Search Results for Computers. - Narrowed by: Computer security.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputers.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?dt=list2026-04-27T12:14:18ZAdvances in computers. Volume 83ent://SD_ILS/0/SD_ILS:11837822026-04-27T12:14:18Z2026-04-27T12:14:18Zby Zelkowitz, Marvin V., 1945-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123855107">http://www.sciencedirect.com/science/book/9780123855107</a><br/>Format: Electronic Resources<br/>Computers at risk safe computing in the information ageent://SD_ILS/0/SD_ILS:10838592026-04-27T12:14:18Z2026-04-27T12:14:18Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3376465">Click to View</a><br/>Format: Electronic Resources<br/>How to cheat at Windows system administration using command line scriptsent://SD_ILS/0/SD_ILS:11864252026-04-27T12:14:18Z2026-04-27T12:14:18Zby Bhardwaj, Pawan K.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491051">http://www.sciencedirect.com/science/book/9781597491051</a><br/>Format: Electronic Resources<br/>Windows Server 2003 security infrastructuresent://SD_ILS/0/SD_ILS:11880842026-04-27T12:14:18Z2026-04-27T12:14:18Zby Clercq, Jan de, 1968-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582838">http://www.sciencedirect.com/science/book/9781555582838</a><br/>Format: Electronic Resources<br/>Logics and languages for reliability and securityent://SD_ILS/0/SD_ILS:9666272026-04-27T12:14:18Z2026-04-27T12:14:18Zby Esparza, Javier.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=557042">Click to View</a><br/>Format: Electronic Resources<br/>IBM eserver zSeries 990 (z990) cryptography implementationent://SD_ILS/0/SD_ILS:10754862026-04-27T12:14:18Z2026-04-27T12:14:18Zby Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306791">Click to View</a><br/>Format: Electronic Resources<br/>A guide to kernel exploitation : attacking the coreent://SD_ILS/0/SD_ILS:11817702026-04-27T12:14:18Z2026-04-27T12:14:18Zby Perla, Enrico.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494861">https://www.sciencedirect.com/science/book/9781597494861</a><br/>Format: Electronic Resources<br/>Ağ ve siber güvenlik temelleri : dijital dünyada güvende kalınent://SD_ILS/0/SD_ILS:12321712026-04-27T12:14:18Z2026-04-27T12:14:18Zby Hınçer, Görkem, yazar.<br/>Format: Books<br/>Kali Linux network scanning cookbook : take your penetration-testing skills to the next levelent://SD_ILS/0/SD_ILS:11267622026-04-27T12:14:18Z2026-04-27T12:14:18Zby Hixon, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4867412">Click to View</a><br/>Format: Electronic Resources<br/>The basics of digital privacy : simple tools to protect your personal information and your identity onlineent://SD_ILS/0/SD_ILS:10235692026-04-27T12:14:18Z2026-04-27T12:14:18Zby Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1573362">Click to View</a><br/>Format: Electronic Resources<br/>Windows registry forensics : advanced digital forensic analysis of the windows registryent://SD_ILS/0/SD_ILS:11086862026-04-27T12:14:18Z2026-04-27T12:14:18Zby Carvey, Harlan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4438754">Click to View</a><br/>Format: Electronic Resources<br/>Hiding behind the keyboard : uncovering covert communication methods with forensic analysisent://SD_ILS/0/SD_ILS:11090622026-04-27T12:14:18Z2026-04-27T12:14:18Zby Shavers, Brett, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4452264">Click to View</a><br/>Format: Electronic Resources<br/>Group policy : fundamentals, security, and the managed desktopent://SD_ILS/0/SD_ILS:11031672026-04-27T12:14:18Z2026-04-27T12:14:18Zby Moskowitz, Jeremy, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040685">Click to View</a><br/>Format: Electronic Resources<br/>Windows server 2012 security from end to edge and beyond architecting, designing, planning, and deploying Windows server 2012 security solutionsent://SD_ILS/0/SD_ILS:10076122026-04-27T12:14:18Z2026-04-27T12:14:18Zby Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115164">Click to View</a><br/>Format: Electronic Resources<br/>Group policy fundamentals, security, and the managed desktopent://SD_ILS/0/SD_ILS:10060892026-04-27T12:14:18Z2026-04-27T12:14:18Zby Moskowitz, Jeremy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1104500">Click to View</a><br/>Format: Electronic Resources<br/>Oracle Identity and Access Manager 11g for administrators administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasksent://SD_ILS/0/SD_ILS:9968352026-04-27T12:14:18Z2026-04-27T12:14:18Zby Kumar, Atul.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948559">Click to View</a><br/>Format: Electronic Resources<br/>Group policy fundamentals, security, and the managed desktopent://SD_ILS/0/SD_ILS:9634792026-04-27T12:14:18Z2026-04-27T12:14:18Zby Moskowitz, Jeremy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=530009">Click to View</a><br/>Format: Electronic Resources<br/>Relation based access controlent://SD_ILS/0/SD_ILS:10251322026-04-27T12:14:18Z2026-04-27T12:14:18Zby Zhang, Rui.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1589007">Click to View</a><br/>Format: Electronic Resources<br/>iSeries Access for Windows V5R2 hot topics tailored images, application administration, SSL, and Kerberosent://SD_ILS/0/SD_ILS:10753942026-04-27T12:14:18Z2026-04-27T12:14:18Zby Schulz, Jeremy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306699">Click to View</a><br/>Format: Electronic Resources<br/>Linux on IBM e-server zSeries and S/390 best security practicesent://SD_ILS/0/SD_ILS:10755302026-04-27T12:14:18Z2026-04-27T12:14:18Zby Geiselhart, Gregory.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306835">Click to View</a><br/>Format: Electronic Resources<br/>Role-based access controlent://SD_ILS/0/SD_ILS:9309912026-04-27T12:14:18Z2026-04-27T12:14:18Zby Ferraiolo, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227631">Click to View</a><br/>Format: Electronic Resources<br/>Windows Registry Forensics : Advanced Digital Forensic Analysis of the Windows Registry.ent://SD_ILS/0/SD_ILS:11835262026-04-27T12:14:18Z2026-04-27T12:14:18Zby Carvey, Harlan.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495806">https://www.sciencedirect.com/science/book/9781597495806</a><br/>Format: Electronic Resources<br/>Managed code rootkits : hooking into runtime environmentsent://SD_ILS/0/SD_ILS:11818272026-04-27T12:14:18Z2026-04-27T12:14:18Zby Metula, Erez.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495745">http://www.sciencedirect.com/science/book/9781597495745</a><br/>Format: Electronic Resources<br/>OAuth 2.0 identity and access management patternsent://SD_ILS/0/SD_ILS:10234802026-04-27T12:14:18Z2026-04-27T12:14:18Zby Spasovski, Martin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572907">Click to View</a><br/>Format: Electronic Resources<br/>Instant Java password and authentication securityent://SD_ILS/0/SD_ILS:10234862026-04-27T12:14:18Z2026-04-27T12:14:18Zby Mayoral, Fernando.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572913">Click to View</a><br/>Format: Electronic Resources<br/>Perfect passwords selection, protection, authenticationent://SD_ILS/0/SD_ILS:9338752026-04-27T12:14:18Z2026-04-27T12:14:18Zby Burnett, Mark.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254851">Click to View</a><br/>Format: Electronic Resources<br/>Kali Linux wireless penetration testing : beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attackent://SD_ILS/0/SD_ILS:11370502026-04-27T12:14:18Z2026-04-27T12:14:18Zby Buchanan, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5340668">Click to View</a><br/>Format: Electronic Resources<br/>Kali Linux wireless penetration testing beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linuxent://SD_ILS/0/SD_ILS:10470892026-04-27T12:14:18Z2026-04-27T12:14:18Zby Ramachandran, Vivek, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2005211">Click to View</a><br/>Format: Electronic Resources<br/>Check Point NG next generation security administrationent://SD_ILS/0/SD_ILS:9394472026-04-27T12:14:18Z2026-04-27T12:14:18Zby Simonis, Drew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294029">Click to View</a><br/>Format: Electronic Resources<br/>Role-based access controlent://SD_ILS/0/SD_ILS:9452212026-04-27T12:14:18Z2026-04-27T12:14:18Zby Ferraiolo, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338751">Click to View</a><br/>Format: Electronic Resources<br/>Network security : private communication in a public worldent://SD_ILS/0/SD_ILS:11693802026-04-27T12:14:18Z2026-04-27T12:14:18Zby Kaufman, Charlie.<br/>Format: Books<br/>IBM i security administration and complianceent://SD_ILS/0/SD_ILS:9937152026-04-27T12:14:18Z2026-04-27T12:14:18Zby Woodbury, Carol.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=906259">Click to View</a><br/>Format: Electronic Resources<br/>Mac security bibleent://SD_ILS/0/SD_ILS:9603772026-04-27T12:14:18Z2026-04-27T12:14:18Zby Kissell, Joe.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=477803">Click to View</a><br/>Format: Electronic Resources<br/>Buffer overflow attacks : detect, exploit, preventent://SD_ILS/0/SD_ILS:11884072026-04-27T12:14:18Z2026-04-27T12:14:18Zby Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266672">http://www.sciencedirect.com/science/book/9781932266672</a><br/>Format: Electronic Resources<br/>Cyber security in parallel and distributed computing : concepts, techniques, applications and case studiesent://SD_ILS/0/SD_ILS:11456862026-04-27T12:14:18Z2026-04-27T12:14:18Zby Le, Dac-Nhuong, 1983- editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5741215">Click to View</a><br/>Format: Electronic Resources<br/>Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linuxent://SD_ILS/0/SD_ILS:10317372026-04-27T12:14:18Z2026-04-27T12:14:18Zby Buchanan, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1688607">Click to View</a><br/>Format: Electronic Resources<br/>Information protection playbookent://SD_ILS/0/SD_ILS:10199902026-04-27T12:14:18Z2026-04-27T12:14:18Zby Kane, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1418381">Click to View</a><br/>Format: Electronic Resources<br/>A multidisciplinary introduction to information securityent://SD_ILS/0/SD_ILS:10284162026-04-27T12:14:18Z2026-04-27T12:14:18Zby Mjølsnes, Stig F., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1648315">Click to View</a><br/>Format: Electronic Resources<br/>Securing HP NonStop servers in an open systems world TCP/IP, OSS & SQLent://SD_ILS/0/SD_ILS:9391972026-04-27T12:14:18Z2026-04-27T12:14:18Zby XYPRO Technology Corporation.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=291716">Click to View</a><br/>Format: Electronic Resources<br/>Essential computer security everyone's guide to e-mail, internet, and wireless securityent://SD_ILS/0/SD_ILS:9433502026-04-27T12:14:18Z2026-04-27T12:14:18Zby Bradley, Tony.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=319200">Click to View</a><br/>Format: Electronic Resources<br/>User's guide to cryptography and standardsent://SD_ILS/0/SD_ILS:9310172026-04-27T12:14:18Z2026-04-27T12:14:18Zby Dent, Alexander W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227658">Click to View</a><br/>Format: Electronic Resources<br/>Developing secure distributed systems with CORBAent://SD_ILS/0/SD_ILS:9309642026-04-27T12:14:18Z2026-04-27T12:14:18Zby Lang, Ulrich.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227602">Click to View</a><br/>Format: Electronic Resources<br/>Cisco security professional's guide to secure intrusion detection systemsent://SD_ILS/0/SD_ILS:11884082026-04-27T12:14:18Z2026-04-27T12:14:18Zby Burton, James.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266696">http://www.sciencedirect.com/science/book/9781932266696</a><br/>Format: Electronic Resources<br/>Advances in intelligence and security informaticsent://SD_ILS/0/SD_ILS:1333812026-04-27T12:14:18Z2026-04-27T12:14:18Zby Mao, Wenji.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123972002">http://www.sciencedirect.com/science/book/9780123972002</a><br/>Format: Electronic Resources<br/>Embedded systems security practical methods for safe and secure software and systems developmentent://SD_ILS/0/SD_ILS:1333762026-04-27T12:14:18Z2026-04-27T12:14:18Zby Kleidermacher, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123868862">http://www.sciencedirect.com/science/book/9780123868862</a><br/>Format: Electronic Resources<br/>The basics of information security understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:1335922026-04-27T12:14:18Z2026-04-27T12:14:18Zby Andress, Jason.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Electronic Resources<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:11838152026-04-27T12:14:18Z2026-04-27T12:14:18Zby Andress, Jason.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496537">https://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Electronic Resources<br/>Malware forensics : investigating and analyzing malicious codeent://SD_ILS/0/SD_ILS:11896362026-04-27T12:14:18Z2026-04-27T12:14:18Zby Aquilina, James M.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492683">http://www.sciencedirect.com/science/book/9781597492683</a><br/>Format: Electronic Resources<br/>WarDriving & wireless penetration testingent://SD_ILS/0/SD_ILS:11882752026-04-27T12:14:18Z2026-04-27T12:14:18Zby Hurley, Chris.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491112">http://www.sciencedirect.com/science/book/9781597491112</a><br/>Format: Electronic Resources<br/>Metasploit toolkit for penetration testing, exploit development, and vulnerability researchent://SD_ILS/0/SD_ILS:11863732026-04-27T12:14:18Z2026-04-27T12:14:18Zby Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">http://www.sciencedirect.com/science/book/9781597490740</a><br/>Format: Electronic Resources<br/>Microsoft Vista for IT security professionalsent://SD_ILS/0/SD_ILS:11864532026-04-27T12:14:18Z2026-04-27T12:14:18Zby Piltzecker, Tony, 1975-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491396">http://www.sciencedirect.com/science/book/9781597491396</a><br/>Format: Electronic Resources<br/>Web application vulnerabilities : detect, exploit, preventent://SD_ILS/0/SD_ILS:11891052026-04-27T12:14:18Z2026-04-27T12:14:18Zby Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492096">http://www.sciencedirect.com/science/book/9781597492096</a><br/>Format: Electronic Resources<br/>Writing security tools and exploitsent://SD_ILS/0/SD_ILS:11882842026-04-27T12:14:18Z2026-04-27T12:14:18Zby Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499972">http://www.sciencedirect.com/science/book/9781597499972</a><br/>Format: Electronic Resources<br/>Insider threat : protecting the enterprise from sabotage, spying, and theftent://SD_ILS/0/SD_ILS:11882592026-04-27T12:14:18Z2026-04-27T12:14:18Zby Cole, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format: Electronic Resources<br/>Combating spyware in the enterpriseent://SD_ILS/0/SD_ILS:11863552026-04-27T12:14:18Z2026-04-27T12:14:18Zby Baskin, Brian.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490641">https://www.sciencedirect.com/science/book/9781597490641</a><br/>Format: Electronic Resources<br/>Host integrity monitoring : using Osiris and Samhainent://SD_ILS/0/SD_ILS:11882452026-04-27T12:14:18Z2026-04-27T12:14:18Zby Wotring, Brian.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490184">http://www.sciencedirect.com/science/book/9781597490184</a><br/>Format: Electronic Resources<br/>Intrusion prevention and active response : deploying network and host IPSent://SD_ILS/0/SD_ILS:11884002026-04-27T12:14:18Z2026-04-27T12:14:18Zby Rash, Michael.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266474">http://www.sciencedirect.com/science/book/9781932266474</a><br/>Format: Electronic Resources<br/>Wireless operational securityent://SD_ILS/0/SD_ILS:11881042026-04-27T12:14:18Z2026-04-27T12:14:18Zby Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583170">http://www.sciencedirect.com/science/book/9781555583170</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583170">https://www.sciencedirect.com/science/book/9781555583170</a><br/>Format: Electronic Resources<br/>WarDriving : drive, detect, defend : a guide to wireless securityent://SD_ILS/0/SD_ILS:11883652026-04-27T12:14:18Z2026-04-27T12:14:18Zby Hurley, Chris.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836036">https://www.sciencedirect.com/science/book/9781931836036</a><br/>Format: Electronic Resources<br/>Programmer's ultimate security deskrefent://SD_ILS/0/SD_ILS:11884092026-04-27T12:14:18Z2026-04-27T12:14:18Zby Foster, James C.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781932266726">https://www.sciencedirect.com/science/book/9781932266726</a><br/>Format: Electronic Resources<br/>Information Security Practices Emerging Threats and Perspectivesent://SD_ILS/0/SD_ILS:4808202026-04-27T12:14:18Z2026-04-27T12:14:18Zby Traoré, Issa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-48947-6">http://dx.doi.org/10.1007/978-3-319-48947-6</a><br/>Format: Electronic Resources<br/>Securing the cloud : cloud computer security techniques and tacticsent://SD_ILS/0/SD_ILS:11837432026-04-27T12:14:18Z2026-04-27T12:14:18Zby Winkler, J. R. (Joachim R.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format: Electronic Resources<br/>The basics of hacking and penetration testing ethical hacking and penetration testing made easyent://SD_ILS/0/SD_ILS:1335942026-04-27T12:14:18Z2026-04-27T12:14:18Zby Engebretson, Pat (Patrick Henry), 1974-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496551">http://www.sciencedirect.com/science/book/9781597496551</a><br/>Format: Electronic Resources<br/>The basics of hacking and penetration testing : ethical hacking and penetration testing made easyent://SD_ILS/0/SD_ILS:11839502026-04-27T12:14:18Z2026-04-27T12:14:18Zby Engebretson, Pat (Patrick Henry), 1974-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496551">https://www.sciencedirect.com/science/book/9781597496551</a><br/>Format: Electronic Resources<br/>Seven deadliest wireless technologies attacksent://SD_ILS/0/SD_ILS:11780192026-04-27T12:14:18Z2026-04-27T12:14:18Zby Haines, Brad.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495417">https://www.sciencedirect.com/science/book/9781597495417</a><br/>Format: Electronic Resources<br/>Seven deadliest USB attacksent://SD_ILS/0/SD_ILS:11780202026-04-27T12:14:18Z2026-04-27T12:14:18Zby Anderson, Brian (Brian James)<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495530">https://www.sciencedirect.com/science/book/9781597495530</a><br/>Format: Electronic Resources<br/>Seven deadliest social network attacksent://SD_ILS/0/SD_ILS:11780312026-04-27T12:14:18Z2026-04-27T12:14:18Zby Timm, Carl.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495455">https://www.sciencedirect.com/science/book/9781597495455</a><br/>Format: Electronic Resources<br/>Seven deadliest Microsoft attacksent://SD_ILS/0/SD_ILS:11774792026-04-27T12:14:18Z2026-04-27T12:14:18Zby Kraus, Rob.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495516">https://www.sciencedirect.com/science/book/9781597495516</a><br/>Format: Electronic Resources<br/>Check Point NGX R65 security administrationent://SD_ILS/0/SD_ILS:11891222026-04-27T12:14:18Z2026-04-27T12:14:18Zby Bonnell, Ralph.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492454">http://www.sciencedirect.com/science/book/9781597492454</a><br/>Format: Electronic Resources<br/>Digital watermarking and steganographyent://SD_ILS/0/SD_ILS:11891962026-04-27T12:14:18Z2026-04-27T12:14:18Zby Cox, I. J. (Ingemar J.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123725851">http://www.sciencedirect.com/science/book/9780123725851</a><br/>Format: Electronic Resources<br/>Infosecurity 2008 threat analysisent://SD_ILS/0/SD_ILS:11900002026-04-27T12:14:18Z2026-04-27T12:14:18Zby Clark, Champ, III.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492249">https://www.sciencedirect.com/science/book/9781597492249</a><br/>Format: Electronic Resources<br/>Microsoft windows security fundamentalsent://SD_ILS/0/SD_ILS:11857032026-04-27T12:14:18Z2026-04-27T12:14:18Zby Clercq, Jan de, 1968-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583408">https://www.sciencedirect.com/science/book/9781555583408</a><br/>Format: Electronic Resources<br/>Botnets : the killer web appent://SD_ILS/0/SD_ILS:11864442026-04-27T12:14:18Z2026-04-27T12:14:18Zby Schiller, Craig A.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491358">https://www.sciencedirect.com/science/book/9781597491358</a><br/>Format: Electronic Resources<br/>Open source fuzzing tools.ent://SD_ILS/0/SD_ILS:11864742026-04-27T12:14:18Z2026-04-27T12:14:18Zby Rathaus, Noam.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491952">http://www.sciencedirect.com/science/book/9781597491952</a><br/>Format: Electronic Resources<br/>Trusted platform module basics : using TPM in embedded systemsent://SD_ILS/0/SD_ILS:11856622026-04-27T12:14:18Z2026-04-27T12:14:18Zby Kinney, Steven.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679602">http://www.sciencedirect.com/science/book/9780750679602</a><br/>Format: Electronic Resources<br/>Aggressive network self-defenseent://SD_ILS/0/SD_ILS:11884902026-04-27T12:14:18Z2026-04-27T12:14:18Zby Wyler, Neil R.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">http://www.sciencedirect.com/science/book/9781931836203</a><br/>Format: Electronic Resources<br/>Internet security : a jumpstart for systems administrators and IT managersent://SD_ILS/0/SD_ILS:11880902026-04-27T12:14:18Z2026-04-27T12:14:18Zby Speed, Tim.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582982">http://www.sciencedirect.com/science/book/9781555582982</a><br/>Format: Electronic Resources<br/>Cybersecurity operations handbookent://SD_ILS/0/SD_ILS:11880952026-04-27T12:14:18Z2026-04-27T12:14:18Zby Rittinghouse, John W.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583064">https://www.sciencedirect.com/science/book/9781555583064</a><br/>Format: Electronic Resources<br/>Snort 2.0 intrusion detectionent://SD_ILS/0/SD_ILS:11883872026-04-27T12:14:18Z2026-04-27T12:14:18Zby Beale, Jay.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836746">http://www.sciencedirect.com/science/book/9781931836746</a><br/>Format: Electronic Resources<br/>Hack proofing ColdFusionent://SD_ILS/0/SD_ILS:11883582026-04-27T12:14:18Z2026-04-27T12:14:18Zby Meyer, Greg.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994770">http://www.sciencedirect.com/science/book/9781928994770</a><br/>Format: Electronic Resources<br/>Hack proofing your identity in the information age : protect your family on the internet!ent://SD_ILS/0/SD_ILS:11853182026-04-27T12:14:18Z2026-04-27T12:14:18Zby Bidwell, Teri.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836517">https://www.sciencedirect.com/science/book/9781931836517</a><br/>Format: Electronic Resources<br/>Hack proofing Sun Solaris 8ent://SD_ILS/0/SD_ILS:11884852026-04-27T12:14:18Z2026-04-27T12:14:18Zby Miles, Wyman.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994442">http://www.sciencedirect.com/science/book/9781928994442</a><br/>Format: Electronic Resources<br/>Securing SQL server protecting your database from attackersent://SD_ILS/0/SD_ILS:1371912026-04-27T12:14:18Z2026-04-27T12:14:18Zby Cherry, Denny.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496254">http://www.sciencedirect.com/science/book/9781597496254</a><br/>Format: Electronic Resources<br/>Securing the cloud cloud computer security techniques and tacticsent://SD_ILS/0/SD_ILS:1372012026-04-27T12:14:18Z2026-04-27T12:14:18Zby Winkler, J. R. (Joachim R.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format: Electronic Resources<br/>Thor's Microsoft security bible : a collection of practical security techniquesent://SD_ILS/0/SD_ILS:11839722026-04-27T12:14:18Z2026-04-27T12:14:18Zby Mullen, Timothy M.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495721">http://www.sciencedirect.com/science/book/9781597495721</a><br/>Format: Electronic Resources<br/>Securing SQL server : protecting your database from attackersent://SD_ILS/0/SD_ILS:11835102026-04-27T12:14:18Z2026-04-27T12:14:18Zby Cherry, Denny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496254">https://www.sciencedirect.com/science/book/9781597496254</a><br/>Format: Electronic Resources<br/>Next generation SSH2 implementation : securing data in motionent://SD_ILS/0/SD_ILS:11917632026-04-27T12:14:18Z2026-04-27T12:14:18Zby Liu, Dale.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492836">https://www.sciencedirect.com/science/book/9781597492836</a><br/>Format: Electronic Resources<br/>Microsoft forefront security administration guideent://SD_ILS/0/SD_ILS:11891202026-04-27T12:14:18Z2026-04-27T12:14:18Zby Varsalone, Jesse.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492447">https://www.sciencedirect.com/science/book/9781597492447</a><br/>Format: Electronic Resources<br/>Information assurance : dependability and security in networked systemsent://SD_ILS/0/SD_ILS:11891952026-04-27T12:14:18Z2026-04-27T12:14:18Zby Qian, Yi, 1962-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123735669">https://www.sciencedirect.com/science/book/9780123735669</a><br/>Format: Electronic Resources<br/>FISMA certification & accreditation handbookent://SD_ILS/0/SD_ILS:11882772026-04-27T12:14:18Z2026-04-27T12:14:18Zby Taylor, Laura.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">http://www.sciencedirect.com/science/book/9781597491167</a><br/>Format: Electronic Resources<br/>Developer's guide to web application securityent://SD_ILS/0/SD_ILS:11863712026-04-27T12:14:18Z2026-04-27T12:14:18Zby Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format: Electronic Resources<br/>Physical and logical security convergence powered by enterprise security managementent://SD_ILS/0/SD_ILS:11890882026-04-27T12:14:18Z2026-04-27T12:14:18Zby Contos, Brian T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491228">https://www.sciencedirect.com/science/book/9781597491228</a><br/>Format: Electronic Resources<br/>How to cheat at securing your networkent://SD_ILS/0/SD_ILS:11899832026-04-27T12:14:18Z2026-04-27T12:14:18Zby Dubrawsky, Ido.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492317">https://www.sciencedirect.com/science/book/9781597492317</a><br/>Format: Electronic Resources<br/>Multimedia security technologies for digital rights managementent://SD_ILS/0/SD_ILS:11869942026-04-27T12:14:18Z2026-04-27T12:14:18Zby Zeng, Wenjun, 1967-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123694768">http://www.sciencedirect.com/science/book/9780123694768</a><br/>Format: Electronic Resources<br/>Securing HP NonStop servers in an open systems world : TCP/IP, OSS & SQLent://SD_ILS/0/SD_ILS:11881182026-04-27T12:14:18Z2026-04-27T12:14:18Zby XYPRO Technology Corporation.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583446">http://www.sciencedirect.com/science/book/9781555583446</a><br/>Format: Electronic Resources<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:11882482026-04-27T12:14:18Z2026-04-27T12:14:18Zby Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490214">https://www.sciencedirect.com/science/book/9781597490214</a><br/>Format: Electronic Resources<br/>Securing IM and P2P applications for the enterpriseent://SD_ILS/0/SD_ILS:11842632026-04-27T12:14:18Z2026-04-27T12:14:18Zby Piccard, Paul L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490177">http://www.sciencedirect.com/science/book/9781597490177</a>
ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499965">http://www.sciencedirect.com/science/book/9781597499965</a><br/>Format: Electronic Resources<br/>Essential computer security : everyone's guide to e-mail, internet, and wireless securityent://SD_ILS/0/SD_ILS:11864192026-04-27T12:14:18Z2026-04-27T12:14:18Zby Bradley, Tony, 1969-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491143">https://www.sciencedirect.com/science/book/9781597491143</a><br/>Format: Electronic Resources<br/>Implementing database security and auditing : a guide for DBAs, information security administrators and auditorsent://SD_ILS/0/SD_ILS:11881152026-04-27T12:14:18Z2026-04-27T12:14:18Zby Ben-Natan, Ron.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">http://www.sciencedirect.com/science/book/9781555583347</a><br/>Format: Electronic Resources<br/>Implementing homeland security for enterprise ITent://SD_ILS/0/SD_ILS:11880992026-04-27T12:14:18Z2026-04-27T12:14:18Zby Erbschloe, Michael.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">http://www.sciencedirect.com/science/book/9781555583125</a><br/>Format: Electronic Resources<br/>Cyber adversary characterization : auditing the hacker mindent://SD_ILS/0/SD_ILS:11883692026-04-27T12:14:18Z2026-04-27T12:14:18Zby Parker, Tom.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836111">http://www.sciencedirect.com/science/book/9781931836111</a><br/>Format: Electronic Resources<br/>Digital watermarkingent://SD_ILS/0/SD_ILS:11881542026-04-27T12:14:18Z2026-04-27T12:14:18Zby Cox, I. J. (Ingemar J.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607149">http://www.sciencedirect.com/science/book/9781558607149</a><br/>Format: Electronic Resources<br/>Scene of the cybercrime : computer forensics handbookent://SD_ILS/0/SD_ILS:11884942026-04-27T12:14:18Z2026-04-27T12:14:18Zby Shinder, Debra Littlejohn, author.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836654">https://www.sciencedirect.com/science/book/9781931836654</a><br/>Format: Electronic Resources<br/>Hack proofing Windows 2000ent://SD_ILS/0/SD_ILS:11883812026-04-27T12:14:18Z2026-04-27T12:14:18Zby Todd, Chad.<br/><a href="http://www.sciencedirect.com/science/book/9781931836494">Available from ScienceDirect. Online version available for university members only. This requires an institutional login off-campus</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836494">https://www.sciencedirect.com/science/book/9781931836494</a><br/>Format: Electronic Resources<br/>Practical embedded security : building secure resource-constrained systemsent://SD_ILS/0/SD_ILS:11891682026-04-27T12:14:18Z2026-04-27T12:14:18Zby Stapko, Timothy John.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780750682152">https://www.sciencedirect.com/science/book/9780750682152</a><br/>Format: Electronic Resources<br/>Google hacking for penetration testers. Volume 2ent://SD_ILS/0/SD_ILS:11891022026-04-27T12:14:18Z2026-04-27T12:14:18Zby Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491761">https://www.sciencedirect.com/science/book/9781597491761</a><br/>Format: Electronic Resources<br/>Securing Windows server 2008 : prevent attacks from outside and inside your organization.ent://SD_ILS/0/SD_ILS:11896212026-04-27T12:14:18Z2026-04-27T12:14:18ZScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492805">https://www.sciencedirect.com/science/book/9781597492805</a><br/>Format: Electronic Resources<br/>Securing Citrix XenApp Server in the enterpriseent://SD_ILS/0/SD_ILS:11896372026-04-27T12:14:18Z2026-04-27T12:14:18Zby Bin Azad, Tariq.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492812">http://www.sciencedirect.com/science/book/9781597492812</a><br/>Format: Electronic Resources<br/>Scene of the cybercrime.ent://SD_ILS/0/SD_ILS:11896652026-04-27T12:14:18Z2026-04-27T12:14:18Zby Cross, Michael, 1965-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492768">https://www.sciencedirect.com/science/book/9781597492768</a><br/>Format: Electronic Resources<br/>OS X exploits and defenseent://SD_ILS/0/SD_ILS:11897052026-04-27T12:14:18Z2026-04-27T12:14:18Zby Baccas, Paul.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492546">http://www.sciencedirect.com/science/book/9781597492546</a><br/>Format: Electronic Resources<br/>Snort : IDS and IPS toolkitent://SD_ILS/0/SD_ILS:11882712026-04-27T12:14:18Z2026-04-27T12:14:18Zby Beale, Jay.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490993">https://www.sciencedirect.com/science/book/9781597490993</a><br/>Format: Electronic Resources<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:11864602026-04-27T12:14:18Z2026-04-27T12:14:18Zby Winkler, Ira.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491686">https://www.sciencedirect.com/science/book/9781597491686</a><br/>Format: Electronic Resources<br/>Syngress force emerging threat analysis : from mischief to maliciousent://SD_ILS/0/SD_ILS:11863392026-04-27T12:14:18Z2026-04-27T12:14:18Zby Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">http://www.sciencedirect.com/science/book/9781597490566</a><br/>Format: Electronic Resources<br/>Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionalsent://SD_ILS/0/SD_ILS:11882422026-04-27T12:14:18Z2026-04-27T12:14:18Zby Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490054">http://www.sciencedirect.com/science/book/9781597490054</a><br/>Format: Electronic Resources<br/>OSSEC host-based intrusion detection guideent://SD_ILS/0/SD_ILS:11896202026-04-27T12:14:18Z2026-04-27T12:14:18Zby Hay, Andrew.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492409">http://www.sciencedirect.com/science/book/9781597492409</a><br/>Format: Electronic Resources<br/>No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfingent://SD_ILS/0/SD_ILS:11896352026-04-27T12:14:18Z2026-04-27T12:14:18Zby Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492157">https://www.sciencedirect.com/science/book/9781597492157</a><br/>Format: Electronic Resources<br/>Hack the stack : using snort and ethereal to master the 8 layers of an insecure networkent://SD_ILS/0/SD_ILS:11864272026-04-27T12:14:18Z2026-04-27T12:14:18Zby Gregg, Michael (Michael C.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">http://www.sciencedirect.com/science/book/9781597491099</a><br/>Format: Electronic Resources<br/>Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasuresent://SD_ILS/0/SD_ILS:11864392026-04-27T12:14:18Z2026-04-27T12:14:18Zby Contos, Brian T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491297">https://www.sciencedirect.com/science/book/9781597491297</a><br/>Format: Electronic Resources<br/>HP Nonstop server security : a practical handbookent://SD_ILS/0/SD_ILS:11881012026-04-27T12:14:18Z2026-04-27T12:14:18Zby Hill, Terri.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583149">http://www.sciencedirect.com/science/book/9781555583149</a><br/>Format: Electronic Resources<br/>Hack proofing your networkent://SD_ILS/0/SD_ILS:11883572026-04-27T12:14:18Z2026-04-27T12:14:18Zby Ahmad, David R. Mirza.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994701">https://www.sciencedirect.com/science/book/9781928994701</a><br/>Format: Electronic Resources<br/>Investigative computer forensics the practical guide for lawyers, accountants, investigators, and business executivesent://SD_ILS/0/SD_ILS:9864922026-04-27T12:14:18Z2026-04-27T12:14:18Zby Laykin, Erik.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=817953">Click to View</a><br/>Format: Electronic Resources<br/>Cyber spying : tracking your family's (sometimes) secret online livesent://SD_ILS/0/SD_ILS:11883792026-04-27T12:14:18Z2026-04-27T12:14:18Zby Fair, Ted.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836418">https://www.sciencedirect.com/science/book/9781931836418</a><br/>Format: Electronic Resources<br/>Software piracy exposedent://SD_ILS/0/SD_ILS:11884172026-04-27T12:14:18Z2026-04-27T12:14:18Zby Craig, Paul.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781932266986">https://www.sciencedirect.com/science/book/9781932266986</a><br/>Format: Electronic Resources<br/>Information security best practices : 205 basic rulesent://SD_ILS/0/SD_ILS:11883182026-04-27T12:14:18Z2026-04-27T12:14:18Zby Stefanek, George L.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781878707963">https://www.sciencedirect.com/science/book/9781878707963</a><br/>Format: Electronic Resources<br/>Computer securityent://SD_ILS/0/SD_ILS:11759622026-04-27T12:14:18Z2026-04-27T12:14:18Zby Carroll, John M. (John Millar), 1925-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780409900323">https://www.sciencedirect.com/science/book/9780409900323</a><br/>Format: Electronic Resources<br/>