Search Results for Computer security. - Narrowed by: Open source software.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Open$002bsource$002bsoftware.$002509Open$002bsource$002bsoftware.$0026ps$003d300?dt=list2026-03-29T10:28:11ZPenetration tester's open source toolkitent://SD_ILS/0/SD_ILS:11882482026-03-29T10:28:11Z2026-03-29T10:28:11Zby Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490214">https://www.sciencedirect.com/science/book/9781597490214</a><br/>Format: Electronic Resources<br/>Nessus, Snort, & Ethereal power tools customizing open source security applicationsent://SD_ILS/0/SD_ILS:9338632026-03-29T10:28:11Z2026-03-29T10:28:11Zby Archibald, Neil.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254839">Click to View</a><br/>Format: Electronic Resources<br/>Moodle security learn how to install and configure Moodle in the most secure way possibleent://SD_ILS/0/SD_ILS:9962652026-03-29T10:28:11Z2026-03-29T10:28:11Zby Miletić, Darko.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=943988">Click to View</a><br/>Format: Electronic Resources<br/>Introduction to cryptography with open-source softwareent://SD_ILS/0/SD_ILS:10273122026-03-29T10:28:11Z2026-03-29T10:28:11Zby McAndrew, Alasdair, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1633743">Click to View</a><br/>Format: Electronic Resources<br/>Metasploit toolkit for penetration testing, exploit development, and vulnerability researchent://SD_ILS/0/SD_ILS:11863732026-03-29T10:28:11Z2026-03-29T10:28:11Zby Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">http://www.sciencedirect.com/science/book/9781597490740</a><br/>Format: Electronic Resources<br/>Nessus, Snort, & Ethereal power tools : customizing open source security applicationsent://SD_ILS/0/SD_ILS:11882472026-03-29T10:28:11Z2026-03-29T10:28:11Zby Archibald, Neil.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490207">http://www.sciencedirect.com/science/book/9781597490207</a><br/>Format: Electronic Resources<br/>How to cheat at configuring Open Source security toolsent://SD_ILS/0/SD_ILS:11864652026-03-29T10:28:11Z2026-03-29T10:28:11Zby Alder, Raven.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491709">http://www.sciencedirect.com/science/book/9781597491709</a><br/>Format: Electronic Resources<br/>Learn PfSense 2. 4 : get up and running with Pfsense and all the core concepts to build firewall and routing solutionsent://SD_ILS/0/SD_ILS:11411202026-03-29T10:28:11Z2026-03-29T10:28:11Zby Zientara, David, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5485031">Click to View</a><br/>Format: Electronic Resources<br/>BackTrack testing wireless network securityent://SD_ILS/0/SD_ILS:10138472026-03-29T10:28:11Z2026-03-29T10:28:11Zby Cardwell, Kevin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1192679">Click to View</a><br/>Format: Electronic Resources<br/>