Search Results for Computer security. - Narrowed by: Computer security. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300?dt=list 2026-04-02T20:10:51Z Computer security ent://SD_ILS/0/SD_ILS:1175090 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Hsiao, David K., 1933-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123576507">https://www.sciencedirect.com/science/book/9780123576507</a><br/>Format:&#160;Electronic Resources<br/> Computer security ent://SD_ILS/0/SD_ILS:1175962 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Carroll, John M. (John Millar), 1925-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780409900323">https://www.sciencedirect.com/science/book/9780409900323</a><br/>Format:&#160;Electronic Resources<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:955637 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=453166">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information assurance and computer security ent://SD_ILS/0/SD_ILS:938176 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;NATO Advanced Research Workshop on Information Assurance and Computer Security (2005 : T?etouan, Morocco)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=287000">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer security : art and science ent://SD_ILS/0/SD_ILS:64506 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Bishop, Matt (Matthew A.)<br/>Format:&#160;Books<br/> Computer security : awareness for the home ent://SD_ILS/0/SD_ILS:1127161 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Cyborski, Shannon, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4876967">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information management &amp; computer security. Volume 15, Number 5, Papers from the HAISA 2007 Symposium ent://SD_ILS/0/SD_ILS:944119 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328737">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Essential computer security everyone's guide to e-mail, internet, and wireless security ent://SD_ILS/0/SD_ILS:943350 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Bradley, Tony.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=319200">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Essential computer security : everyone's guide to e-mail, internet, and wireless security ent://SD_ILS/0/SD_ILS:1186419 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Bradley, Tony, 1969-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491143">https://www.sciencedirect.com/science/book/9781597491143</a><br/>Format:&#160;Electronic Resources<br/> Risk management for computer security Protecting your network and information assets ent://SD_ILS/0/SD_ILS:939658 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Jones, Andy, 1952-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294671">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing the cloud cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:977055 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Winkler, J. R. (Joachim R.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=686827">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing the cloud : cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:1183743 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Winkler, J. R. (Joachim R.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format:&#160;Electronic Resources<br/> Computer Communication, Networking and Internet Security Proceedings of IC3T 2016 ent://SD_ILS/0/SD_ILS:481714 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3226-4">http://dx.doi.org/10.1007/978-981-10-3226-4</a><br/>Format:&#160;Electronic Resources<br/> Securing the cloud cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:137201 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Winkler, J. R. (Joachim R.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format:&#160;Electronic Resources<br/> Trust and security in collaborative computing ent://SD_ILS/0/SD_ILS:1030255 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Zou, Xukai, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1679354">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013 ent://SD_ILS/0/SD_ILS:1035010 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Ginodman, Veniamin, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1752831">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security issues of IT outsourcing ent://SD_ILS/0/SD_ILS:938018 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Gritzalis, Stefanos.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=285536">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Defense and detection strategies against Internet worms ent://SD_ILS/0/SD_ILS:931019 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Nazario, Jose.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227660">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information assurance dependability and security in networked systems ent://SD_ILS/0/SD_ILS:944016 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Qian, Yi, 1962-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328312">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing information and communications systems principles, technologies, and applications ent://SD_ILS/0/SD_ILS:956326 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Furnell, Steven, 1970-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456881">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information assurance : dependability and security in networked systems ent://SD_ILS/0/SD_ILS:1189195 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Qian, Yi, 1962-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123735669">https://www.sciencedirect.com/science/book/9780123735669</a><br/>Format:&#160;Electronic Resources<br/> User's guide to cryptography and standards ent://SD_ILS/0/SD_ILS:931017 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Dent, Alexander W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227658">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Privacy protection and computer forensics ent://SD_ILS/0/SD_ILS:931051 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Caloyannides, Michael A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227692">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Techniques and applications of digital watermarking and content protection ent://SD_ILS/0/SD_ILS:930949 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Arnold, Michael (Michael Konrad), 1964-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227587">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security technologies for the World Wide Web ent://SD_ILS/0/SD_ILS:930980 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Oppliger, Rolf.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227620">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Digital watermarking and steganography ent://SD_ILS/0/SD_ILS:944015 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Cox, I. J. (Ingemar J.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328311">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Digital watermarking and steganography ent://SD_ILS/0/SD_ILS:1189196 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Cox, I. J. (Ingemar J.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123725851">http://www.sciencedirect.com/science/book/9780123725851</a><br/>Format:&#160;Electronic Resources<br/> Contemporary cryptography ent://SD_ILS/0/SD_ILS:931287 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Oppliger, Rolf.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=231638">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Bluetooth security ent://SD_ILS/0/SD_ILS:931009 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Gehrmann, Christian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227650">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Role-based access control ent://SD_ILS/0/SD_ILS:930991 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Ferraiolo, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227631">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Developing secure distributed systems with CORBA ent://SD_ILS/0/SD_ILS:930964 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Lang, Ulrich.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227602">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Summary of discussions at a planning meeting on cyber-security and the insider threat to classified information ent://SD_ILS/0/SD_ILS:1084889 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;National Research Council (U.S.). Computer Science and Telecommunications Board.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3377658">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Best damn firewall book period ent://SD_ILS/0/SD_ILS:944260 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=330100">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors ent://SD_ILS/0/SD_ILS:1146214 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Carpenter, Perry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5763515">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The business of cybersecurity : foundations and ideologies ent://SD_ILS/0/SD_ILS:1146381 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Sathnur, Ashwini, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5770273">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Understanding security issues ent://SD_ILS/0/SD_ILS:1132529 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Donaldson, Scott E., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5157542">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security and resilience in intelligent data-centric systems and communication networks ent://SD_ILS/0/SD_ILS:1130161 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Ficco, Massimo, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5090270">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IT-Sicherheitsanalysen : Ein prozessorientiertes Vorgehensmodell ent://SD_ILS/0/SD_ILS:1124797 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Simi&#263;, Daniela, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4830572">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network performance and security : testing and analyzing using open source and low-cost tools ent://SD_ILS/0/SD_ILS:1109063 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Chapman, Chris, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4452265">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security 2020 reduce security risks this decade ent://SD_ILS/0/SD_ILS:978416 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Howard, Doug.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=694289">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber adversary characterization auditing the hacker mind ent://SD_ILS/0/SD_ILS:939469 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Parker, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294071">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity operations handbook ent://SD_ILS/0/SD_ILS:942613 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Rittinghouse, John W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=313612">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Empirical research for software security : foundations and experience ent://SD_ILS/0/SD_ILS:1132973 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;ben Othmane, Lotfi, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5164090">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Breaking into information security : crafting a custom career path to get the job you really want ent://SD_ILS/0/SD_ILS:1104442 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;More, Josh, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4187289">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Threat modeling : designing for security ent://SD_ILS/0/SD_ILS:1027048 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Shostack, Adam.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629177">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network security a practical guide ent://SD_ILS/0/SD_ILS:940334 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Poole, Owen.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=298471">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The misuse of information systems the impact of security countermeasures ent://SD_ILS/0/SD_ILS:1058044 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;D'Arcy, John P., 1975-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3016826">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information security best practices : 205 basic rules ent://SD_ILS/0/SD_ILS:1188318 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Stefanek, George L.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781878707963">https://www.sciencedirect.com/science/book/9781878707963</a><br/>Format:&#160;Electronic Resources<br/> Siber g&uuml;venlik ent://SD_ILS/0/SD_ILS:668303 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Canl&#305;, Mustafa<br/>Format:&#160;Books<br/> Yaz&#305;l&#305;m g&uuml;venli&#287;i sald&#305;r&#305; ve savunma ent://SD_ILS/0/SD_ILS:291569 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Demir, B&uuml;nyamin<br/>Format:&#160;Books<br/> Cyber smart : five habits to protect your family, money, and identity from cyber criminals ent://SD_ILS/0/SD_ILS:1143906 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;McDonough, Bart, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5612908">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data breach preparation and response : breaches are certain, impact is not ent://SD_ILS/0/SD_ILS:1113216 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Fowler, Kevvie, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4556899">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Web application security is a stack : how to CYA (Cover Your Apps) completely ent://SD_ILS/0/SD_ILS:1053836 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Vittie, Lori Mac, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192126">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Assessing information security : strategies, tactics, logic and framework ent://SD_ILS/0/SD_ILS:1053834 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Vladimirov, A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192124">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security risk management building an information security risk management program from the ground up ent://SD_ILS/0/SD_ILS:976804 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Wheeler, Evan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=685406">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Adaptive security management architecture ent://SD_ILS/0/SD_ILS:972238 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=625004">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Buffer overflow attacks detect, exploit, prevent ent://SD_ILS/0/SD_ILS:930207 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Foster, James C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=222803">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network security evaluation using the NSA IEM ent://SD_ILS/0/SD_ILS:933866 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Fuller, Ed.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254842">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Silence on the wire a field guide to passive reconnaissance and indirect attacks ent://SD_ILS/0/SD_ILS:936579 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273504">Click to View</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at Configuring ISA Server 2004 ent://SD_ILS/0/SD_ILS:933877 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Shinder, Dr. Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254853">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking the code ASP. NET web application security ent://SD_ILS/0/SD_ILS:939506 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Burnett, Mark (Mark M.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294160">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security sage's guide to hardening the network infrastructure ent://SD_ILS/0/SD_ILS:939571 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Andr&eacute;s, Steven.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294359">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network security foundations ent://SD_ILS/0/SD_ILS:935040 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Strebe, Matthew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=267332">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Snort 2.0 intrusion detection ent://SD_ILS/0/SD_ILS:939575 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Beale, Jay.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294371">Click to View</a><br/>Format:&#160;Electronic Resources<br/> OS X incident response : scripting and analysis ent://SD_ILS/0/SD_ILS:1111334 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Bradley, Jaron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4526010">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber resilience best practices ent://SD_ILS/0/SD_ILS:1104467 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;AXELOS Limited, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4187569">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber security and IT infrastructure protection ent://SD_ILS/0/SD_ILS:1018941 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1377640">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Web application defender's cookbook battling hackers and protecting users ent://SD_ILS/0/SD_ILS:1006627 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Barnett, Ryan C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108733">Click to View</a><br/>Format:&#160;Electronic Resources<br/> An introduction to information security and ISO27001:2013 : a pocket guide ent://SD_ILS/0/SD_ILS:1020992 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Watkins, Steve G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1463578">Click to View</a><br/>Format:&#160;Electronic Resources<br/> ISO27001 / ISO27002 : a pocket guide ent://SD_ILS/0/SD_ILS:1020993 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Calder, Alan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1463579">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer Forensics jumpstart ent://SD_ILS/0/SD_ILS:973680 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Solomon, Michael R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=661659">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mac security bible ent://SD_ILS/0/SD_ILS:960377 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Kissell, Joe.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=477803">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking the art of exploitation ent://SD_ILS/0/SD_ILS:1009955 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137538">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Innocent code a security wake-up call for Web programmers ent://SD_ILS/0/SD_ILS:929474 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Huseby, Sverre H.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=210558">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Stealing the network how to own a continent ent://SD_ILS/0/SD_ILS:939580 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Rogers, Russ.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294377">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking the art of exploitation ent://SD_ILS/0/SD_ILS:936567 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273488">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing Windows 2000 ent://SD_ILS/0/SD_ILS:939501 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Todd, Chad.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294154">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security and privacy in the digital era. Volume 1 ent://SD_ILS/0/SD_ILS:1115270 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Guerrier, Claudine, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4648717">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies ent://SD_ILS/0/SD_ILS:1145686 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Le, Dac-Nhuong, 1983- editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5741215">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux ent://SD_ILS/0/SD_ILS:1031737 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Buchanan, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1688607">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:1032266 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Andress, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1699255">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking point of sale : payment application secrets, threats, and solutions ent://SD_ILS/0/SD_ILS:1027046 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Gomzin, Slava.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629175">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking for dummies ent://SD_ILS/0/SD_ILS:1006251 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Beaver, Kevin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1106542">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IBM mainframe security beyond the basics : a practical guide from a z/OS and RACF perspective ent://SD_ILS/0/SD_ILS:1019878 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Dattani, Dinesh D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1411689">Click to View</a><br/>Format:&#160;Electronic Resources<br/> A multidisciplinary introduction to information security ent://SD_ILS/0/SD_ILS:1028416 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Mj&oslash;lsnes, Stig F., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1648315">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Forefront UAG 2010 administrator's handbook take full command of Microsoft Forefront Unified Access Gateway to secure your business applications and provide dynamic remote access with DirectAccess ent://SD_ILS/0/SD_ILS:996844 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Ben-Ari, Erez.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948568">Click to View</a><br/>Format:&#160;Electronic Resources<br/> MCSE designing security for a Windows Server 2003 network : exam 70-298 study guide &amp; DVD training system ent://SD_ILS/0/SD_ILS:939533 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Khnaser, Elias N.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294253">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security secrets, intruders and ID tags. ent://SD_ILS/0/SD_ILS:1092043 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411447">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Applied network security monitoring : collection, detection, and analysis ent://SD_ILS/0/SD_ILS:1023659 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Sanders, Chris, 1986-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1574451">Click to View</a><br/>Format:&#160;Electronic Resources<br/> SQL injection attacks and defense ent://SD_ILS/0/SD_ILS:997287 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Clarke, Justin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=953188">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Web commerce security design and development ent://SD_ILS/0/SD_ILS:978975 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Nahari, Hadi.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706729">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The basics of information security understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:133592 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Andress, Jason.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format:&#160;Electronic Resources<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:1183815 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Andress, Jason.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496537">https://www.sciencedirect.com/science/book/9781597496537</a><br/>Format:&#160;Electronic Resources<br/> Host integrity monitoring : using Osiris and Samhain ent://SD_ILS/0/SD_ILS:1188245 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Wotring, Brian.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490184">http://www.sciencedirect.com/science/book/9781597490184</a><br/>Format:&#160;Electronic Resources<br/> Intrusion prevention and active response : deploying network and host IPS ent://SD_ILS/0/SD_ILS:1188400 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Rash, Michael.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266474">http://www.sciencedirect.com/science/book/9781932266474</a><br/>Format:&#160;Electronic Resources<br/> Wireless operational security ent://SD_ILS/0/SD_ILS:1188104 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583170">http://www.sciencedirect.com/science/book/9781555583170</a> ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583170">https://www.sciencedirect.com/science/book/9781555583170</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest USB attacks ent://SD_ILS/0/SD_ILS:1178020 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Anderson, Brian (Brian James)<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495530">https://www.sciencedirect.com/science/book/9781597495530</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity operations handbook ent://SD_ILS/0/SD_ILS:1188095 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Rittinghouse, John W.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583064">https://www.sciencedirect.com/science/book/9781555583064</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing ColdFusion ent://SD_ILS/0/SD_ILS:1188358 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Meyer, Greg.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994770">http://www.sciencedirect.com/science/book/9781928994770</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing your Web applications ent://SD_ILS/0/SD_ILS:1188343 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Traxler, Julie.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994312">https://www.sciencedirect.com/science/book/9781928994312</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing Sun Solaris 8 ent://SD_ILS/0/SD_ILS:1188485 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Miles, Wyman.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994442">http://www.sciencedirect.com/science/book/9781928994442</a><br/>Format:&#160;Electronic Resources<br/> Information technology security fundamentals ent://SD_ILS/0/SD_ILS:1102697 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Sagers, Glen., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4009415">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Next generation SSH2 implementation : securing data in motion ent://SD_ILS/0/SD_ILS:1191763 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Liu, Dale.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492836">https://www.sciencedirect.com/science/book/9781597492836</a><br/>Format:&#160;Electronic Resources<br/> Microsoft forefront security administration guide ent://SD_ILS/0/SD_ILS:1189120 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Varsalone, Jesse.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492447">https://www.sciencedirect.com/science/book/9781597492447</a><br/>Format:&#160;Electronic Resources<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:1188248 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490214">https://www.sciencedirect.com/science/book/9781597490214</a><br/>Format:&#160;Electronic Resources<br/> Implementing homeland security for enterprise IT ent://SD_ILS/0/SD_ILS:1188099 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Erbschloe, Michael.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">http://www.sciencedirect.com/science/book/9781555583125</a><br/>Format:&#160;Electronic Resources<br/> Cyber adversary characterization : auditing the hacker mind ent://SD_ILS/0/SD_ILS:1188369 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Parker, Tom.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836111">http://www.sciencedirect.com/science/book/9781931836111</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing Windows 2000 ent://SD_ILS/0/SD_ILS:1188381 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Todd, Chad.<br/><a href="http://www.sciencedirect.com/science/book/9781931836494">Available from ScienceDirect. Online version available for university members only. This requires an institutional login off-campus</a> ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836494">https://www.sciencedirect.com/science/book/9781931836494</a><br/>Format:&#160;Electronic Resources<br/> Scene of the cybercrime. ent://SD_ILS/0/SD_ILS:1189665 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Cross, Michael, 1965-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492768">https://www.sciencedirect.com/science/book/9781597492768</a><br/>Format:&#160;Electronic Resources<br/> Syngress force emerging threat analysis : from mischief to malicious ent://SD_ILS/0/SD_ILS:1186339 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">http://www.sciencedirect.com/science/book/9781597490566</a><br/>Format:&#160;Electronic Resources<br/> OSSEC host-based intrusion detection guide ent://SD_ILS/0/SD_ILS:1189620 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Hay, Andrew.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492409">http://www.sciencedirect.com/science/book/9781597492409</a><br/>Format:&#160;Electronic Resources<br/> Techno Security's guide to managing risks : for IT managers, auditors, and investigators ent://SD_ILS/0/SD_ILS:1188280 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Wiles, Jack.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">http://www.sciencedirect.com/science/book/9781597491389</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutions ent://SD_ILS/0/SD_ILS:1130588 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Sharma, Himanshu, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5108416">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Practical anonymity hiding in plain sight online ent://SD_ILS/0/SD_ILS:1007614 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Loshin, Peter.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115167">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data visualization. Part 2 ent://SD_ILS/0/SD_ILS:1024206 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Assam, Tarek.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1579356">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasures ent://SD_ILS/0/SD_ILS:939483 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Contos, Brian T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294116">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Zabbix network monitoring essentials : your one-stop solution to efficient network monitoring with zabbix ent://SD_ILS/0/SD_ILS:1046048 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Vacche, Andrea Dalle, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1973849">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer forensics with FTK : enhance your computer forensics knowledge through illustrations, tips, tricks, and practical real-world scenarios ent://SD_ILS/0/SD_ILS:1029107 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Carbone, Fernando, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1657797">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Toward a safer and more secure cyberspace ent://SD_ILS/0/SD_ILS:1085452 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Goodman, Seymour E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3378311">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Dr. Tom Shinder's configuring ISA Server 2004 ent://SD_ILS/0/SD_ILS:939479 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294094">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Configuring ISA server 2000 building firewalls for windows 2000 ent://SD_ILS/0/SD_ILS:939460 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294054">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Check Point NGX R65 security administration ent://SD_ILS/0/SD_ILS:1189122 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Bonnell, Ralph.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492454">http://www.sciencedirect.com/science/book/9781597492454</a><br/>Format:&#160;Electronic Resources<br/> Stealing the network : how to own a continent ent://SD_ILS/0/SD_ILS:1188367 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;131ah.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836050">http://www.sciencedirect.com/science/book/9781931836050</a><br/>Format:&#160;Electronic Resources<br/> Zero day exploit : countdown to darkness ent://SD_ILS/0/SD_ILS:1188489 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Shein, Rob.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836098">http://www.sciencedirect.com/science/book/9781931836098</a><br/>Format:&#160;Electronic Resources<br/> Dns security : defending the domain name system ent://SD_ILS/0/SD_ILS:1113215 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Liska, Allan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4556898">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computational network science : an algorithmic approach ent://SD_ILS/0/SD_ILS:1038184 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Hexmoor, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1798312">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Ethereal packet sniffing ent://SD_ILS/0/SD_ILS:939485 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Orebaugh, Angela.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294122">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Fuzzing for software security testing and quality assurance ent://SD_ILS/0/SD_ILS:956329 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Takanen, Ari.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456884">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Nessus, Snort, &amp; Ethereal power tools customizing open source security applications ent://SD_ILS/0/SD_ILS:933863 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Archibald, Neil.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254839">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security in fixed and wireless networks ent://SD_ILS/0/SD_ILS:1115585 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Sch&auml;fer, G&uuml;nter, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4658592">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Building a corporate culture of security : strategies for strengthening organizational resiliency ent://SD_ILS/0/SD_ILS:1108349 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Sullivant, John, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4425984">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Pragmatic security metrics applying metametrics to information security ent://SD_ILS/0/SD_ILS:1010972 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Brotby, W. Krag.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1153198">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The tangled Web a guide to securing modern Web applications ent://SD_ILS/0/SD_ILS:1009976 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137574">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Identity management concepts, technologies, and systems ent://SD_ILS/0/SD_ILS:972507 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Bertino, Elisa.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=634511">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Secure computer and network systems modeling, analysis and design ent://SD_ILS/0/SD_ILS:946385 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Ye, Nong.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=351427">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security data visualization graphical techniques for network analysis ent://SD_ILS/0/SD_ILS:1058454 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Conti, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3017625">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Developer's guide to web application security ent://SD_ILS/0/SD_ILS:938521 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Cross, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=289735">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Host integrity monitoring using Osiris and Samhain ent://SD_ILS/0/SD_ILS:931606 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Wotring, Brian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=233599">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing ColdFusion ent://SD_ILS/0/SD_ILS:939498 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Meyer, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294151">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The five technological forces disrupting security : how social, mobile, cloud and iot are fundamentally changing the practice of physical security ent://SD_ILS/0/SD_ILS:1128883 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Van Till, Steve, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4981408">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Understanding bitcoin : cryptography, engineering and economics. ent://SD_ILS/0/SD_ILS:1040180 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Franco, Pedro, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1823060">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning ent://SD_ILS/0/SD_ILS:1036178 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Hutchens, Justin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1771381">Click to View</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at designing security for a Windows Server 2003 network ent://SD_ILS/0/SD_ILS:933856 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Amini, Rob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254832">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing IM and P2P applications for the enterprise ent://SD_ILS/0/SD_ILS:933871 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Piccard, Paul L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254847">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking web apps detecting and preventing web application security problems ent://SD_ILS/0/SD_ILS:1000371 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Shema, Mike.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1012529">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cisco security professional's guide to secure intrusion detection systems ent://SD_ILS/0/SD_ILS:1188408 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Burton, James.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266696">http://www.sciencedirect.com/science/book/9781932266696</a><br/>Format:&#160;Electronic Resources<br/> Insider threat : protecting the enterprise from sabotage, spying, and theft ent://SD_ILS/0/SD_ILS:1188259 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Cole, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format:&#160;Electronic Resources<br/> Botnets : the killer web app ent://SD_ILS/0/SD_ILS:1186444 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Schiller, Craig A.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491358">https://www.sciencedirect.com/science/book/9781597491358</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at designing security for a Windows Server 2003 network ent://SD_ILS/0/SD_ILS:1188281 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Amini, Rob.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492430">https://www.sciencedirect.com/science/book/9781597492430</a><br/>Format:&#160;Electronic Resources<br/> Cyber security awareness for CEOs and management ent://SD_ILS/0/SD_ILS:1104566 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Willson, David, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4189279">Click to View</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at securing your network ent://SD_ILS/0/SD_ILS:1189983 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Dubrawsky, Ido.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492317">https://www.sciencedirect.com/science/book/9781597492317</a><br/>Format:&#160;Electronic Resources<br/> Developer's guide to web application security ent://SD_ILS/0/SD_ILS:1186371 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format:&#160;Electronic Resources<br/> Hacking a terror network : the silent threat of covert channels ent://SD_ILS/0/SD_ILS:1188363 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Rogers, Russ.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994985">https://www.sciencedirect.com/science/book/9781928994985</a><br/>Format:&#160;Electronic Resources<br/> Snort 2.1 intrusion detection ent://SD_ILS/0/SD_ILS:1188366 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Beale, Jay.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836043">https://www.sciencedirect.com/science/book/9781931836043</a><br/>Format:&#160;Electronic Resources<br/> Snort : IDS and IPS toolkit ent://SD_ILS/0/SD_ILS:1188271 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Beale, Jay.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490993">https://www.sciencedirect.com/science/book/9781597490993</a><br/>Format:&#160;Electronic Resources<br/> Bilgisayar sistemlerinde g&uuml;venlik ve gizlilik ent://SD_ILS/0/SD_ILS:1223212 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Ayd&#305;n, &Ouml;mer, Dr. &Ouml;&#287;r. &Uuml;yesi, edit&ouml;r<br/>Format:&#160;Books<br/> Hack the stack : using snort and ethereal to master the 8 layers of an insecure network ent://SD_ILS/0/SD_ILS:1186427 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Gregg, Michael (Michael C.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">http://www.sciencedirect.com/science/book/9781597491099</a><br/>Format:&#160;Electronic Resources<br/> Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures ent://SD_ILS/0/SD_ILS:1186439 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Contos, Brian T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491297">https://www.sciencedirect.com/science/book/9781597491297</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing your network ent://SD_ILS/0/SD_ILS:1188357 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Ahmad, David R. Mirza.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994701">https://www.sciencedirect.com/science/book/9781928994701</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity blue team toolkit ent://SD_ILS/0/SD_ILS:1145841 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Tanner, Nadean, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5747366">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Siber g&uuml;venlik : sald&#305;r&#305; &amp; savunma stratejileri ent://SD_ILS/0/SD_ILS:1195743 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;&Ouml;zkaya, Erdal<br/>Format:&#160;Books<br/> Java programlama diliyle kriptoloji uygulamalar&#305; ent://SD_ILS/0/SD_ILS:1206978 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Bodur, H&uuml;seyin, yazar.<br/>Format:&#160;Books<br/> Hacking the hacker ent://SD_ILS/0/SD_ILS:1125525 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Grimes, Roger A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4845208">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Aldatma sanat&#305; : g&uuml;venli&#287;in insan boyutunun kullan&#305;lmas&#305; ent://SD_ILS/0/SD_ILS:1158369 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Mitnick, Kevin D.<br/>Format:&#160;Books<br/> Her y&ouml;n&uuml;yle elektronik imza : e-imza ent://SD_ILS/0/SD_ILS:1219091 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Sa&#287;&#305;ro&#287;lu, &#350;eref, Do&ccedil;. Dr., yazar.<br/>Format:&#160;Books<br/> &#304;nternette g&uuml;venlik ve Hacker Cracker meselesi : el kitab&#305; ent://SD_ILS/0/SD_ILS:70005 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;G&uuml;ven, Mehmet<br/>Format:&#160;Books<br/> Cryptography for internet and database applications : developing secret and public key techniques with Java ent://SD_ILS/0/SD_ILS:41923 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Galbreath, Nick<br/>Format:&#160;Books<br/> Network security : private communication in a public world ent://SD_ILS/0/SD_ILS:1169380 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Kaufman, Charlie.<br/>Format:&#160;Books<br/> Security controls evaluation, testing, and assessment handbook ent://SD_ILS/0/SD_ILS:1148986 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Johnson, Leighton, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5986757">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hardware security : a hands-on learning approach ent://SD_ILS/0/SD_ILS:1146041 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Bhunia, Swarup, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5754491">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Digital asset valuation and cyber risk measurement : principles of cybernomics ent://SD_ILS/0/SD_ILS:1146603 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Ruan, Keyun, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5780982">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information security risk management for ISO 27001/ISO 27002 ent://SD_ILS/0/SD_ILS:1148197 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5894007">Click to View</a><br/>Format:&#160;Electronic Resources<br/> How cyber security can protect your business : a guide for all stakeholders ent://SD_ILS/0/SD_ILS:1148887 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Wright, Christopher, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5979597">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity law : protect yourself and your customers ent://SD_ILS/0/SD_ILS:1145228 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Brathwaite, Shimon, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5719658">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Online danger : how to protect yourself and your loved ones from the evil side of the internet ent://SD_ILS/0/SD_ILS:1148139 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Cole, Eric, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5893451">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Port cybersecurity : securing critical information infrastructures and supply chains ent://SD_ILS/0/SD_ILS:1130929 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Polemi, Nineta, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5118465">Click to View</a><br/>Format:&#160;Electronic Resources<br/> RIoT control : understanding and managing risks and the internet of things ent://SD_ILS/0/SD_ILS:1118263 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Macaulay, Tyson, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4691335">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing the internet of things ent://SD_ILS/0/SD_ILS:1122371 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Li, Shancang, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4786871">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Wireshark for security professionals : using wireshark and the metasploit framework ent://SD_ILS/0/SD_ILS:1123925 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Bullock, Jessey, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4816492">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IoT penetration testing cookbook : identify vulnerabilities and secure your smart devices. ent://SD_ILS/0/SD_ILS:1133049 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Guzman, Aaron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5165736">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security in the digital world : for the home user, parent, consumer and home office ent://SD_ILS/0/SD_ILS:1133712 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Day, Graham, 1945- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5211340">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Meeting people via WiFi and Bluetooth ent://SD_ILS/0/SD_ILS:1104567 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Schroeder, Joshua, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4189280">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The information systems security officer's guide : establishing and managing a cyber security program ent://SD_ILS/0/SD_ILS:1105580 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Kovacich, Gerald L., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4334673">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information security science : measuring the vulnerability to data compromises ent://SD_ILS/0/SD_ILS:1113500 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Young, Carl S., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4567434">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Linux server security : hack and defend ent://SD_ILS/0/SD_ILS:1111179 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Binnie, Christopher, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4519259">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Selling information security to the board : a primer ent://SD_ILS/0/SD_ILS:1111186 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4519662">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Chaotic secure communication : principles and technologies ent://SD_ILS/0/SD_ILS:1119254 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Sun, Kehui, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4707910">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Infosec management fundamentals ent://SD_ILS/0/SD_ILS:1053583 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2146007">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Bent functions : results and applications to cryptography ent://SD_ILS/0/SD_ILS:1053831 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Tokareva, Natalia, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192079">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information security analytics : finding security insights, patterns and anomalies in big data ent://SD_ILS/0/SD_ILS:1041629 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Mark, Talabis, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1873129">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Designing and building a security operations center ent://SD_ILS/0/SD_ILS:1040615 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Nathans, David, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1834659">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network attacks &amp; exploitation : a framework ent://SD_ILS/0/SD_ILS:1103144 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Monte, Matthew, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040351">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:1145060 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709810">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:1145062 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709812">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des Installations Industrielles. Chapter V, Des bus de terrain a l'Industrial Ethernet ent://SD_ILS/0/SD_ILS:1145070 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709821">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre X, S&eacute;curit&eacute; des R&eacute;seaux Industriels &eacute;tendus : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:1145073 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709824">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre II, Typologie des installations industrielles : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:1145077 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709828">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre II, Typologie des installations industrielles : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:1145078 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709829">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapter VI, Analyse des risques : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:1145082 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709834">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre I, Mythes et r&eacute;alit&eacute;s de la cybers&eacute;curit&eacute; des syst&egrave;mes num&eacute;riques industriels : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:1145083 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709836">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des Installations Industrielles : Chapitre XII Panorama de l'offre Technologique Pour la Cybers&eacute;curit&eacute; Industrielle ent://SD_ILS/0/SD_ILS:1145091 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Fourastier, Yannick, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709845">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des Installations Industrielles ent://SD_ILS/0/SD_ILS:1145096 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Fourastier, Yannick, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709851">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Using security patterns in web-application ent://SD_ILS/0/SD_ILS:1135621 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Alam, Shahnawaz, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5291824">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security leader insights for information protection : lessons and strategies from leading security professionals ent://SD_ILS/0/SD_ILS:1032265 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Fahy, Bob, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1699254">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Datennutzungs- und datenschutzvertr&auml;ge : muster, klauseln, erl&auml;uterungen ent://SD_ILS/0/SD_ILS:1053491 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Moos, Flemming, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2129586">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data-driven security : analysis, visualization and dashboards ent://SD_ILS/0/SD_ILS:1025819 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Jacobs, Jay.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1599321">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Chinese cybersecurity and defense ent://SD_ILS/0/SD_ILS:1035841 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Ventre, Daniel, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1765106">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber essentials : a pocket guide ent://SD_ILS/0/SD_ILS:1037088 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778769">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Intelligent systems for security informatics ent://SD_ILS/0/SD_ILS:1009493 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Yang, Christopher.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1133729">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Getting started with FortiGate ent://SD_ILS/0/SD_ILS:1023474 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Fabbri, Rosato.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572901">Click to View</a><br/>Format:&#160;Electronic Resources<br/> OAuth 2.0 identity and access management patterns ent://SD_ILS/0/SD_ILS:1023480 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Spasovski, Martin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572907">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Instant Java password and authentication security ent://SD_ILS/0/SD_ILS:1023486 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Mayoral, Fernando.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572913">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyberspace and cybersecurity ent://SD_ILS/0/SD_ILS:1020695 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Kostopoulos, George K., 1939- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1446799">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data hiding exposing concealed data in multimedia, operating systems, mobile devices, and network protocols ent://SD_ILS/0/SD_ILS:1003916 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Raggo, Michael T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073014">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Spring Security 3.1 secure your web applications from hackers with the step-by-step guide ent://SD_ILS/0/SD_ILS:1006508 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Winch, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108351">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Low tech hacking street smarts for security professionals ent://SD_ILS/0/SD_ILS:987787 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Wiles, Jack.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=829964">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IBM i security administration and compliance ent://SD_ILS/0/SD_ILS:993715 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Woodbury, Carol.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=906259">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Forefront Identity Manager 2010 R2 handbook ent://SD_ILS/0/SD_ILS:1000680 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Nordstr&ouml;m, Kent.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1019543">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Microsoft SQL Server 2012 security cookbook ent://SD_ILS/0/SD_ILS:1001891 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Bruchez, Rudi.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1036251">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Oracle 11g anti-hacker's cookbook ent://SD_ILS/0/SD_ILS:1003349 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Neagu, Adrian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1057945">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing WebLogic Server 12c learn to develop, administer, and troubleshot your WebLogic Server ent://SD_ILS/0/SD_ILS:1004959 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Masini, Luca.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1085228">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Dear hacker letters to the editor of 2600 ent://SD_ILS/0/SD_ILS:964867 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Goldstein, Emmanuel J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537340">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Professional Cocoa application security ent://SD_ILS/0/SD_ILS:964870 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Lee, Graham J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537355">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Least privilege security for Windows 7, Vista, And XP secure desktops for regulatory compliance and business agility ent://SD_ILS/0/SD_ILS:996314 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Smith, Russell.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=944038">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Distributed systems security issues, processes, and solutions ent://SD_ILS/0/SD_ILS:954183 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Belapurkar, Abhijit.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=437429">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Aldatma sanat&#305; : g&uuml;venli&#287;in insan boyutunun kullan&#305;lmas&#305; ent://SD_ILS/0/SD_ILS:282929 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Mitnick, Kevin D.<br/>Format:&#160;Books<br/> Gray hat Python Python programming for hackers and reverse engineers ent://SD_ILS/0/SD_ILS:1009952 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Seitz, Justin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137535">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer forensics for dummies ent://SD_ILS/0/SD_ILS:947774 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Volonino, Linda.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=380503">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Microsoft windows security fundamentals ent://SD_ILS/0/SD_ILS:939647 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Clercq, Jan de, 1968-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294637">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Vista for IT security professionals ent://SD_ILS/0/SD_ILS:944075 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Piltzecker, Tony, 1975-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328623">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Zen and the art of information security ent://SD_ILS/0/SD_ILS:944282 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Winkler, Ira.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=330200">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Perfect passwords selection, protection, authentication ent://SD_ILS/0/SD_ILS:933875 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Burnett, Mark.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254851">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Multimedia security technologies for digital rights management ent://SD_ILS/0/SD_ILS:936640 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Zeng, Wenjun, 1967-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=274233">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Combating spyware in the enterprise ent://SD_ILS/0/SD_ILS:936645 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Baskin, Brian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=274289">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Black hat physical device security exploiting hardware and software ent://SD_ILS/0/SD_ILS:930209 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Miller, Drew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=222851">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber spying tracking your family's (sometimes) secret online lives ent://SD_ILS/0/SD_ILS:930210 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Fair, Ted.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=222853">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Sockets, shellcode, porting &amp; coding reverse engineering exploits and tool coding for security professionals ent://SD_ILS/0/SD_ILS:930713 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Foster, James C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=226568">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Aggressive network self-defense ent://SD_ILS/0/SD_ILS:930656 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Wyler, Neil R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=225321">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Implementing database security and auditing ent://SD_ILS/0/SD_ILS:938079 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Ben-Natan, Ron.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=286701">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Click, click, who's there? a family-based non-technical approach to help parents protect their children online ent://SD_ILS/0/SD_ILS:945275 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Koh.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338852">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Windows g&uuml;venli&#287;i windows XP ve windows 2000 i&ccedil;in ent://SD_ILS/0/SD_ILS:1165655 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Bott, Ed.<br/>Format:&#160;Books<br/> SSCP study guide and &amp; DVD training system ent://SD_ILS/0/SD_ILS:939578 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Jacobs, Josh.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294375">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Special issue on internet security ent://SD_ILS/0/SD_ILS:931530 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Dhillon, Gurpreet.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=232281">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Check Point NG next generation security administration ent://SD_ILS/0/SD_ILS:939447 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Simonis, Drew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294029">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing XML ent://SD_ILS/0/SD_ILS:939502 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;O'Farrell, Neal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294155">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing Sun Solaris 8 ent://SD_ILS/0/SD_ILS:939500 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Vincent, Thomas.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294153">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Technology and privacy the new landscape ent://SD_ILS/0/SD_ILS:1081109 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Agre, Philip.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3338469">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computers at risk safe computing in the information age ent://SD_ILS/0/SD_ILS:1083859 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3376465">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Engineering secure and dependable software systems ent://SD_ILS/0/SD_ILS:1148337 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Pretschner, Alexander, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5899580">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Solving cyber risk : protecting your company and society ent://SD_ILS/0/SD_ILS:1143948 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Coburn, Andrew (Andrew W.), author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5614240">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; et RGPD : prot&eacute;gez votre PME : guide pratique pour s&eacute;curiser votre syst&egrave;me informatique et vous conformer au RGPD ent://SD_ILS/0/SD_ILS:1141512 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Ejzyn, Alain, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5496488">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux wireless penetration testing : beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack ent://SD_ILS/0/SD_ILS:1137050 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Buchanan, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5340668">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux wireless penetration testing beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux ent://SD_ILS/0/SD_ILS:1047089 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Ramachandran, Vivek, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2005211">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems ent://SD_ILS/0/SD_ILS:1042469 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Knapp, Eric D., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1887712">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre XIII, &Eacute;tat des Lieux des R&eacute;f&eacute;rentiels en S&eacute;curit&eacute; des Syst&egrave;mes Num&eacute;riques Industriels : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:1145061 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709811">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre XIV, R&eacute;glementation de la Cybers&eacute;curit&eacute; et R&eacute;gime Juridique des Syst&egrave;mes Num&eacute;riques Industriels : une &eacute;tude des Dispositions R&eacute;glementaires en Cybers&eacute;curit&eacute; en France et Aux &Eacute;tats-Unis : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:1145074 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709825">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapter IV, Malveillance num&eacute;rique sur les syst&egrave;mes industriels : histoire de la menace, &eacute;v&eacute;nements embl&eacute;matiques, tendances et perspectives : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:1145079 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709831">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Implementing NetScaler VPX : leverage the features of NetScaler VPX to optimize and deploy responsive web services and applications on multiple virtualization platforms ent://SD_ILS/0/SD_ILS:1029902 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Sandbu, Marius, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1674868">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Enterprise security a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise ent://SD_ILS/0/SD_ILS:1005995 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Woody, Aaron.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1103988">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Linux malware incident response : a practitioner's guide to forensic collection and examination of volatile data : an excerpt from Malware forensics field guide for Linux systems ent://SD_ILS/0/SD_ILS:1007625 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Malin, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115185">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Safety management for software-based equipment ent://SD_ILS/0/SD_ILS:1013439 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Boulanger, Jean-Louis.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1187169">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information security risk assessment toolkit practical assessments through data collection and data analysis ent://SD_ILS/0/SD_ILS:1002837 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Talabis, Mark Ryan N.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1047930">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Logging and log management the authoritative guide to understanding the concepts surrounding logging and log management ent://SD_ILS/0/SD_ILS:1004458 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Chuvakin, Anton A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1077419">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Low tech hacking street smarts for security professionals ent://SD_ILS/0/SD_ILS:137106 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Wiles, Jack.<br/><a href="http://ezproxy.lb.polyu.edu.hk/login?url=http://www.sciencedirect.com/science/book/9781597496650">ScienceDirect e-book</a> ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496650">http://www.sciencedirect.com/science/book/9781597496650</a><br/>Format:&#160;Electronic Resources<br/> Advances in intelligence and security informatics ent://SD_ILS/0/SD_ILS:993023 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Mao, Wenji.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=892251">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Formal models and techniques for analyzing security protocols ent://SD_ILS/0/SD_ILS:984359 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=784604">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Introduction to cryptography with open-source software ent://SD_ILS/0/SD_ILS:1027312 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;McAndrew, Alasdair, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1633743">Click to View</a><br/>Format:&#160;Electronic Resources<br/> GlassFish security secure your GlassFish installation, web applications, EJB applications, application client module, and web services using Java EE and GlassFish security measures ent://SD_ILS/0/SD_ILS:996405 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Kalali, Masoud.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=944941">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The definitive guide to the C&amp;A transformation the first publication of a comprehensive view of the C&amp;A transformation ent://SD_ILS/0/SD_ILS:965453 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Mehan, Julie E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=547041">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Enterprise information security and privacy ent://SD_ILS/0/SD_ILS:956331 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Axelrod, C. Warren.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456886">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information security policy, processes, and practices ent://SD_ILS/0/SD_ILS:953297 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Straub, Detmar W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=435197">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Papers from the first European workshop on technological &amp; security issues in digital rights management (EuDiRights) ent://SD_ILS/0/SD_ILS:939160 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Yag&uuml;e, Mariemma.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=291585">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Multilevel security and DB2 row-level security revealed ent://SD_ILS/0/SD_ILS:1075159 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306464">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Basics of contemporary cryptography for IT practitioners ent://SD_ILS/0/SD_ILS:939979 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Ryabko, Boris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=296069">Click to View</a><br/>Format:&#160;Electronic Resources<br/> zSeries crypto guide update ent://SD_ILS/0/SD_ILS:1075400 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306705">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Finding and fixing vulnerabilities in information systems the vulnerability assessment &amp; mitigation methodology ent://SD_ILS/0/SD_ILS:927792 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Ant&oacute;n, Philip S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=197482">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Putting the latest z/OS security features to work ent://SD_ILS/0/SD_ILS:1075358 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306663">Click to View</a><br/>Format:&#160;Electronic Resources<br/> An introduction to security in a CSM 1.3 for AIX 5L environment ent://SD_ILS/0/SD_ILS:1075407 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Lascu, Octavian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306712">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity today and tomorrow pay now or pay later ent://SD_ILS/0/SD_ILS:1082583 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3375180">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing Linux: a guide to open source security the only way to stop a hacker is to think like one ent://SD_ILS/0/SD_ILS:939499 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Stanger, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294152">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Siber g&uuml;venlik ve savunma : siber g&uuml;venlik ontolojisi, tehditler ve &ccedil;&ouml;z&uuml;mler ent://SD_ILS/0/SD_ILS:1221273 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Sa&#287;&#305;ro&#287;lu, &#350;eref, Prof. Dr., edit&ouml;r<br/>Format:&#160;Books<br/> Critical infrastructure protection against hybrid warfare security related challenges ent://SD_ILS/0/SD_ILS:1121166 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Niglia, Alessandro, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4753392">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information security a manager's guide to thwarting data thieves and hackers ent://SD_ILS/0/SD_ILS:945288 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Alexander, Philip, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=339307">Click to View</a><br/>Format:&#160;Electronic Resources<br/> A process for developing a common vocabulary in the information security area ent://SD_ILS/0/SD_ILS:943478 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;NATO Advanced Research Workshop on a Process for Developing a Common Vocabulary in the Information Security Area (2006 : Moscow, Russia)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=320313">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Writing security tools and exploits ent://SD_ILS/0/SD_ILS:1188284 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499972">http://www.sciencedirect.com/science/book/9781597499972</a><br/>Format:&#160;Electronic Resources<br/> Programmer's ultimate security deskref ent://SD_ILS/0/SD_ILS:1188409 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Foster, James C.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781932266726">https://www.sciencedirect.com/science/book/9781932266726</a><br/>Format:&#160;Electronic Resources<br/> An introduction to cyber modeling and simulation ent://SD_ILS/0/SD_ILS:1142123 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Couretas, Jerry M., 1966- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5520841">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Core software security : security at the source ent://SD_ILS/0/SD_ILS:1022705 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Ransome, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1547083">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Advances in intelligence and security informatics ent://SD_ILS/0/SD_ILS:133381 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Mao, Wenji.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123972002">http://www.sciencedirect.com/science/book/9780123972002</a><br/>Format:&#160;Electronic Resources<br/> SQL injection attacks and defense ent://SD_ILS/0/SD_ILS:1192819 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Clarke, Justin.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494243">https://www.sciencedirect.com/science/book/9781597494243</a><br/>Format:&#160;Electronic Resources<br/> Malware forensics : investigating and analyzing malicious code ent://SD_ILS/0/SD_ILS:1189636 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Aquilina, James M.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492683">http://www.sciencedirect.com/science/book/9781597492683</a><br/>Format:&#160;Electronic Resources<br/> Metasploit toolkit for penetration testing, exploit development, and vulnerability research ent://SD_ILS/0/SD_ILS:1186373 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">http://www.sciencedirect.com/science/book/9781597490740</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Vista for IT security professionals ent://SD_ILS/0/SD_ILS:1186453 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Piltzecker, Tony, 1975-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491396">http://www.sciencedirect.com/science/book/9781597491396</a><br/>Format:&#160;Electronic Resources<br/> Combating spyware in the enterprise ent://SD_ILS/0/SD_ILS:1186355 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Baskin, Brian.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490641">https://www.sciencedirect.com/science/book/9781597490641</a><br/>Format:&#160;Electronic Resources<br/> Black Hat physical device security : exploiting hardware and software ent://SD_ILS/0/SD_ILS:1188410 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Miller, Drew, 1978-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266818">http://www.sciencedirect.com/science/book/9781932266818</a><br/>Format:&#160;Electronic Resources<br/> Safeguarding critical e-documents implementing a program for securing confidential information assets ent://SD_ILS/0/SD_ILS:987148 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Smallwood, Robert F., 1959-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=821999">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The basics of hacking and penetration testing ethical hacking and penetration testing made easy ent://SD_ILS/0/SD_ILS:133594 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Engebretson, Pat (Patrick Henry), 1974-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496551">http://www.sciencedirect.com/science/book/9781597496551</a><br/>Format:&#160;Electronic Resources<br/> The basics of hacking and penetration testing : ethical hacking and penetration testing made easy ent://SD_ILS/0/SD_ILS:1183950 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Engebretson, Pat (Patrick Henry), 1974-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496551">https://www.sciencedirect.com/science/book/9781597496551</a><br/>Format:&#160;Electronic Resources<br/> Microsoft windows security fundamentals ent://SD_ILS/0/SD_ILS:1185703 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Clercq, Jan de, 1968-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583408">https://www.sciencedirect.com/science/book/9781555583408</a><br/>Format:&#160;Electronic Resources<br/> Open source fuzzing tools. ent://SD_ILS/0/SD_ILS:1186474 2026-04-02T20:10:51Z 2026-04-02T20:10:51Z by&#160;Rathaus, Noam.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491952">http://www.sciencedirect.com/science/book/9781597491952</a><br/>Format:&#160;Electronic Resources<br/>