Search Results for Tools. - Narrowed by: Computer security. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dTools.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300?dt=list 2026-04-04T04:16:37Z Open source fuzzing tools. ent://SD_ILS/0/SD_ILS:1186474 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Rathaus, Noam.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491952">http://www.sciencedirect.com/science/book/9781597491952</a><br/>Format:&#160;Electronic Resources<br/> Data mining tools for malware detection ent://SD_ILS/0/SD_ILS:987461 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Masud, Mehedy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826949">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Writing security tools and exploits ent://SD_ILS/0/SD_ILS:1188284 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499972">http://www.sciencedirect.com/science/book/9781597499972</a><br/>Format:&#160;Electronic Resources<br/> Network performance and security : testing and analyzing using open source and low-cost tools ent://SD_ILS/0/SD_ILS:1109063 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Chapman, Chris, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4452265">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The basics of digital privacy : simple tools to protect your personal information and your identity online ent://SD_ILS/0/SD_ILS:1023569 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1573362">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate Windows malware ent://SD_ILS/0/SD_ILS:1140471 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Monnappa K A, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5446050">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning ent://SD_ILS/0/SD_ILS:1036178 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Hutchens, Justin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1771381">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network intrusion analysis methodologies, tools, and techniques for incident analysis and response ent://SD_ILS/0/SD_ILS:1003376 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Fichera, Joe, 1966-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1058152">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IBM rational application developer V6 portlet application development and portal tools ent://SD_ILS/0/SD_ILS:1075242 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Rodriguez, Juan R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306547">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Nessus, Snort, &amp; Ethereal power tools customizing open source security applications ent://SD_ILS/0/SD_ILS:933863 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Archibald, Neil.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254839">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Web commerce security design and development ent://SD_ILS/0/SD_ILS:978975 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Nahari, Hadi.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706729">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Software piracy exposed ent://SD_ILS/0/SD_ILS:933864 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Honick, Ron.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254840">Click to View</a><br/>Format:&#160;Electronic Resources<br/> An introduction to cyber modeling and simulation ent://SD_ILS/0/SD_ILS:1142123 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Couretas, Jerry M., 1966- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5520841">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber security for educational leaders a guide to understanding and implementing technology policies ent://SD_ILS/0/SD_ILS:1010656 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Sianjina, Rayton R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1143733">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Windows Registry Forensics : Advanced Digital Forensic Analysis of the Windows Registry. ent://SD_ILS/0/SD_ILS:1183526 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Carvey, Harlan.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495806">https://www.sciencedirect.com/science/book/9781597495806</a><br/>Format:&#160;Electronic Resources<br/> Host integrity monitoring : using Osiris and Samhain ent://SD_ILS/0/SD_ILS:1188245 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Wotring, Brian.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490184">http://www.sciencedirect.com/science/book/9781597490184</a><br/>Format:&#160;Electronic Resources<br/> WarDriving : drive, detect, defend : a guide to wireless security ent://SD_ILS/0/SD_ILS:1188365 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Hurley, Chris.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836036">https://www.sciencedirect.com/science/book/9781931836036</a><br/>Format:&#160;Electronic Resources<br/> Smart Grids: Security and Privacy Issues ent://SD_ILS/0/SD_ILS:480572 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Boroojeni, Kianoosh G. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45050-6">http://dx.doi.org/10.1007/978-3-319-45050-6</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practices Emerging Threats and Perspectives ent://SD_ILS/0/SD_ILS:480820 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Traor&eacute;, Issa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-48947-6">http://dx.doi.org/10.1007/978-3-319-48947-6</a><br/>Format:&#160;Electronic Resources<br/> Safeguarding critical e-documents implementing a program for securing confidential information assets ent://SD_ILS/0/SD_ILS:987148 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Smallwood, Robert F., 1959-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=821999">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Industrial network security securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems ent://SD_ILS/0/SD_ILS:137208 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Knapp, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496452">http://www.sciencedirect.com/science/book/9781597496452</a><br/>Format:&#160;Electronic Resources<br/> Web application obfuscation -/WAFs..Evasion..Filters//alert (/Obfuscation/)- ent://SD_ILS/0/SD_ILS:137209 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Heiderich, Mario.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496049">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems ent://SD_ILS/0/SD_ILS:1184011 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Knapp, Eric.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496452">https://www.sciencedirect.com/science/book/9781597496452</a><br/>Format:&#160;Electronic Resources<br/> The basics of hacking and penetration testing ethical hacking and penetration testing made easy ent://SD_ILS/0/SD_ILS:133594 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Engebretson, Pat (Patrick Henry), 1974-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496551">http://www.sciencedirect.com/science/book/9781597496551</a><br/>Format:&#160;Electronic Resources<br/> Virtualization and forensics : a digital forensic investigator's guide to virtual environments ent://SD_ILS/0/SD_ILS:1178429 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Barrett, Diane.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format:&#160;Electronic Resources<br/> The basics of hacking and penetration testing : ethical hacking and penetration testing made easy ent://SD_ILS/0/SD_ILS:1183950 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Engebretson, Pat (Patrick Henry), 1974-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496551">https://www.sciencedirect.com/science/book/9781597496551</a><br/>Format:&#160;Electronic Resources<br/> Infosecurity 2008 threat analysis ent://SD_ILS/0/SD_ILS:1190000 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Clark, Champ, III.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492249">https://www.sciencedirect.com/science/book/9781597492249</a><br/>Format:&#160;Electronic Resources<br/> Botnets : the killer web app ent://SD_ILS/0/SD_ILS:1186444 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Schiller, Craig A.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491358">https://www.sciencedirect.com/science/book/9781597491358</a><br/>Format:&#160;Electronic Resources<br/> Internet security : a jumpstart for systems administrators and IT managers ent://SD_ILS/0/SD_ILS:1188090 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Speed, Tim.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582982">http://www.sciencedirect.com/science/book/9781555582982</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing Linux : a guide to open source security ent://SD_ILS/0/SD_ILS:1188484 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Stanger, James.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994343">http://www.sciencedirect.com/science/book/9781928994343</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing Sun Solaris 8 ent://SD_ILS/0/SD_ILS:1188485 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Miles, Wyman.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994442">http://www.sciencedirect.com/science/book/9781928994442</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing your Web applications ent://SD_ILS/0/SD_ILS:1188343 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Traxler, Julie.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994312">https://www.sciencedirect.com/science/book/9781928994312</a><br/>Format:&#160;Electronic Resources<br/> Information Fusion for Cyber-Security Analytics ent://SD_ILS/0/SD_ILS:480528 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Alsmadi, Izzat M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44257-0">http://dx.doi.org/10.1007/978-3-319-44257-0</a><br/>Format:&#160;Electronic Resources<br/> Information technology security fundamentals ent://SD_ILS/0/SD_ILS:1102697 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Sagers, Glen., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4009415">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Thor's Microsoft security bible : a collection of practical security techniques ent://SD_ILS/0/SD_ILS:1183972 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Mullen, Timothy M.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495721">http://www.sciencedirect.com/science/book/9781597495721</a><br/>Format:&#160;Electronic Resources<br/> Managed code rootkits : hooking into runtime environments ent://SD_ILS/0/SD_ILS:1181827 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Metula, Erez.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495745">http://www.sciencedirect.com/science/book/9781597495745</a><br/>Format:&#160;Electronic Resources<br/> System assurance : beyond detecting vulnerabilities ent://SD_ILS/0/SD_ILS:1183266 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Mansourov, Nikolai.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123814142">https://www.sciencedirect.com/science/book/9780123814142</a><br/>Format:&#160;Electronic Resources<br/> Microsoft forefront security administration guide ent://SD_ILS/0/SD_ILS:1189120 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Varsalone, Jesse.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492447">https://www.sciencedirect.com/science/book/9781597492447</a><br/>Format:&#160;Electronic Resources<br/> Developer's guide to web application security ent://SD_ILS/0/SD_ILS:1186371 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format:&#160;Electronic Resources<br/> Securing HP NonStop servers in an open systems world : TCP/IP, OSS &amp; SQL ent://SD_ILS/0/SD_ILS:1188118 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;XYPRO Technology Corporation.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583446">http://www.sciencedirect.com/science/book/9781555583446</a><br/>Format:&#160;Electronic Resources<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:1188248 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490214">https://www.sciencedirect.com/science/book/9781597490214</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing Windows 2000 ent://SD_ILS/0/SD_ILS:1188381 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Todd, Chad.<br/><a href="http://www.sciencedirect.com/science/book/9781931836494">Available from ScienceDirect. Online version available for university members only. This requires an institutional login off-campus</a> ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836494">https://www.sciencedirect.com/science/book/9781931836494</a><br/>Format:&#160;Electronic Resources<br/> Advances in computers. Volume 83 ent://SD_ILS/0/SD_ILS:1183782 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Zelkowitz, Marvin V., 1945-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123855107">http://www.sciencedirect.com/science/book/9780123855107</a><br/>Format:&#160;Electronic Resources<br/> Dissecting the hack : the forb1dd3n network ent://SD_ILS/0/SD_ILS:1181379 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Street, Jayson E.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495684">https://www.sciencedirect.com/science/book/9781597495684</a><br/>Format:&#160;Electronic Resources<br/> Securing Windows server 2008 : prevent attacks from outside and inside your organization. ent://SD_ILS/0/SD_ILS:1189621 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492805">https://www.sciencedirect.com/science/book/9781597492805</a><br/>Format:&#160;Electronic Resources<br/> Scene of the cybercrime. ent://SD_ILS/0/SD_ILS:1189665 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Cross, Michael, 1965-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492768">https://www.sciencedirect.com/science/book/9781597492768</a><br/>Format:&#160;Electronic Resources<br/> OS X exploits and defense ent://SD_ILS/0/SD_ILS:1189705 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Baccas, Paul.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492546">http://www.sciencedirect.com/science/book/9781597492546</a><br/>Format:&#160;Electronic Resources<br/> Sockets, shellcode, porting &amp; coding : reverse engineering exploits and tool coding for security professionals ent://SD_ILS/0/SD_ILS:1188242 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490054">http://www.sciencedirect.com/science/book/9781597490054</a><br/>Format:&#160;Electronic Resources<br/> Techno Security's guide to managing risks : for IT managers, auditors, and investigators ent://SD_ILS/0/SD_ILS:1188280 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Wiles, Jack.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">http://www.sciencedirect.com/science/book/9781597491389</a><br/>Format:&#160;Electronic Resources<br/> Hack the stack : using snort and ethereal to master the 8 layers of an insecure network ent://SD_ILS/0/SD_ILS:1186427 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Gregg, Michael (Michael C.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">http://www.sciencedirect.com/science/book/9781597491099</a><br/>Format:&#160;Electronic Resources<br/> Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures ent://SD_ILS/0/SD_ILS:1186439 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Contos, Brian T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491297">https://www.sciencedirect.com/science/book/9781597491297</a><br/>Format:&#160;Electronic Resources<br/> HP Nonstop server security : a practical handbook ent://SD_ILS/0/SD_ILS:1188101 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Hill, Terri.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583149">http://www.sciencedirect.com/science/book/9781555583149</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing your network ent://SD_ILS/0/SD_ILS:1188357 2026-04-04T04:16:37Z 2026-04-04T04:16:37Z by&#160;Ahmad, David R. Mirza.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994701">https://www.sciencedirect.com/science/book/9781928994701</a><br/>Format:&#160;Electronic Resources<br/>