Search Results for Computer security. - Narrowed by: 2015 SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092015$0025092015$0026ps$003d300?dt=list 2025-12-30T03:00:57Z Web application security is a stack : how to CYA (Cover Your Apps) completely ent://SD_ILS/0/SD_ILS:1053836 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Vittie, Lori Mac, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192126">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber resilience best practices ent://SD_ILS/0/SD_ILS:1104467 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;AXELOS Limited, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4187569">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The network security test lab : a step-by-step guide ent://SD_ILS/0/SD_ILS:1103143 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Gregg, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040350">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Zabbix network monitoring essentials : your one-stop solution to efficient network monitoring with zabbix ent://SD_ILS/0/SD_ILS:1046048 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Vacche, Andrea Dalle, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1973849">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computational network science : an algorithmic approach ent://SD_ILS/0/SD_ILS:1038184 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Hexmoor, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1798312">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Understanding bitcoin : cryptography, engineering and economics. ent://SD_ILS/0/SD_ILS:1040180 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Franco, Pedro, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1823060">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Designing and building a security operations center ent://SD_ILS/0/SD_ILS:1040615 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Nathans, David, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1834659">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information security analytics : finding security insights, patterns and anomalies in big data ent://SD_ILS/0/SD_ILS:1041629 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Mark, Talabis, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1873129">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Infosec management fundamentals ent://SD_ILS/0/SD_ILS:1053583 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2146007">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Bent functions : results and applications to cryptography ent://SD_ILS/0/SD_ILS:1053831 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Tokareva, Natalia, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192079">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network attacks &amp; exploitation : a framework ent://SD_ILS/0/SD_ILS:1103144 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Monte, Matthew, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040351">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:1145060 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709810">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:1145062 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709812">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des Installations Industrielles. Chapter V, Des bus de terrain a l'Industrial Ethernet ent://SD_ILS/0/SD_ILS:1145070 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709821">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre X, S&eacute;curit&eacute; des R&eacute;seaux Industriels &eacute;tendus : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:1145073 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709824">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre II, Typologie des installations industrielles : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:1145077 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709828">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre II, Typologie des installations industrielles : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:1145078 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709829">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapter VI, Analyse des risques : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:1145082 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709834">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre I, Mythes et r&eacute;alit&eacute;s de la cybers&eacute;curit&eacute; des syst&egrave;mes num&eacute;riques industriels : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:1145083 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709836">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des Installations Industrielles ent://SD_ILS/0/SD_ILS:1145096 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Fourastier, Yannick, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709851">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des Installations Industrielles : Chapitre XII Panorama de l'offre Technologique Pour la Cybers&eacute;curit&eacute; Industrielle ent://SD_ILS/0/SD_ILS:1145091 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Fourastier, Yannick, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709845">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Using security patterns in web-application ent://SD_ILS/0/SD_ILS:1135621 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Alam, Shahnawaz, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5291824">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Critical infrastructure protection in homeland security : defending a networked nation ent://SD_ILS/0/SD_ILS:1039666 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Lewis, T. G. (Theodore Gyle), 1941- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1813343">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems ent://SD_ILS/0/SD_ILS:1042469 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Knapp, Eric D., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1887712">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux wireless penetration testing beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux ent://SD_ILS/0/SD_ILS:1047089 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Ramachandran, Vivek, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2005211">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre XIII, &Eacute;tat des Lieux des R&eacute;f&eacute;rentiels en S&eacute;curit&eacute; des Syst&egrave;mes Num&eacute;riques Industriels : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:1145061 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709811">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre XIV, R&eacute;glementation de la Cybers&eacute;curit&eacute; et R&eacute;gime Juridique des Syst&egrave;mes Num&eacute;riques Industriels : une &eacute;tude des Dispositions R&eacute;glementaires en Cybers&eacute;curit&eacute; en France et Aux &Eacute;tats-Unis : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:1145074 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709825">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapter IV, Malveillance num&eacute;rique sur les syst&egrave;mes industriels : histoire de la menace, &eacute;v&eacute;nements embl&eacute;matiques, tendances et perspectives : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:1145079 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709831">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Comprehensive approach as 'sine qua non' for critical infrastructure protection ent://SD_ILS/0/SD_ILS:1044857 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;&#268;aleta, Denis, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1920288">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Terrorist use of cyberspace and cyber terrorism : new challenges and reponses ent://SD_ILS/0/SD_ILS:1115641 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z <a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4659193">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Ulusal bilgi g&uuml;venli&#287;i : strateji ve kurumsal yap&#305;lanma ent://SD_ILS/0/SD_ILS:286404 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;G&uuml;ng&ouml;r, Murat<br/>Format:&#160;Books<br/> Information security : a practical guide : bridging the gap between it and management ent://SD_ILS/0/SD_ILS:1049538 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Mooney, Tom, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2048580">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security of block ciphers : from algorithm design to hardware implementation ent://SD_ILS/0/SD_ILS:1103007 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Sakiyama, Kazuo, 1971- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4037343">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Two-factor authentication ent://SD_ILS/0/SD_ILS:1049535 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Stanislav, Mark, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2048577">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Building an intelligence-led security program ent://SD_ILS/0/SD_ILS:1042561 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Liska, Allan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1888751">Click to View</a><br/>Format:&#160;Electronic Resources<br/> How to define and build an effective cyber threat intelligence capability ent://SD_ILS/0/SD_ILS:1042565 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1888755">Click to View</a><br/>Format:&#160;Electronic Resources<br/> How to defeat advanced malware : new tools for protection and forensics ent://SD_ILS/0/SD_ILS:1042566 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Dalziel, Max, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1888756">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Beyond cybersecurity : protecting your digital business ent://SD_ILS/0/SD_ILS:1042775 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Kaplan, James M., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1895275">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Black hat Python : Python programming for hackers and pentesters ent://SD_ILS/0/SD_ILS:1045196 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Seitz, Justin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1931622">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Python passive network mapping : P2NMAP ent://SD_ILS/0/SD_ILS:1050504 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Hosmer, Chet, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2068785">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing social media in the enterprise ent://SD_ILS/0/SD_ILS:1053585 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2146009">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data protection and the cloud : are the risks too great? ent://SD_ILS/0/SD_ILS:1053835 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Ticher, Paul, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192125">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security technology convergence insights ent://SD_ILS/0/SD_ILS:1047505 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Bernard, Ray, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2008287">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking web intelligence : open source intelligence and web reconnaissance concepts and techniques ent://SD_ILS/0/SD_ILS:1047851 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Chauhan, Sudhanshu, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2025500">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Managing online risk : apps, mobile, and social media security ent://SD_ILS/0/SD_ILS:1038176 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Gonzalez, Deborah, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1798304">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Introduction to network security : theory and practice ent://SD_ILS/0/SD_ILS:1103122 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Wang, Jie, 1961- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040040">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Learning iOS security : enhance the security of your iOS platform and applications using iOS-centric security techniques ent://SD_ILS/0/SD_ILS:1046059 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Banks, Allister, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1973863">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Smart grid security : innovative solutions for a modernized grid ent://SD_ILS/0/SD_ILS:1053628 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Skopik, Florian, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2146995">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Applications of secure multiparty computation ent://SD_ILS/0/SD_ILS:1132914 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Laud, Peeter, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5161932">Click to View</a><br/>Format:&#160;Electronic Resources<br/> PCI compliance : understand and implement effective PCI data security standard compliance ent://SD_ILS/0/SD_ILS:1040570 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Williams, Branden R., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1832710">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Python penetration testing essentials : employ the power of Python to get the best out of pentesting ent://SD_ILS/0/SD_ILS:1045281 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Mohit, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1935712">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Python penetration testing essentials : employ the power of Python to get the best out of pentesting ent://SD_ILS/0/SD_ILS:1045286 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Mohit, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1935718">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Resilia (Tm) pocketbook : cyber resilience best practice ent://SD_ILS/0/SD_ILS:1104468 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;AXELOS Limited, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4187570">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Online safety ent://SD_ILS/0/SD_ILS:1043270 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Healey, Justin, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1899260">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mastering wireless penetration testing for highly secured environments : scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals ent://SD_ILS/0/SD_ILS:1045187 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Johns, A. (Aaron), author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1931593">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking and penetration testing with low power devices ent://SD_ILS/0/SD_ILS:1037061 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Polstra, Philip, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778476">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing the connected classroom : technology planning to keep students safe ent://SD_ILS/0/SD_ILS:1076943 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Brown, Abbie, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3317691">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber reconnaissance, surveillance, and defense ent://SD_ILS/0/SD_ILS:1040010 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Shimonski, Robert, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1820202">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Introduction to US cybersecurity careers ent://SD_ILS/0/SD_ILS:1042568 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1888758">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security intelligence : a practitioner's guide to solving enterprise security challenges ent://SD_ILS/0/SD_ILS:1042735 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Li, Qing, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1895130">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The science and technology of counterterrorism : measuring physical and electronic security risk ent://SD_ILS/0/SD_ILS:1027987 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Young, Carl S., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1641934">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber-physical attacks : a growing invisible threat ent://SD_ILS/0/SD_ILS:1050087 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Loukas, George, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2055758">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The defende&#341;s dilemma : charting a course toward cybersecurity ent://SD_ILS/0/SD_ILS:1050852 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Libicki, Martin C., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2075897">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Digital identity management ent://SD_ILS/0/SD_ILS:1047336 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Laurent, Maryline, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2007485">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The security consultant's handbook ent://SD_ILS/0/SD_ILS:1106986 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Bingley, Richard, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4395799">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Application security in the ISO 27001:2013 environment ent://SD_ILS/0/SD_ILS:1106987 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Vasudevan, Vinod, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4395800">Click to View</a><br/>Format:&#160;Electronic Resources<br/> E-commerce ent://SD_ILS/0/SD_ILS:1134531 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Mourya, S. K., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5248356">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mastering the Nmap scripting engine : master the Nmap scripting engine and the art of developing NSE scripts ent://SD_ILS/0/SD_ILS:1029883 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Pale, Paulino Calder&oacute;n, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1674847">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Dissecting the hack : the V3rb0ten network ent://SD_ILS/0/SD_ILS:1053000 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Street, Jayson E., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2098440">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Learning Puppet Security : secure your IT environments with the powerful secuity tools of Puppet ent://SD_ILS/0/SD_ILS:1046962 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Slagle, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2000943">Click to View</a><br/>Format:&#160;Electronic Resources<br/> CSA guide to cloud computing : implementing cloud privacy and security ent://SD_ILS/0/SD_ILS:1038103 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Samani, Raj, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1793946">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Group policy : fundamentals, security, and the managed desktop ent://SD_ILS/0/SD_ILS:1103167 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Moskowitz, Jeremy, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040685">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing the connected classroom : technology planning to keep students safe ent://SD_ILS/0/SD_ILS:1147728 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Brown, Abbie, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5880839">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information privacy fundamentals for librarians and information professionals ent://SD_ILS/0/SD_ILS:1040134 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Givens, Cherie L., 1969- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1821917">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Privacy rights in the Digital Age ent://SD_ILS/0/SD_ILS:1109206 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Anglim, Christopher, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4454671">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Digital privacy in the marketplace : perspectives on the information exchange ent://SD_ILS/0/SD_ILS:1044912 2025-12-30T03:00:57Z 2025-12-30T03:00:57Z by&#160;Milne, George R., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1920895">Click to View</a><br/>Format:&#160;Electronic Resources<br/>