2026-03-29T19:32:31Zby Ulsch, N. MacDonnell, 1951- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1742833">Click to View</a><br/>Format: Electronic Resources<br/>VMware horizon 6 desktop virtualization solutions : plan, design, and secure your virtual desktop environments with VMware horizon 6 viewent://SD_ILS/0/SD_ILS:10380992026-03-29T19:32:31Z2026-03-29T19:32:31Zby Cartwright, Ryan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1793938">Click to View</a><br/>Format: Electronic Resources<br/>Windows forensic analysis toolkit : advanced analysis techniques for Windows 8ent://SD_ILS/0/SD_ILS:10291622026-03-29T19:32:31Z2026-03-29T19:32:31Zby Carvey, Harlan A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1659012">Click to View</a><br/>Format: Electronic Resources<br/>The other quiet professionals : lessons for future cyber forces from the evolution of special forcesent://SD_ILS/0/SD_ILS:10432872026-03-29T19:32:31Z2026-03-29T19:32:31Zby Paul, Christopher, 1971- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1899339">Click to View</a><br/>Format: Electronic Resources<br/>Malware forensics field guide for Linux systemsent://SD_ILS/0/SD_ILS:10076062026-03-29T19:32:31Z2026-03-29T19:32:31Zby Malin, Cameron H.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115128">Click to View</a><br/>Format: Electronic Resources<br/>Critical infrastructure protectionent://SD_ILS/0/SD_ILS:10276372026-03-29T19:32:31Z2026-03-29T19:32:31Zby Edwards, Matthew, editor of compilation.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1637644">Click to View</a><br/>Format: Electronic Resources<br/>Best practices in computer network defense : incident detection and responseent://SD_ILS/0/SD_ILS:10276412026-03-29T19:32:31Z2026-03-29T19:32:31Zby Hathaway, Melissa E., editor of compilation.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1637648">Click to View</a><br/>Format: Electronic Resources<br/>Software systems safetyent://SD_ILS/0/SD_ILS:10486262026-03-29T19:32:31Z2026-03-29T19:32:31Zby Grumberg, Orna, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2033821">Click to View</a><br/>Format: Electronic Resources<br/>Cyber warfare : techniques, tactics and tools for security practitionersent://SD_ILS/0/SD_ILS:10209682026-03-29T19:32:31Z2026-03-29T19:32:31Zby Andress, Jason.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1463416">Click to View</a><br/>Format: Electronic Resources<br/>The basics of IT audit : purposes, processes, and practical informationent://SD_ILS/0/SD_ILS:10227292026-03-29T19:32:31Z2026-03-29T19:32:31Zby Gantz, Stephen D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1550527">Click to View</a><br/>Format: Electronic Resources<br/>Business continuity and disaster recovery planning for IT professionalsent://SD_ILS/0/SD_ILS:10076202026-03-29T19:32:31Z2026-03-29T19:32:31Zby Snedaker, Susan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115178">Click to View</a><br/>Format: Electronic Resources<br/>