Search Results for Tools. - Narrowed by: Computer security.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dTools.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300?dt=list2026-04-04T04:16:37ZOpen source fuzzing tools.ent://SD_ILS/0/SD_ILS:11864742026-04-04T04:16:37Z2026-04-04T04:16:37Zby Rathaus, Noam.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491952">http://www.sciencedirect.com/science/book/9781597491952</a><br/>Format: Electronic Resources<br/>Data mining tools for malware detectionent://SD_ILS/0/SD_ILS:9874612026-04-04T04:16:37Z2026-04-04T04:16:37Zby Masud, Mehedy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826949">Click to View</a><br/>Format: Electronic Resources<br/>Writing security tools and exploitsent://SD_ILS/0/SD_ILS:11882842026-04-04T04:16:37Z2026-04-04T04:16:37Zby Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499972">http://www.sciencedirect.com/science/book/9781597499972</a><br/>Format: Electronic Resources<br/>Network performance and security : testing and analyzing using open source and low-cost toolsent://SD_ILS/0/SD_ILS:11090632026-04-04T04:16:37Z2026-04-04T04:16:37Zby Chapman, Chris, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4452265">Click to View</a><br/>Format: Electronic Resources<br/>The basics of digital privacy : simple tools to protect your personal information and your identity onlineent://SD_ILS/0/SD_ILS:10235692026-04-04T04:16:37Z2026-04-04T04:16:37Zby Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1573362">Click to View</a><br/>Format: Electronic Resources<br/>Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate Windows malwareent://SD_ILS/0/SD_ILS:11404712026-04-04T04:16:37Z2026-04-04T04:16:37Zby Monnappa K A, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5446050">Click to View</a><br/>Format: Electronic Resources<br/>Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanningent://SD_ILS/0/SD_ILS:10361782026-04-04T04:16:37Z2026-04-04T04:16:37Zby Hutchens, Justin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1771381">Click to View</a><br/>Format: Electronic Resources<br/>Network intrusion analysis methodologies, tools, and techniques for incident analysis and responseent://SD_ILS/0/SD_ILS:10033762026-04-04T04:16:37Z2026-04-04T04:16:37Zby Fichera, Joe, 1966-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1058152">Click to View</a><br/>Format: Electronic Resources<br/>IBM rational application developer V6 portlet application development and portal toolsent://SD_ILS/0/SD_ILS:10752422026-04-04T04:16:37Z2026-04-04T04:16:37Zby Rodriguez, Juan R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306547">Click to View</a><br/>Format: Electronic Resources<br/>Nessus, Snort, & Ethereal power tools customizing open source security applicationsent://SD_ILS/0/SD_ILS:9338632026-04-04T04:16:37Z2026-04-04T04:16:37Zby Archibald, Neil.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254839">Click to View</a><br/>Format: Electronic Resources<br/>Web commerce security design and developmentent://SD_ILS/0/SD_ILS:9789752026-04-04T04:16:37Z2026-04-04T04:16:37Zby Nahari, Hadi.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706729">Click to View</a><br/>Format: Electronic Resources<br/>Software piracy exposedent://SD_ILS/0/SD_ILS:9338642026-04-04T04:16:37Z2026-04-04T04:16:37Zby Honick, Ron.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254840">Click to View</a><br/>Format: Electronic Resources<br/>An introduction to cyber modeling and simulationent://SD_ILS/0/SD_ILS:11421232026-04-04T04:16:37Z2026-04-04T04:16:37Zby Couretas, Jerry M., 1966- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5520841">Click to View</a><br/>Format: Electronic Resources<br/>Cyber security for educational leaders a guide to understanding and implementing technology policiesent://SD_ILS/0/SD_ILS:10106562026-04-04T04:16:37Z2026-04-04T04:16:37Zby Sianjina, Rayton R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1143733">Click to View</a><br/>Format: Electronic Resources<br/>Windows Registry Forensics : Advanced Digital Forensic Analysis of the Windows Registry.ent://SD_ILS/0/SD_ILS:11835262026-04-04T04:16:37Z2026-04-04T04:16:37Zby Carvey, Harlan.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495806">https://www.sciencedirect.com/science/book/9781597495806</a><br/>Format: Electronic Resources<br/>Host integrity monitoring : using Osiris and Samhainent://SD_ILS/0/SD_ILS:11882452026-04-04T04:16:37Z2026-04-04T04:16:37Zby Wotring, Brian.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490184">http://www.sciencedirect.com/science/book/9781597490184</a><br/>Format: Electronic Resources<br/>WarDriving : drive, detect, defend : a guide to wireless securityent://SD_ILS/0/SD_ILS:11883652026-04-04T04:16:37Z2026-04-04T04:16:37Zby Hurley, Chris.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836036">https://www.sciencedirect.com/science/book/9781931836036</a><br/>Format: Electronic Resources<br/>Smart Grids: Security and Privacy Issuesent://SD_ILS/0/SD_ILS:4805722026-04-04T04:16:37Z2026-04-04T04:16:37Zby Boroojeni, Kianoosh G. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45050-6">http://dx.doi.org/10.1007/978-3-319-45050-6</a><br/>Format: Electronic Resources<br/>Information Security Practices Emerging Threats and Perspectivesent://SD_ILS/0/SD_ILS:4808202026-04-04T04:16:37Z2026-04-04T04:16:37Zby Traoré, Issa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-48947-6">http://dx.doi.org/10.1007/978-3-319-48947-6</a><br/>Format: Electronic Resources<br/>Safeguarding critical e-documents implementing a program for securing confidential information assetsent://SD_ILS/0/SD_ILS:9871482026-04-04T04:16:37Z2026-04-04T04:16:37Zby Smallwood, Robert F., 1959-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=821999">Click to View</a><br/>Format: Electronic Resources<br/>Industrial network security securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systemsent://SD_ILS/0/SD_ILS:1372082026-04-04T04:16:37Z2026-04-04T04:16:37Zby Knapp, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496452">http://www.sciencedirect.com/science/book/9781597496452</a><br/>Format: Electronic Resources<br/>Web application obfuscation -/WAFs..Evasion..Filters//alert (/Obfuscation/)-ent://SD_ILS/0/SD_ILS:1372092026-04-04T04:16:37Z2026-04-04T04:16:37Zby Heiderich, Mario.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496049">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systemsent://SD_ILS/0/SD_ILS:11840112026-04-04T04:16:37Z2026-04-04T04:16:37Zby Knapp, Eric.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496452">https://www.sciencedirect.com/science/book/9781597496452</a><br/>Format: Electronic Resources<br/>The basics of hacking and penetration testing ethical hacking and penetration testing made easyent://SD_ILS/0/SD_ILS:1335942026-04-04T04:16:37Z2026-04-04T04:16:37Zby Engebretson, Pat (Patrick Henry), 1974-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496551">http://www.sciencedirect.com/science/book/9781597496551</a><br/>Format: Electronic Resources<br/>Virtualization and forensics : a digital forensic investigator's guide to virtual environmentsent://SD_ILS/0/SD_ILS:11784292026-04-04T04:16:37Z2026-04-04T04:16:37Zby Barrett, Diane.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format: Electronic Resources<br/>The basics of hacking and penetration testing : ethical hacking and penetration testing made easyent://SD_ILS/0/SD_ILS:11839502026-04-04T04:16:37Z2026-04-04T04:16:37Zby Engebretson, Pat (Patrick Henry), 1974-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496551">https://www.sciencedirect.com/science/book/9781597496551</a><br/>Format: Electronic Resources<br/>Infosecurity 2008 threat analysisent://SD_ILS/0/SD_ILS:11900002026-04-04T04:16:37Z2026-04-04T04:16:37Zby Clark, Champ, III.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492249">https://www.sciencedirect.com/science/book/9781597492249</a><br/>Format: Electronic Resources<br/>Botnets : the killer web appent://SD_ILS/0/SD_ILS:11864442026-04-04T04:16:37Z2026-04-04T04:16:37Zby Schiller, Craig A.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491358">https://www.sciencedirect.com/science/book/9781597491358</a><br/>Format: Electronic Resources<br/>Internet security : a jumpstart for systems administrators and IT managersent://SD_ILS/0/SD_ILS:11880902026-04-04T04:16:37Z2026-04-04T04:16:37Zby Speed, Tim.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582982">http://www.sciencedirect.com/science/book/9781555582982</a><br/>Format: Electronic Resources<br/>Hack proofing Linux : a guide to open source securityent://SD_ILS/0/SD_ILS:11884842026-04-04T04:16:37Z2026-04-04T04:16:37Zby Stanger, James.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994343">http://www.sciencedirect.com/science/book/9781928994343</a><br/>Format: Electronic Resources<br/>Hack proofing Sun Solaris 8ent://SD_ILS/0/SD_ILS:11884852026-04-04T04:16:37Z2026-04-04T04:16:37Zby Miles, Wyman.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994442">http://www.sciencedirect.com/science/book/9781928994442</a><br/>Format: Electronic Resources<br/>Hack proofing your Web applicationsent://SD_ILS/0/SD_ILS:11883432026-04-04T04:16:37Z2026-04-04T04:16:37Zby Traxler, Julie.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994312">https://www.sciencedirect.com/science/book/9781928994312</a><br/>Format: Electronic Resources<br/>Information Fusion for Cyber-Security Analyticsent://SD_ILS/0/SD_ILS:4805282026-04-04T04:16:37Z2026-04-04T04:16:37Zby Alsmadi, Izzat M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44257-0">http://dx.doi.org/10.1007/978-3-319-44257-0</a><br/>Format: Electronic Resources<br/>Information technology security fundamentalsent://SD_ILS/0/SD_ILS:11026972026-04-04T04:16:37Z2026-04-04T04:16:37Zby Sagers, Glen., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4009415">Click to View</a><br/>Format: Electronic Resources<br/>Thor's Microsoft security bible : a collection of practical security techniquesent://SD_ILS/0/SD_ILS:11839722026-04-04T04:16:37Z2026-04-04T04:16:37Zby Mullen, Timothy M.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495721">http://www.sciencedirect.com/science/book/9781597495721</a><br/>Format: Electronic Resources<br/>Managed code rootkits : hooking into runtime environmentsent://SD_ILS/0/SD_ILS:11818272026-04-04T04:16:37Z2026-04-04T04:16:37Zby Metula, Erez.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495745">http://www.sciencedirect.com/science/book/9781597495745</a><br/>Format: Electronic Resources<br/>System assurance : beyond detecting vulnerabilitiesent://SD_ILS/0/SD_ILS:11832662026-04-04T04:16:37Z2026-04-04T04:16:37Zby Mansourov, Nikolai.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123814142">https://www.sciencedirect.com/science/book/9780123814142</a><br/>Format: Electronic Resources<br/>Microsoft forefront security administration guideent://SD_ILS/0/SD_ILS:11891202026-04-04T04:16:37Z2026-04-04T04:16:37Zby Varsalone, Jesse.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492447">https://www.sciencedirect.com/science/book/9781597492447</a><br/>Format: Electronic Resources<br/>Developer's guide to web application securityent://SD_ILS/0/SD_ILS:11863712026-04-04T04:16:37Z2026-04-04T04:16:37Zby Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format: Electronic Resources<br/>Securing HP NonStop servers in an open systems world : TCP/IP, OSS & SQLent://SD_ILS/0/SD_ILS:11881182026-04-04T04:16:37Z2026-04-04T04:16:37Zby XYPRO Technology Corporation.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583446">http://www.sciencedirect.com/science/book/9781555583446</a><br/>Format: Electronic Resources<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:11882482026-04-04T04:16:37Z2026-04-04T04:16:37Zby Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490214">https://www.sciencedirect.com/science/book/9781597490214</a><br/>Format: Electronic Resources<br/>Hack proofing Windows 2000ent://SD_ILS/0/SD_ILS:11883812026-04-04T04:16:37Z2026-04-04T04:16:37Zby Todd, Chad.<br/><a href="http://www.sciencedirect.com/science/book/9781931836494">Available from ScienceDirect. Online version available for university members only. This requires an institutional login off-campus</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836494">https://www.sciencedirect.com/science/book/9781931836494</a><br/>Format: Electronic Resources<br/>Advances in computers. Volume 83ent://SD_ILS/0/SD_ILS:11837822026-04-04T04:16:37Z2026-04-04T04:16:37Zby Zelkowitz, Marvin V., 1945-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123855107">http://www.sciencedirect.com/science/book/9780123855107</a><br/>Format: Electronic Resources<br/>Dissecting the hack : the forb1dd3n networkent://SD_ILS/0/SD_ILS:11813792026-04-04T04:16:37Z2026-04-04T04:16:37Zby Street, Jayson E.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495684">https://www.sciencedirect.com/science/book/9781597495684</a><br/>Format: Electronic Resources<br/>Securing Windows server 2008 : prevent attacks from outside and inside your organization.ent://SD_ILS/0/SD_ILS:11896212026-04-04T04:16:37Z2026-04-04T04:16:37ZScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492805">https://www.sciencedirect.com/science/book/9781597492805</a><br/>Format: Electronic Resources<br/>Scene of the cybercrime.ent://SD_ILS/0/SD_ILS:11896652026-04-04T04:16:37Z2026-04-04T04:16:37Zby Cross, Michael, 1965-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492768">https://www.sciencedirect.com/science/book/9781597492768</a><br/>Format: Electronic Resources<br/>OS X exploits and defenseent://SD_ILS/0/SD_ILS:11897052026-04-04T04:16:37Z2026-04-04T04:16:37Zby Baccas, Paul.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492546">http://www.sciencedirect.com/science/book/9781597492546</a><br/>Format: Electronic Resources<br/>Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionalsent://SD_ILS/0/SD_ILS:11882422026-04-04T04:16:37Z2026-04-04T04:16:37Zby Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490054">http://www.sciencedirect.com/science/book/9781597490054</a><br/>Format: Electronic Resources<br/>Techno Security's guide to managing risks : for IT managers, auditors, and investigatorsent://SD_ILS/0/SD_ILS:11882802026-04-04T04:16:37Z2026-04-04T04:16:37Zby Wiles, Jack.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">http://www.sciencedirect.com/science/book/9781597491389</a><br/>Format: Electronic Resources<br/>Hack the stack : using snort and ethereal to master the 8 layers of an insecure networkent://SD_ILS/0/SD_ILS:11864272026-04-04T04:16:37Z2026-04-04T04:16:37Zby Gregg, Michael (Michael C.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">http://www.sciencedirect.com/science/book/9781597491099</a><br/>Format: Electronic Resources<br/>Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasuresent://SD_ILS/0/SD_ILS:11864392026-04-04T04:16:37Z2026-04-04T04:16:37Zby Contos, Brian T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491297">https://www.sciencedirect.com/science/book/9781597491297</a><br/>Format: Electronic Resources<br/>HP Nonstop server security : a practical handbookent://SD_ILS/0/SD_ILS:11881012026-04-04T04:16:37Z2026-04-04T04:16:37Zby Hill, Terri.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583149">http://www.sciencedirect.com/science/book/9781555583149</a><br/>Format: Electronic Resources<br/>Hack proofing your networkent://SD_ILS/0/SD_ILS:11883572026-04-04T04:16:37Z2026-04-04T04:16:37Zby Ahmad, David R. Mirza.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994701">https://www.sciencedirect.com/science/book/9781928994701</a><br/>Format: Electronic Resources<br/>