Search Results for Computer security. - Narrowed by: 2015SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092015$0025092015$0026ps$003d300;jsessionid=85FB69E7522511D8569E524B7DDCA5F8?2026-01-16T06:23:04ZWeb application security is a stack : how to CYA (Cover Your Apps) completelyent://SD_ILS/0/SD_ILS:10538362026-01-16T06:23:04Z2026-01-16T06:23:04Zby Vittie, Lori Mac, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192126">Click to View</a><br/>Format: Electronic Resources<br/>Cyber resilience best practicesent://SD_ILS/0/SD_ILS:11044672026-01-16T06:23:04Z2026-01-16T06:23:04Zby AXELOS Limited, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4187569">Click to View</a><br/>Format: Electronic Resources<br/>The network security test lab : a step-by-step guideent://SD_ILS/0/SD_ILS:11031432026-01-16T06:23:04Z2026-01-16T06:23:04Zby Gregg, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040350">Click to View</a><br/>Format: Electronic Resources<br/>Zabbix network monitoring essentials : your one-stop solution to efficient network monitoring with zabbixent://SD_ILS/0/SD_ILS:10460482026-01-16T06:23:04Z2026-01-16T06:23:04Zby Vacche, Andrea Dalle, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1973849">Click to View</a><br/>Format: Electronic Resources<br/>Computational network science : an algorithmic approachent://SD_ILS/0/SD_ILS:10381842026-01-16T06:23:04Z2026-01-16T06:23:04Zby Hexmoor, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1798312">Click to View</a><br/>Format: Electronic Resources<br/>Understanding bitcoin : cryptography, engineering and economics.ent://SD_ILS/0/SD_ILS:10401802026-01-16T06:23:04Z2026-01-16T06:23:04Zby Franco, Pedro, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1823060">Click to View</a><br/>Format: Electronic Resources<br/>Infosec management fundamentalsent://SD_ILS/0/SD_ILS:10535832026-01-16T06:23:04Z2026-01-16T06:23:04Zby Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2146007">Click to View</a><br/>Format: Electronic Resources<br/>Bent functions : results and applications to cryptographyent://SD_ILS/0/SD_ILS:10538312026-01-16T06:23:04Z2026-01-16T06:23:04Zby Tokareva, Natalia, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192079">Click to View</a><br/>Format: Electronic Resources<br/>Network attacks & exploitation : a frameworkent://SD_ILS/0/SD_ILS:11031442026-01-16T06:23:04Z2026-01-16T06:23:04Zby Monte, Matthew, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040351">Click to View</a><br/>Format: Electronic Resources<br/>Using security patterns in web-applicationent://SD_ILS/0/SD_ILS:11356212026-01-16T06:23:04Z2026-01-16T06:23:04Zby Alam, Shahnawaz, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5291824">Click to View</a><br/>Format: Electronic Resources<br/>Designing and building a security operations centerent://SD_ILS/0/SD_ILS:10406152026-01-16T06:23:04Z2026-01-16T06:23:04Zby Nathans, David, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1834659">Click to View</a><br/>Format: Electronic Resources<br/>Information security analytics : finding security insights, patterns and anomalies in big dataent://SD_ILS/0/SD_ILS:10416292026-01-16T06:23:04Z2026-01-16T06:23:04Zby Mark, Talabis, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1873129">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450602026-01-16T06:23:04Z2026-01-16T06:23:04Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709810">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450622026-01-16T06:23:04Z2026-01-16T06:23:04Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709812">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des Installations Industrielles. Chapter V, Des bus de terrain a l'Industrial Ethernetent://SD_ILS/0/SD_ILS:11450702026-01-16T06:23:04Z2026-01-16T06:23:04Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709821">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles. Chapitre X, Sécurité des Réseaux Industriels étendus : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450732026-01-16T06:23:04Z2026-01-16T06:23:04Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709824">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles. Chapitre II, Typologie des installations industrielles : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450772026-01-16T06:23:04Z2026-01-16T06:23:04Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709828">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles. Chapitre II, Typologie des installations industrielles : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450782026-01-16T06:23:04Z2026-01-16T06:23:04Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709829">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles. Chapter VI, Analyse des risques : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450822026-01-16T06:23:04Z2026-01-16T06:23:04Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709834">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles. Chapitre I, Mythes et réalités de la cybersécurité des systèmes numériques industriels : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450832026-01-16T06:23:04Z2026-01-16T06:23:04Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709836">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des Installations Industrielles : Chapitre XII Panorama de l'offre Technologique Pour la Cybersécurité Industrielleent://SD_ILS/0/SD_ILS:11450912026-01-16T06:23:04Z2026-01-16T06:23:04Zby Fourastier, Yannick, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709845">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des Installations Industriellesent://SD_ILS/0/SD_ILS:11450962026-01-16T06:23:04Z2026-01-16T06:23:04Zby Fourastier, Yannick, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709851">Click to View</a><br/>Format: Electronic Resources<br/>Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systemsent://SD_ILS/0/SD_ILS:10424692026-01-16T06:23:04Z2026-01-16T06:23:04Zby Knapp, Eric D., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1887712">Click to View</a><br/>Format: Electronic Resources<br/>Kali Linux wireless penetration testing beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linuxent://SD_ILS/0/SD_ILS:10470892026-01-16T06:23:04Z2026-01-16T06:23:04Zby Ramachandran, Vivek, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2005211">Click to View</a><br/>Format: Electronic Resources<br/>Critical infrastructure protection in homeland security : defending a networked nationent://SD_ILS/0/SD_ILS:10396662026-01-16T06:23:04Z2026-01-16T06:23:04Zby Lewis, T. G. (Theodore Gyle), 1941- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1813343">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles. Chapitre XIII, État des Lieux des Référentiels en Sécurité des Systèmes Numériques Industriels : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450612026-01-16T06:23:04Z2026-01-16T06:23:04Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709811">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles. Chapitre XIV, Réglementation de la Cybersécurité et Régime Juridique des Systèmes Numériques Industriels : une étude des Dispositions Réglementaires en Cybersécurité en France et Aux États-Unis : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450742026-01-16T06:23:04Z2026-01-16T06:23:04Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709825">Click to View</a><br/>Format: Electronic Resources<br/>Cybersécurité des installations industrielles. Chapter IV, Malveillance numérique sur les systèmes industriels : histoire de la menace, événements emblématiques, tendances et perspectives : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450792026-01-16T06:23:04Z2026-01-16T06:23:04Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709831">Click to View</a><br/>Format: Electronic Resources<br/>Comprehensive approach as 'sine qua non' for critical infrastructure protectionent://SD_ILS/0/SD_ILS:10448572026-01-16T06:23:04Z2026-01-16T06:23:04Zby Čaleta, Denis, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1920288">Click to View</a><br/>Format: Electronic Resources<br/>Terrorist use of cyberspace and cyber terrorism : new challenges and reponsesent://SD_ILS/0/SD_ILS:11156412026-01-16T06:23:04Z2026-01-16T06:23:04Z<a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4659193">Click to View</a><br/>Format: Electronic Resources<br/>Ulusal bilgi güvenliği : strateji ve kurumsal yapılanmaent://SD_ILS/0/SD_ILS:2864042026-01-16T06:23:04Z2026-01-16T06:23:04Zby Güngör, Murat<br/>Format: Books<br/>Information security : a practical guide : bridging the gap between it and managementent://SD_ILS/0/SD_ILS:10495382026-01-16T06:23:04Z2026-01-16T06:23:04Zby Mooney, Tom, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2048580">Click to View</a><br/>Format: Electronic Resources<br/>Security of block ciphers : from algorithm design to hardware implementationent://SD_ILS/0/SD_ILS:11030072026-01-16T06:23:04Z2026-01-16T06:23:04Zby Sakiyama, Kazuo, 1971- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4037343">Click to View</a><br/>Format: Electronic Resources<br/>Two-factor authenticationent://SD_ILS/0/SD_ILS:10495352026-01-16T06:23:04Z2026-01-16T06:23:04Zby Stanislav, Mark, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2048577">Click to View</a><br/>Format: Electronic Resources<br/>Building an intelligence-led security programent://SD_ILS/0/SD_ILS:10425612026-01-16T06:23:04Z2026-01-16T06:23:04Zby Liska, Allan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1888751">Click to View</a><br/>Format: Electronic Resources<br/>How to define and build an effective cyber threat intelligence capabilityent://SD_ILS/0/SD_ILS:10425652026-01-16T06:23:04Z2026-01-16T06:23:04Zby Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1888755">Click to View</a><br/>Format: Electronic Resources<br/>How to defeat advanced malware : new tools for protection and forensicsent://SD_ILS/0/SD_ILS:10425662026-01-16T06:23:04Z2026-01-16T06:23:04Zby Dalziel, Max, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1888756">Click to View</a><br/>Format: Electronic Resources<br/>Beyond cybersecurity : protecting your digital businessent://SD_ILS/0/SD_ILS:10427752026-01-16T06:23:04Z2026-01-16T06:23:04Zby Kaplan, James M., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1895275">Click to View</a><br/>Format: Electronic Resources<br/>Securing social media in the enterpriseent://SD_ILS/0/SD_ILS:10535852026-01-16T06:23:04Z2026-01-16T06:23:04Zby Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2146009">Click to View</a><br/>Format: Electronic Resources<br/>Data protection and the cloud : are the risks too great?ent://SD_ILS/0/SD_ILS:10538352026-01-16T06:23:04Z2026-01-16T06:23:04Zby Ticher, Paul, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192125">Click to View</a><br/>Format: Electronic Resources<br/>Python passive network mapping : P2NMAPent://SD_ILS/0/SD_ILS:10505042026-01-16T06:23:04Z2026-01-16T06:23:04Zby Hosmer, Chet, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2068785">Click to View</a><br/>Format: Electronic Resources<br/>Black hat Python : Python programming for hackers and pentestersent://SD_ILS/0/SD_ILS:10451962026-01-16T06:23:04Z2026-01-16T06:23:04Zby Seitz, Justin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1931622">Click to View</a><br/>Format: Electronic Resources<br/>Security technology convergence insightsent://SD_ILS/0/SD_ILS:10475052026-01-16T06:23:04Z2026-01-16T06:23:04Zby Bernard, Ray, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2008287">Click to View</a><br/>Format: Electronic Resources<br/>Hacking web intelligence : open source intelligence and web reconnaissance concepts and techniquesent://SD_ILS/0/SD_ILS:10478512026-01-16T06:23:04Z2026-01-16T06:23:04Zby Chauhan, Sudhanshu, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2025500">Click to View</a><br/>Format: Electronic Resources<br/>Introduction to network security : theory and practiceent://SD_ILS/0/SD_ILS:11031222026-01-16T06:23:04Z2026-01-16T06:23:04Zby Wang, Jie, 1961- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040040">Click to View</a><br/>Format: Electronic Resources<br/>Managing online risk : apps, mobile, and social media securityent://SD_ILS/0/SD_ILS:10381762026-01-16T06:23:04Z2026-01-16T06:23:04Zby Gonzalez, Deborah, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1798304">Click to View</a><br/>Format: Electronic Resources<br/>Smart grid security : innovative solutions for a modernized grident://SD_ILS/0/SD_ILS:10536282026-01-16T06:23:04Z2026-01-16T06:23:04Zby Skopik, Florian, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2146995">Click to View</a><br/>Format: Electronic Resources<br/>Learning iOS security : enhance the security of your iOS platform and applications using iOS-centric security techniquesent://SD_ILS/0/SD_ILS:10460592026-01-16T06:23:04Z2026-01-16T06:23:04Zby Banks, Allister, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1973863">Click to View</a><br/>Format: Electronic Resources<br/>Applications of secure multiparty computationent://SD_ILS/0/SD_ILS:11329142026-01-16T06:23:04Z2026-01-16T06:23:04Zby Laud, Peeter, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5161932">Click to View</a><br/>Format: Electronic Resources<br/>Python penetration testing essentials : employ the power of Python to get the best out of pentestingent://SD_ILS/0/SD_ILS:10452812026-01-16T06:23:04Z2026-01-16T06:23:04Zby Mohit, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1935712">Click to View</a><br/>Format: Electronic Resources<br/>Python penetration testing essentials : employ the power of Python to get the best out of pentestingent://SD_ILS/0/SD_ILS:10452862026-01-16T06:23:04Z2026-01-16T06:23:04Zby Mohit, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1935718">Click to View</a><br/>Format: Electronic Resources<br/>Resilia (Tm) pocketbook : cyber resilience best practiceent://SD_ILS/0/SD_ILS:11044682026-01-16T06:23:04Z2026-01-16T06:23:04Zby AXELOS Limited, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4187570">Click to View</a><br/>Format: Electronic Resources<br/>PCI compliance : understand and implement effective PCI data security standard complianceent://SD_ILS/0/SD_ILS:10405702026-01-16T06:23:04Z2026-01-16T06:23:04Zby Williams, Branden R., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1832710">Click to View</a><br/>Format: Electronic Resources<br/>Online safetyent://SD_ILS/0/SD_ILS:10432702026-01-16T06:23:04Z2026-01-16T06:23:04Zby Healey, Justin, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1899260">Click to View</a><br/>Format: Electronic Resources<br/>Mastering wireless penetration testing for highly secured environments : scan, exploit, and crack wireless networks by using the most advanced techniques from security professionalsent://SD_ILS/0/SD_ILS:10451872026-01-16T06:23:04Z2026-01-16T06:23:04Zby Johns, A. (Aaron), author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1931593">Click to View</a><br/>Format: Electronic Resources<br/>Hacking and penetration testing with low power devicesent://SD_ILS/0/SD_ILS:10370612026-01-16T06:23:04Z2026-01-16T06:23:04Zby Polstra, Philip, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778476">Click to View</a><br/>Format: Electronic Resources<br/>Securing the connected classroom : technology planning to keep students safeent://SD_ILS/0/SD_ILS:10769432026-01-16T06:23:04Z2026-01-16T06:23:04Zby Brown, Abbie, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3317691">Click to View</a><br/>Format: Electronic Resources<br/>Introduction to US cybersecurity careersent://SD_ILS/0/SD_ILS:10425682026-01-16T06:23:04Z2026-01-16T06:23:04Zby Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1888758">Click to View</a><br/>Format: Electronic Resources<br/>Security intelligence : a practitioner's guide to solving enterprise security challengesent://SD_ILS/0/SD_ILS:10427352026-01-16T06:23:04Z2026-01-16T06:23:04Zby Li, Qing, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1895130">Click to View</a><br/>Format: Electronic Resources<br/>Cyber-physical attacks : a growing invisible threatent://SD_ILS/0/SD_ILS:10500872026-01-16T06:23:04Z2026-01-16T06:23:04Zby Loukas, George, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2055758">Click to View</a><br/>Format: Electronic Resources<br/>The defendeŕs dilemma : charting a course toward cybersecurityent://SD_ILS/0/SD_ILS:10508522026-01-16T06:23:04Z2026-01-16T06:23:04Zby Libicki, Martin C., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2075897">Click to View</a><br/>Format: Electronic Resources<br/>Digital identity managementent://SD_ILS/0/SD_ILS:10473362026-01-16T06:23:04Z2026-01-16T06:23:04Zby Laurent, Maryline, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2007485">Click to View</a><br/>Format: Electronic Resources<br/>The security consultant's handbookent://SD_ILS/0/SD_ILS:11069862026-01-16T06:23:04Z2026-01-16T06:23:04Zby Bingley, Richard, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4395799">Click to View</a><br/>Format: Electronic Resources<br/>Application security in the ISO 27001:2013 environmentent://SD_ILS/0/SD_ILS:11069872026-01-16T06:23:04Z2026-01-16T06:23:04Zby Vasudevan, Vinod, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4395800">Click to View</a><br/>Format: Electronic Resources<br/>E-commerceent://SD_ILS/0/SD_ILS:11345312026-01-16T06:23:04Z2026-01-16T06:23:04Zby Mourya, S. K., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5248356">Click to View</a><br/>Format: Electronic Resources<br/>Cyber reconnaissance, surveillance, and defenseent://SD_ILS/0/SD_ILS:10400102026-01-16T06:23:04Z2026-01-16T06:23:04Zby Shimonski, Robert, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1820202">Click to View</a><br/>Format: Electronic Resources<br/>The science and technology of counterterrorism : measuring physical and electronic security riskent://SD_ILS/0/SD_ILS:10279872026-01-16T06:23:04Z2026-01-16T06:23:04Zby Young, Carl S., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1641934">Click to View</a><br/>Format: Electronic Resources<br/>Dissecting the hack : the V3rb0ten networkent://SD_ILS/0/SD_ILS:10530002026-01-16T06:23:04Z2026-01-16T06:23:04Zby Street, Jayson E., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2098440">Click to View</a><br/>Format: Electronic Resources<br/>Learning Puppet Security : secure your IT environments with the powerful secuity tools of Puppetent://SD_ILS/0/SD_ILS:10469622026-01-16T06:23:04Z2026-01-16T06:23:04Zby Slagle, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2000943">Click to View</a><br/>Format: Electronic Resources<br/>Group policy : fundamentals, security, and the managed desktopent://SD_ILS/0/SD_ILS:11031672026-01-16T06:23:04Z2026-01-16T06:23:04Zby Moskowitz, Jeremy, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040685">Click to View</a><br/>Format: Electronic Resources<br/>CSA guide to cloud computing : implementing cloud privacy and securityent://SD_ILS/0/SD_ILS:10381032026-01-16T06:23:04Z2026-01-16T06:23:04Zby Samani, Raj, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1793946">Click to View</a><br/>Format: Electronic Resources<br/>Mastering the Nmap scripting engine : master the Nmap scripting engine and the art of developing NSE scriptsent://SD_ILS/0/SD_ILS:10298832026-01-16T06:23:04Z2026-01-16T06:23:04Zby Pale, Paulino Calderón, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1674847">Click to View</a><br/>Format: Electronic Resources<br/>Securing the connected classroom : technology planning to keep students safeent://SD_ILS/0/SD_ILS:11477282026-01-16T06:23:04Z2026-01-16T06:23:04Zby Brown, Abbie, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5880839">Click to View</a><br/>Format: Electronic Resources<br/>Privacy rights in the Digital Ageent://SD_ILS/0/SD_ILS:11092062026-01-16T06:23:04Z2026-01-16T06:23:04Zby Anglim, Christopher, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4454671">Click to View</a><br/>Format: Electronic Resources<br/>Information privacy fundamentals for librarians and information professionalsent://SD_ILS/0/SD_ILS:10401342026-01-16T06:23:04Z2026-01-16T06:23:04Zby Givens, Cherie L., 1969- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1821917">Click to View</a><br/>Format: Electronic Resources<br/>Digital privacy in the marketplace : perspectives on the information exchangeent://SD_ILS/0/SD_ILS:10449122026-01-16T06:23:04Z2026-01-16T06:23:04Zby Milne, George R., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1920895">Click to View</a><br/>Format: Electronic Resources<br/>