Search Results for Computer security. - Narrowed by: 2015SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092015$0025092015$0026ps$003d300?dt=list2025-12-30T03:00:57ZWeb application security is a stack : how to CYA (Cover Your Apps) completelyent://SD_ILS/0/SD_ILS:10538362025-12-30T03:00:57Z2025-12-30T03:00:57Zby Vittie, Lori Mac, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192126">Click to View</a><br/>Format: Electronic Resources<br/>Cyber resilience best practicesent://SD_ILS/0/SD_ILS:11044672025-12-30T03:00:57Z2025-12-30T03:00:57Zby AXELOS Limited, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4187569">Click to View</a><br/>Format: Electronic Resources<br/>The network security test lab : a step-by-step guideent://SD_ILS/0/SD_ILS:11031432025-12-30T03:00:57Z2025-12-30T03:00:57Zby Gregg, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040350">Click to View</a><br/>Format: Electronic Resources<br/>Zabbix network monitoring essentials : your one-stop solution to efficient network monitoring with zabbixent://SD_ILS/0/SD_ILS:10460482025-12-30T03:00:57Z2025-12-30T03:00:57Zby Vacche, Andrea Dalle, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1973849">Click to View</a><br/>Format: Electronic Resources<br/>Computational network science : an algorithmic approachent://SD_ILS/0/SD_ILS:10381842025-12-30T03:00:57Z2025-12-30T03:00:57Zby Hexmoor, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1798312">Click to View</a><br/>Format: Electronic Resources<br/>Understanding bitcoin : cryptography, engineering and economics.ent://SD_ILS/0/SD_ILS:10401802025-12-30T03:00:57Z2025-12-30T03:00:57Zby Franco, Pedro, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1823060">Click to View</a><br/>Format: Electronic Resources<br/>Designing and building a security operations centerent://SD_ILS/0/SD_ILS:10406152025-12-30T03:00:57Z2025-12-30T03:00:57Zby Nathans, David, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1834659">Click to View</a><br/>Format: Electronic Resources<br/>Information security analytics : finding security insights, patterns and anomalies in big dataent://SD_ILS/0/SD_ILS:10416292025-12-30T03:00:57Z2025-12-30T03:00:57Zby Mark, Talabis, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1873129">Click to View</a><br/>Format: Electronic Resources<br/>Infosec management fundamentalsent://SD_ILS/0/SD_ILS:10535832025-12-30T03:00:57Z2025-12-30T03:00:57Zby Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2146007">Click to View</a><br/>Format: Electronic Resources<br/>Bent functions : results and applications to cryptographyent://SD_ILS/0/SD_ILS:10538312025-12-30T03:00:57Z2025-12-30T03:00:57Zby Tokareva, Natalia, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192079">Click to View</a><br/>Format: Electronic Resources<br/>Network attacks & exploitation : a frameworkent://SD_ILS/0/SD_ILS:11031442025-12-30T03:00:57Z2025-12-30T03:00:57Zby Monte, Matthew, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040351">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450602025-12-30T03:00:57Z2025-12-30T03:00:57Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709810">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450622025-12-30T03:00:57Z2025-12-30T03:00:57Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709812">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des Installations Industrielles. Chapter V, Des bus de terrain a l'Industrial Ethernetent://SD_ILS/0/SD_ILS:11450702025-12-30T03:00:57Z2025-12-30T03:00:57Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709821">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles. Chapitre X, Sécurité des Réseaux Industriels étendus : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450732025-12-30T03:00:57Z2025-12-30T03:00:57Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709824">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles. Chapitre II, Typologie des installations industrielles : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450772025-12-30T03:00:57Z2025-12-30T03:00:57Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709828">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles. Chapitre II, Typologie des installations industrielles : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450782025-12-30T03:00:57Z2025-12-30T03:00:57Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709829">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles. Chapter VI, Analyse des risques : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450822025-12-30T03:00:57Z2025-12-30T03:00:57Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709834">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles. Chapitre I, Mythes et réalités de la cybersécurité des systèmes numériques industriels : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450832025-12-30T03:00:57Z2025-12-30T03:00:57Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709836">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des Installations Industriellesent://SD_ILS/0/SD_ILS:11450962025-12-30T03:00:57Z2025-12-30T03:00:57Zby Fourastier, Yannick, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709851">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des Installations Industrielles : Chapitre XII Panorama de l'offre Technologique Pour la Cybersécurité Industrielleent://SD_ILS/0/SD_ILS:11450912025-12-30T03:00:57Z2025-12-30T03:00:57Zby Fourastier, Yannick, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709845">Click to View</a><br/>Format: Electronic Resources<br/>Using security patterns in web-applicationent://SD_ILS/0/SD_ILS:11356212025-12-30T03:00:57Z2025-12-30T03:00:57Zby Alam, Shahnawaz, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5291824">Click to View</a><br/>Format: Electronic Resources<br/>Critical infrastructure protection in homeland security : defending a networked nationent://SD_ILS/0/SD_ILS:10396662025-12-30T03:00:57Z2025-12-30T03:00:57Zby Lewis, T. G. (Theodore Gyle), 1941- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1813343">Click to View</a><br/>Format: Electronic Resources<br/>Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systemsent://SD_ILS/0/SD_ILS:10424692025-12-30T03:00:57Z2025-12-30T03:00:57Zby Knapp, Eric D., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1887712">Click to View</a><br/>Format: Electronic Resources<br/>Kali Linux wireless penetration testing beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linuxent://SD_ILS/0/SD_ILS:10470892025-12-30T03:00:57Z2025-12-30T03:00:57Zby Ramachandran, Vivek, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2005211">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles. Chapitre XIII, État des Lieux des Référentiels en Sécurité des Systèmes Numériques Industriels : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450612025-12-30T03:00:57Z2025-12-30T03:00:57Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709811">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles. Chapitre XIV, Réglementation de la Cybersécurité et Régime Juridique des Systèmes Numériques Industriels : une étude des Dispositions Réglementaires en Cybersécurité en France et Aux États-Unis : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450742025-12-30T03:00:57Z2025-12-30T03:00:57Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709825">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles. Chapter IV, Malveillance numérique sur les systèmes industriels : histoire de la menace, événements emblématiques, tendances et perspectives : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450792025-12-30T03:00:57Z2025-12-30T03:00:57Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709831">Click to View</a><br/>Format: Electronic Resources<br/>Comprehensive approach as 'sine qua non' for critical infrastructure protectionent://SD_ILS/0/SD_ILS:10448572025-12-30T03:00:57Z2025-12-30T03:00:57Zby Čaleta, Denis, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1920288">Click to View</a><br/>Format: Electronic Resources<br/>Terrorist use of cyberspace and cyber terrorism : new challenges and reponsesent://SD_ILS/0/SD_ILS:11156412025-12-30T03:00:57Z2025-12-30T03:00:57Z<a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4659193">Click to View</a><br/>Format: Electronic Resources<br/>Ulusal bilgi güvenliği : strateji ve kurumsal yapılanmaent://SD_ILS/0/SD_ILS:2864042025-12-30T03:00:57Z2025-12-30T03:00:57Zby Güngör, Murat<br/>Format: Books<br/>Information security : a practical guide : bridging the gap between it and managementent://SD_ILS/0/SD_ILS:10495382025-12-30T03:00:57Z2025-12-30T03:00:57Zby Mooney, Tom, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2048580">Click to View</a><br/>Format: Electronic Resources<br/>Security of block ciphers : from algorithm design to hardware implementationent://SD_ILS/0/SD_ILS:11030072025-12-30T03:00:57Z2025-12-30T03:00:57Zby Sakiyama, Kazuo, 1971- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4037343">Click to View</a><br/>Format: Electronic Resources<br/>Two-factor authenticationent://SD_ILS/0/SD_ILS:10495352025-12-30T03:00:57Z2025-12-30T03:00:57Zby Stanislav, Mark, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2048577">Click to View</a><br/>Format: Electronic Resources<br/>Building an intelligence-led security programent://SD_ILS/0/SD_ILS:10425612025-12-30T03:00:57Z2025-12-30T03:00:57Zby Liska, Allan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1888751">Click to View</a><br/>Format: Electronic Resources<br/>How to define and build an effective cyber threat intelligence capabilityent://SD_ILS/0/SD_ILS:10425652025-12-30T03:00:57Z2025-12-30T03:00:57Zby Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1888755">Click to View</a><br/>Format: Electronic Resources<br/>How to defeat advanced malware : new tools for protection and forensicsent://SD_ILS/0/SD_ILS:10425662025-12-30T03:00:57Z2025-12-30T03:00:57Zby Dalziel, Max, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1888756">Click to View</a><br/>Format: Electronic Resources<br/>Beyond cybersecurity : protecting your digital businessent://SD_ILS/0/SD_ILS:10427752025-12-30T03:00:57Z2025-12-30T03:00:57Zby Kaplan, James M., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1895275">Click to View</a><br/>Format: Electronic Resources<br/>Black hat Python : Python programming for hackers and pentestersent://SD_ILS/0/SD_ILS:10451962025-12-30T03:00:57Z2025-12-30T03:00:57Zby Seitz, Justin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1931622">Click to View</a><br/>Format: Electronic Resources<br/>Python passive network mapping : P2NMAPent://SD_ILS/0/SD_ILS:10505042025-12-30T03:00:57Z2025-12-30T03:00:57Zby Hosmer, Chet, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2068785">Click to View</a><br/>Format: Electronic Resources<br/>Securing social media in the enterpriseent://SD_ILS/0/SD_ILS:10535852025-12-30T03:00:57Z2025-12-30T03:00:57Zby Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2146009">Click to View</a><br/>Format: Electronic Resources<br/>Data protection and the cloud : are the risks too great?ent://SD_ILS/0/SD_ILS:10538352025-12-30T03:00:57Z2025-12-30T03:00:57Zby Ticher, Paul, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192125">Click to View</a><br/>Format: Electronic Resources<br/>Security technology convergence insightsent://SD_ILS/0/SD_ILS:10475052025-12-30T03:00:57Z2025-12-30T03:00:57Zby Bernard, Ray, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2008287">Click to View</a><br/>Format: Electronic Resources<br/>Hacking web intelligence : open source intelligence and web reconnaissance concepts and techniquesent://SD_ILS/0/SD_ILS:10478512025-12-30T03:00:57Z2025-12-30T03:00:57Zby Chauhan, Sudhanshu, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2025500">Click to View</a><br/>Format: Electronic Resources<br/>Managing online risk : apps, mobile, and social media securityent://SD_ILS/0/SD_ILS:10381762025-12-30T03:00:57Z2025-12-30T03:00:57Zby Gonzalez, Deborah, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1798304">Click to View</a><br/>Format: Electronic Resources<br/>Introduction to network security : theory and practiceent://SD_ILS/0/SD_ILS:11031222025-12-30T03:00:57Z2025-12-30T03:00:57Zby Wang, Jie, 1961- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040040">Click to View</a><br/>Format: Electronic Resources<br/>Learning iOS security : enhance the security of your iOS platform and applications using iOS-centric security techniquesent://SD_ILS/0/SD_ILS:10460592025-12-30T03:00:57Z2025-12-30T03:00:57Zby Banks, Allister, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1973863">Click to View</a><br/>Format: Electronic Resources<br/>Smart grid security : innovative solutions for a modernized grident://SD_ILS/0/SD_ILS:10536282025-12-30T03:00:57Z2025-12-30T03:00:57Zby Skopik, Florian, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2146995">Click to View</a><br/>Format: Electronic Resources<br/>Applications of secure multiparty computationent://SD_ILS/0/SD_ILS:11329142025-12-30T03:00:57Z2025-12-30T03:00:57Zby Laud, Peeter, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5161932">Click to View</a><br/>Format: Electronic Resources<br/>PCI compliance : understand and implement effective PCI data security standard complianceent://SD_ILS/0/SD_ILS:10405702025-12-30T03:00:57Z2025-12-30T03:00:57Zby Williams, Branden R., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1832710">Click to View</a><br/>Format: Electronic Resources<br/>Python penetration testing essentials : employ the power of Python to get the best out of pentestingent://SD_ILS/0/SD_ILS:10452812025-12-30T03:00:57Z2025-12-30T03:00:57Zby Mohit, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1935712">Click to View</a><br/>Format: Electronic Resources<br/>Python penetration testing essentials : employ the power of Python to get the best out of pentestingent://SD_ILS/0/SD_ILS:10452862025-12-30T03:00:57Z2025-12-30T03:00:57Zby Mohit, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1935718">Click to View</a><br/>Format: Electronic Resources<br/>Resilia (Tm) pocketbook : cyber resilience best practiceent://SD_ILS/0/SD_ILS:11044682025-12-30T03:00:57Z2025-12-30T03:00:57Zby AXELOS Limited, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4187570">Click to View</a><br/>Format: Electronic Resources<br/>Online safetyent://SD_ILS/0/SD_ILS:10432702025-12-30T03:00:57Z2025-12-30T03:00:57Zby Healey, Justin, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1899260">Click to View</a><br/>Format: Electronic Resources<br/>Mastering wireless penetration testing for highly secured environments : scan, exploit, and crack wireless networks by using the most advanced techniques from security professionalsent://SD_ILS/0/SD_ILS:10451872025-12-30T03:00:57Z2025-12-30T03:00:57Zby Johns, A. (Aaron), author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1931593">Click to View</a><br/>Format: Electronic Resources<br/>Hacking and penetration testing with low power devicesent://SD_ILS/0/SD_ILS:10370612025-12-30T03:00:57Z2025-12-30T03:00:57Zby Polstra, Philip, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778476">Click to View</a><br/>Format: Electronic Resources<br/>Securing the connected classroom : technology planning to keep students safeent://SD_ILS/0/SD_ILS:10769432025-12-30T03:00:57Z2025-12-30T03:00:57Zby Brown, Abbie, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3317691">Click to View</a><br/>Format: Electronic Resources<br/>Cyber reconnaissance, surveillance, and defenseent://SD_ILS/0/SD_ILS:10400102025-12-30T03:00:57Z2025-12-30T03:00:57Zby Shimonski, Robert, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1820202">Click to View</a><br/>Format: Electronic Resources<br/>Introduction to US cybersecurity careersent://SD_ILS/0/SD_ILS:10425682025-12-30T03:00:57Z2025-12-30T03:00:57Zby Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1888758">Click to View</a><br/>Format: Electronic Resources<br/>Security intelligence : a practitioner's guide to solving enterprise security challengesent://SD_ILS/0/SD_ILS:10427352025-12-30T03:00:57Z2025-12-30T03:00:57Zby Li, Qing, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1895130">Click to View</a><br/>Format: Electronic Resources<br/>The science and technology of counterterrorism : measuring physical and electronic security riskent://SD_ILS/0/SD_ILS:10279872025-12-30T03:00:57Z2025-12-30T03:00:57Zby Young, Carl S., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1641934">Click to View</a><br/>Format: Electronic Resources<br/>Cyber-physical attacks : a growing invisible threatent://SD_ILS/0/SD_ILS:10500872025-12-30T03:00:57Z2025-12-30T03:00:57Zby Loukas, George, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2055758">Click to View</a><br/>Format: Electronic Resources<br/>The defendeŕs dilemma : charting a course toward cybersecurityent://SD_ILS/0/SD_ILS:10508522025-12-30T03:00:57Z2025-12-30T03:00:57Zby Libicki, Martin C., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2075897">Click to View</a><br/>Format: Electronic Resources<br/>Digital identity managementent://SD_ILS/0/SD_ILS:10473362025-12-30T03:00:57Z2025-12-30T03:00:57Zby Laurent, Maryline, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2007485">Click to View</a><br/>Format: Electronic Resources<br/>The security consultant's handbookent://SD_ILS/0/SD_ILS:11069862025-12-30T03:00:57Z2025-12-30T03:00:57Zby Bingley, Richard, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4395799">Click to View</a><br/>Format: Electronic Resources<br/>Application security in the ISO 27001:2013 environmentent://SD_ILS/0/SD_ILS:11069872025-12-30T03:00:57Z2025-12-30T03:00:57Zby Vasudevan, Vinod, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4395800">Click to View</a><br/>Format: Electronic Resources<br/>E-commerceent://SD_ILS/0/SD_ILS:11345312025-12-30T03:00:57Z2025-12-30T03:00:57Zby Mourya, S. K., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5248356">Click to View</a><br/>Format: Electronic Resources<br/>Mastering the Nmap scripting engine : master the Nmap scripting engine and the art of developing NSE scriptsent://SD_ILS/0/SD_ILS:10298832025-12-30T03:00:57Z2025-12-30T03:00:57Zby Pale, Paulino Calderón, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1674847">Click to View</a><br/>Format: Electronic Resources<br/>Dissecting the hack : the V3rb0ten networkent://SD_ILS/0/SD_ILS:10530002025-12-30T03:00:57Z2025-12-30T03:00:57Zby Street, Jayson E., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2098440">Click to View</a><br/>Format: Electronic Resources<br/>Learning Puppet Security : secure your IT environments with the powerful secuity tools of Puppetent://SD_ILS/0/SD_ILS:10469622025-12-30T03:00:57Z2025-12-30T03:00:57Zby Slagle, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2000943">Click to View</a><br/>Format: Electronic Resources<br/>CSA guide to cloud computing : implementing cloud privacy and securityent://SD_ILS/0/SD_ILS:10381032025-12-30T03:00:57Z2025-12-30T03:00:57Zby Samani, Raj, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1793946">Click to View</a><br/>Format: Electronic Resources<br/>Group policy : fundamentals, security, and the managed desktopent://SD_ILS/0/SD_ILS:11031672025-12-30T03:00:57Z2025-12-30T03:00:57Zby Moskowitz, Jeremy, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040685">Click to View</a><br/>Format: Electronic Resources<br/>Securing the connected classroom : technology planning to keep students safeent://SD_ILS/0/SD_ILS:11477282025-12-30T03:00:57Z2025-12-30T03:00:57Zby Brown, Abbie, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5880839">Click to View</a><br/>Format: Electronic Resources<br/>Information privacy fundamentals for librarians and information professionalsent://SD_ILS/0/SD_ILS:10401342025-12-30T03:00:57Z2025-12-30T03:00:57Zby Givens, Cherie L., 1969- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1821917">Click to View</a><br/>Format: Electronic Resources<br/>Privacy rights in the Digital Ageent://SD_ILS/0/SD_ILS:11092062025-12-30T03:00:57Z2025-12-30T03:00:57Zby Anglim, Christopher, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4454671">Click to View</a><br/>Format: Electronic Resources<br/>Digital privacy in the marketplace : perspectives on the information exchangeent://SD_ILS/0/SD_ILS:10449122025-12-30T03:00:57Z2025-12-30T03:00:57Zby Milne, George R., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1920895">Click to View</a><br/>Format: Electronic Resources<br/>