Arama Sonuçları - Daraltılmış: ProQuest (Firm) - English - Computer networks -- Security measures.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dAUTHOR$002509Yazar$002509ProQuest$002b$002528Firm$002529$002509ProQuest$002b$002528Firm$002529$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dSUBJECT$002509Konu$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300?dt=list2024-09-25T01:28:15ZNetwork and system securityent://SD_ILS/0/SD_ILS:10185012024-09-25T01:28:15Z2024-09-25T01:28:15Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1364061">Click to View</a><br/>Format: Elektronik Kaynak<br/>Biohackers the politics of open scienceent://SD_ILS/0/SD_ILS:10882072024-09-25T01:28:15Z2024-09-25T01:28:15Zby Delfanti, Alessandro.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3386719">Click to View</a><br/>Format: Elektronik Kaynak<br/>Mobile access safety beyond BYODent://SD_ILS/0/SD_ILS:10084142024-09-25T01:28:15Z2024-09-25T01:28:15Zby Assing, Dominique.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1124007">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network intrusion analysis methodologies, tools, and techniques for incident analysis and responseent://SD_ILS/0/SD_ILS:10033762024-09-25T01:28:15Z2024-09-25T01:28:15Zby Fichera, Joe, 1966-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1058152">Click to View</a><br/>Format: Elektronik Kaynak<br/>UTM security with Fortinet Mastering FortiOSent://SD_ILS/0/SD_ILS:10034962024-09-25T01:28:15Z2024-09-25T01:28:15Zby Tam, Kenneth.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1068442">Click to View</a><br/>Format: Elektronik Kaynak<br/>Advanced persistent threat understanding the danger and how to protect your organizationent://SD_ILS/0/SD_ILS:10039212024-09-25T01:28:15Z2024-09-25T01:28:15Zby Cole, Eric.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073020">Click to View</a><br/>Format: Elektronik Kaynak<br/>The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practiceent://SD_ILS/0/SD_ILS:10039262024-09-25T01:28:15Z2024-09-25T01:28:15Zby Winterfeld, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073026">Click to View</a><br/>Format: Elektronik Kaynak<br/>Federated identity primerent://SD_ILS/0/SD_ILS:10046722024-09-25T01:28:15Z2024-09-25T01:28:15Zby Rountree, Derrick.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1081145">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking for dummiesent://SD_ILS/0/SD_ILS:10062512024-09-25T01:28:15Z2024-09-25T01:28:15Zby Beaver, Kevin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1106542">Click to View</a><br/>Format: Elektronik Kaynak<br/>Web application defender's cookbook battling hackers and protecting usersent://SD_ILS/0/SD_ILS:10066272024-09-25T01:28:15Z2024-09-25T01:28:15Zby Barnett, Ryan C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108733">Click to View</a><br/>Format: Elektronik Kaynak<br/>Windows 2012 server network security securing your windows network systems and infrastructureent://SD_ILS/0/SD_ILS:10076102024-09-25T01:28:15Z2024-09-25T01:28:15Zby Rountree, Derrick.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115160">Click to View</a><br/>Format: Elektronik Kaynak<br/>Practical anonymity hiding in plain sight onlineent://SD_ILS/0/SD_ILS:10076142024-09-25T01:28:15Z2024-09-25T01:28:15Zby Loshin, Peter.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115167">Click to View</a><br/>Format: Elektronik Kaynak<br/>Professional penetration testing creating and learning in a hacking labent://SD_ILS/0/SD_ILS:10076162024-09-25T01:28:15Z2024-09-25T01:28:15Zby Wilhelm, Thomas.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115172">Click to View</a><br/>Format: Elektronik Kaynak<br/>Applied cyber security and the smart grid implementing security controls into the modern power infrastructureent://SD_ILS/0/SD_ILS:10076262024-09-25T01:28:15Z2024-09-25T01:28:15Zby Knapp, Eric D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115187">Click to View</a><br/>Format: Elektronik Kaynak<br/>Iris biometric model for secured network accessent://SD_ILS/0/SD_ILS:10124792024-09-25T01:28:15Z2024-09-25T01:28:15Zby Khoury, Franjieh El.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1177222">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:10141912024-09-25T01:28:15Z2024-09-25T01:28:15Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1195617">Click to View</a><br/>Format: Elektronik Kaynak<br/>The benefits and security risks of web-based applications for business trend reportent://SD_ILS/0/SD_ILS:10147332024-09-25T01:28:15Z2024-09-25T01:28:15Zby Kotwica, Kathleen.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1210948">Click to View</a><br/>Format: Elektronik Kaynak<br/>Digital whoness identity, privacy and freedom in the cyberworldent://SD_ILS/0/SD_ILS:10150682024-09-25T01:28:15Z2024-09-25T01:28:15Zby Capurro, Rafael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1215540">Click to View</a><br/>Format: Elektronik Kaynak<br/>The basics of web hacking tools and techniques to attack the Webent://SD_ILS/0/SD_ILS:10155452024-09-25T01:28:15Z2024-09-25T01:28:15Zby Pauli, Joshua J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1222592">Click to View</a><br/>Format: Elektronik Kaynak<br/>Instant Spring Security starter learn the fundamentals of web authentication and authorization using Spring Securityent://SD_ILS/0/SD_ILS:10162682024-09-25T01:28:15Z2024-09-25T01:28:15Zby Jagielski, Piotr.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1274894">Click to View</a><br/>Format: Elektronik Kaynak<br/>American exceptionalism, the French exception, and digital media lawent://SD_ILS/0/SD_ILS:10183522024-09-25T01:28:15Z2024-09-25T01:28:15Zby Eko, Lyombe.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1358660">Click to View</a><br/>Format: Elektronik Kaynak<br/>Wiki at war conflict in a socially networked worldent://SD_ILS/0/SD_ILS:10630162024-09-25T01:28:15Z2024-09-25T01:28:15Zby Carafano, James Jay, 1955-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3038033">Click to View</a><br/>Format: Elektronik Kaynak<br/>PCI compliance understand and implement effective PCI data security standard complianceent://SD_ILS/0/SD_ILS:9996312024-09-25T01:28:15Z2024-09-25T01:28:15Zby Williams, Branden R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=989201">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking web apps detecting and preventing web application security problemsent://SD_ILS/0/SD_ILS:10003712024-09-25T01:28:15Z2024-09-25T01:28:15Zby Shema, Mike.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1012529">Click to View</a><br/>Format: Elektronik Kaynak<br/>SQL injection attacks and defenseent://SD_ILS/0/SD_ILS:9972872024-09-25T01:28:15Z2024-09-25T01:28:15Zby Clarke, Justin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=953188">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber conflict competing national perspectivesent://SD_ILS/0/SD_ILS:10085102024-09-25T01:28:15Z2024-09-25T01:28:15Zby Ventre, Daniel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1124641">Click to View</a><br/>Format: Elektronik Kaynak<br/>The tangled Web a guide to securing modern Web applicationsent://SD_ILS/0/SD_ILS:10099762024-09-25T01:28:15Z2024-09-25T01:28:15Zby Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137574">Click to View</a><br/>Format: Elektronik Kaynak<br/>Client-side attacks and defenseent://SD_ILS/0/SD_ILS:10019052024-09-25T01:28:15Z2024-09-25T01:28:15Zby Shimonski, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1036349">Click to View</a><br/>Format: Elektronik Kaynak<br/>Mastering windows network forensics and investigationent://SD_ILS/0/SD_ILS:9865492024-09-25T01:28:15Z2024-09-25T01:28:15Zby Anson, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=818114">Click to View</a><br/>Format: Elektronik Kaynak<br/>Asset protection through security awarenessent://SD_ILS/0/SD_ILS:9874512024-09-25T01:28:15Z2024-09-25T01:28:15Zby Speed, Tyler Justin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826927">Click to View</a><br/>Format: Elektronik Kaynak<br/>Data mining tools for malware detectionent://SD_ILS/0/SD_ILS:9874612024-09-25T01:28:15Z2024-09-25T01:28:15Zby Masud, Mehedy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826949">Click to View</a><br/>Format: Elektronik Kaynak<br/>Windows forensic analysis toolkit advanced analysis techniques for Windows 7ent://SD_ILS/0/SD_ILS:9899252024-09-25T01:28:15Z2024-09-25T01:28:15Zby Carvey, Harlan A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=850700">Click to View</a><br/>Format: Elektronik Kaynak<br/>Wars of disruption and resilience cybered conflict, power, and national securityent://SD_ILS/0/SD_ILS:10633432024-09-25T01:28:15Z2024-09-25T01:28:15Zby Demchak, Chris C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3039013">Click to View</a><br/>Format: Elektronik Kaynak<br/>IBM WebSphere application server V7.0 security secure your WebSphere applications with Java EE and JAAS security standardsent://SD_ILS/0/SD_ILS:9962602024-09-25T01:28:15Z2024-09-25T01:28:15Zby Siliceo, Omar.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=943983">Click to View</a><br/>Format: Elektronik Kaynak<br/>Moodle security learn how to install and configure Moodle in the most secure way possibleent://SD_ILS/0/SD_ILS:9962652024-09-25T01:28:15Z2024-09-25T01:28:15Zby Miletić, Darko.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=943988">Click to View</a><br/>Format: Elektronik Kaynak<br/>WordPress 3 ultimate security protect your WordPress site and its networkent://SD_ILS/0/SD_ILS:9967892024-09-25T01:28:15Z2024-09-25T01:28:15Zby Connelly, Olly.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948509">Click to View</a><br/>Format: Elektronik Kaynak<br/>Oracle Identity and Access Manager 11g for administrators administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasksent://SD_ILS/0/SD_ILS:9968352024-09-25T01:28:15Z2024-09-25T01:28:15Zby Kumar, Atul.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948559">Click to View</a><br/>Format: Elektronik Kaynak<br/>Microsoft Forefront UAG 2010 administrator's handbook take full command of Microsoft Forefront Unified Access Gateway to secure your business applications and provide dynamic remote access with DirectAccessent://SD_ILS/0/SD_ILS:9968442024-09-25T01:28:15Z2024-09-25T01:28:15Zby Ben-Ari, Erez.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948568">Click to View</a><br/>Format: Elektronik Kaynak<br/>BackTrack 4 assuring security by penetration testing : master the art of penetration testing with BackTrackent://SD_ILS/0/SD_ILS:9969682024-09-25T01:28:15Z2024-09-25T01:28:15Zby Ali, Shakeel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=950518">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security risk management building an information security risk management program from the ground upent://SD_ILS/0/SD_ILS:9768042024-09-25T01:28:15Z2024-09-25T01:28:15Zby Wheeler, Evan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=685406">Click to View</a><br/>Format: Elektronik Kaynak<br/>Securing the cloud cloud computer security techniques and tacticsent://SD_ILS/0/SD_ILS:9770552024-09-25T01:28:15Z2024-09-25T01:28:15Zby Winkler, J. R. (Joachim R.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=686827">Click to View</a><br/>Format: Elektronik Kaynak<br/>CMS security handbook the comprehensive guide for WordPress, Joomla!, Drupal, and Ploneent://SD_ILS/0/SD_ILS:9790052024-09-25T01:28:15Z2024-09-25T01:28:15Zby Canavan, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706893">Click to View</a><br/>Format: Elektronik Kaynak<br/>Implementing SSL/TLS using cryptography and PKIent://SD_ILS/0/SD_ILS:9790072024-09-25T01:28:15Z2024-09-25T01:28:15Zby Davies, Joshua Dennis.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706899">Click to View</a><br/>Format: Elektronik Kaynak<br/>Web commerce security design and developmentent://SD_ILS/0/SD_ILS:9789752024-09-25T01:28:15Z2024-09-25T01:28:15Zby Nahari, Hadi.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706729">Click to View</a><br/>Format: Elektronik Kaynak<br/>Intrusion detection a machine learning approachent://SD_ILS/0/SD_ILS:9811612024-09-25T01:28:15Z2024-09-25T01:28:15Zby Tsai, Jeffrey J.-P.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=737642">Click to View</a><br/>Format: Elektronik Kaynak<br/>Use of risk analysis in computer-aided persuasionent://SD_ILS/0/SD_ILS:9883622024-09-25T01:28:15Z2024-09-25T01:28:15Zby Duman, Ekrem.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=836226">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security for service oriented systemsent://SD_ILS/0/SD_ILS:9723452024-09-25T01:28:15Z2024-09-25T01:28:15Zby Thuraisingham, Bhavani M.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=631696">Click to View</a><br/>Format: Elektronik Kaynak<br/>Identity management concepts, technologies, and systemsent://SD_ILS/0/SD_ILS:9725072024-09-25T01:28:15Z2024-09-25T01:28:15Zby Bertino, Elisa.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=634511">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer Forensics jumpstartent://SD_ILS/0/SD_ILS:9736802024-09-25T01:28:15Z2024-09-25T01:28:15Zby Solomon, Michael R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=661659">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security in ad hoc and sensor networksent://SD_ILS/0/SD_ILS:10302542024-09-25T01:28:15Z2024-09-25T01:28:15Zby Beyah, Raheem (Raheem A.), 1976-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1679353">Click to View</a><br/>Format: Elektronik Kaynak<br/>Managing information securityent://SD_ILS/0/SD_ILS:10183422024-09-25T01:28:15Z2024-09-25T01:28:15Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1357643">Click to View</a><br/>Format: Elektronik Kaynak<br/>IT audit, control, and securityent://SD_ILS/0/SD_ILS:9721352024-09-25T01:28:15Z2024-09-25T01:28:15Zby Moeller, Robert R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=624573">Click to View</a><br/>Format: Elektronik Kaynak<br/>Adaptive security management architectureent://SD_ILS/0/SD_ILS:9722382024-09-25T01:28:15Z2024-09-25T01:28:15Zby Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=625004">Click to View</a><br/>Format: Elektronik Kaynak<br/>Mac security bibleent://SD_ILS/0/SD_ILS:9603772024-09-25T01:28:15Z2024-09-25T01:28:15Zby Kissell, Joe.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=477803">Click to View</a><br/>Format: Elektronik Kaynak<br/>SSL and TLS theory and practiceent://SD_ILS/0/SD_ILS:9965712024-09-25T01:28:15Z2024-09-25T01:28:15Zby Oppliger, Rolf.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=946557">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:9556372024-09-25T01:28:15Z2024-09-25T01:28:15Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=453166">Click to View</a><br/>Format: Elektronik Kaynak<br/>Unauthorised access physical penetration testing for IT security teamsent://SD_ILS/0/SD_ILS:9587762024-09-25T01:28:15Z2024-09-25T01:28:15Zby Allsopp, Wil.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=470412">Click to View</a><br/>Format: Elektronik Kaynak<br/>Joomla! web security secure your Joomla! website from common security threats with this easy-to-use guideent://SD_ILS/0/SD_ILS:9987812024-09-25T01:28:15Z2024-09-25T01:28:15Zby Canavan, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=978105">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking the art of exploitationent://SD_ILS/0/SD_ILS:10099552024-09-25T01:28:15Z2024-09-25T01:28:15Zby Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137538">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information assurance dependability and security in networked systemsent://SD_ILS/0/SD_ILS:9440162024-09-25T01:28:15Z2024-09-25T01:28:15Zby Qian, Yi, 1962-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328312">Click to View</a><br/>Format: Elektronik Kaynak<br/>IT compliance and controls best practices for implementationent://SD_ILS/0/SD_ILS:9450512024-09-25T01:28:15Z2024-09-25T01:28:15Zby DeLuccia, James J., 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=335724">Click to View</a><br/>Format: Elektronik Kaynak<br/>Secure computer and network systems modeling, analysis and designent://SD_ILS/0/SD_ILS:9463852024-09-25T01:28:15Z2024-09-25T01:28:15Zby Ye, Nong.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=351427">Click to View</a><br/>Format: Elektronik Kaynak<br/>Implementing 802.1X security solutions for wired and wireless networksent://SD_ILS/0/SD_ILS:9465792024-09-25T01:28:15Z2024-09-25T01:28:15Zby Geier, James T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=353449">Click to View</a><br/>Format: Elektronik Kaynak<br/>Implementing NAP and NAC security technologies the complete guide to network access controlent://SD_ILS/0/SD_ILS:9465832024-09-25T01:28:15Z2024-09-25T01:28:15Zby Hoffman, Daniel (Daniel V.), 1972-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=353459">Click to View</a><br/>Format: Elektronik Kaynak<br/>Practical embedded security building secure resource-constrained systemsent://SD_ILS/0/SD_ILS:9425072024-09-25T01:28:15Z2024-09-25T01:28:15Zby Stapko, Timothy John.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=312846">Click to View</a><br/>Format: Elektronik Kaynak<br/>Trust and security in collaborative computingent://SD_ILS/0/SD_ILS:10302552024-09-25T01:28:15Z2024-09-25T01:28:15Zby Zou, Xukai, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1679354">Click to View</a><br/>Format: Elektronik Kaynak<br/>Securing information and communications systems principles, technologies, and applicationsent://SD_ILS/0/SD_ILS:9563262024-09-25T01:28:15Z2024-09-25T01:28:15Zby Furnell, Steven, 1970-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456881">Click to View</a><br/>Format: Elektronik Kaynak<br/>Fuzzing for software security testing and quality assuranceent://SD_ILS/0/SD_ILS:9563292024-09-25T01:28:15Z2024-09-25T01:28:15Zby Takanen, Ari.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456884">Click to View</a><br/>Format: Elektronik Kaynak<br/>Aspects of network and information securityent://SD_ILS/0/SD_ILS:9471472024-09-25T01:28:15Z2024-09-25T01:28:15Zby NATO Advanced Study Institute on Network Security and Intrusion Detection (2005 : Yerevan, Armenia)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=363205">Click to View</a><br/>Format: Elektronik Kaynak<br/>Toward a safer and more secure cyberspaceent://SD_ILS/0/SD_ILS:10854522024-09-25T01:28:15Z2024-09-25T01:28:15Zby Goodman, Seymour E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3378311">Click to View</a><br/>Format: Elektronik Kaynak<br/>The misuse of information systems the impact of security countermeasuresent://SD_ILS/0/SD_ILS:10580442024-09-25T01:28:15Z2024-09-25T01:28:15Zby D'Arcy, John P., 1975-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3016826">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security data visualization graphical techniques for network analysisent://SD_ILS/0/SD_ILS:10584542024-09-25T01:28:15Z2024-09-25T01:28:15Zby Conti, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3017625">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network security assessment from vulnerability to patchent://SD_ILS/0/SD_ILS:9370382024-09-25T01:28:15Z2024-09-25T01:28:15Zby Manzuik, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=280219">Click to View</a><br/>Format: Elektronik Kaynak<br/>Integrated security systems design concepts, specifications, and implementationent://SD_ILS/0/SD_ILS:9382982024-09-25T01:28:15Z2024-09-25T01:28:15Zby Norman, Thomas L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=287955">Click to View</a><br/>Format: Elektronik Kaynak<br/>Developer's guide to web application securityent://SD_ILS/0/SD_ILS:9385212024-09-25T01:28:15Z2024-09-25T01:28:15Zby Cross, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=289735">Click to View</a><br/>Format: Elektronik Kaynak<br/>Windows forensic analysis DVD toolkit,ent://SD_ILS/0/SD_ILS:9440762024-09-25T01:28:15Z2024-09-25T01:28:15Zby Carvey, Harlan A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328624">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security in distributed and networking systemsent://SD_ILS/0/SD_ILS:10138972024-09-25T01:28:15Z2024-09-25T01:28:15Zby Pan, Yi, 1960-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1193126">Click to View</a><br/>Format: Elektronik Kaynak<br/>Techno security's guide to e-discovery and digital forensicsent://SD_ILS/0/SD_ILS:9480152024-09-25T01:28:15Z2024-09-25T01:28:15Zby Wiles, Jack.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=405426">Click to View</a><br/>Format: Elektronik Kaynak<br/>Firewall policies and VPN configurationsent://SD_ILS/0/SD_ILS:9359862024-09-25T01:28:15Z2024-09-25T01:28:15Zby Cantrell, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=272100">Click to View</a><br/>Format: Elektronik Kaynak<br/>How to cheat at designing security for a Windows Server 2003 networkent://SD_ILS/0/SD_ILS:9338562024-09-25T01:28:15Z2024-09-25T01:28:15Zby Amini, Rob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254832">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security log management identifying patterns in the chaosent://SD_ILS/0/SD_ILS:9338572024-09-25T01:28:15Z2024-09-25T01:28:15Zby Babbin, Jacob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254833">Click to View</a><br/>Format: Elektronik Kaynak<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:9338582024-09-25T01:28:15Z2024-09-25T01:28:15Zby Long, Johnny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254834">Click to View</a><br/>Format: Elektronik Kaynak<br/>Securing IM and P2P applications for the enterpriseent://SD_ILS/0/SD_ILS:9338712024-09-25T01:28:15Z2024-09-25T01:28:15Zby Piccard, Paul L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254847">Click to View</a><br/>Format: Elektronik Kaynak<br/>Insider threat protecting the enterprise from sabotage, spying, and theftent://SD_ILS/0/SD_ILS:9338732024-09-25T01:28:15Z2024-09-25T01:28:15Zby Cole, Eric.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254849">Click to View</a><br/>Format: Elektronik Kaynak<br/>Configuring SonicWALL firewallsent://SD_ILS/0/SD_ILS:9340732024-09-25T01:28:15Z2024-09-25T01:28:15Zby Lathem, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=256369">Click to View</a><br/>Format: Elektronik Kaynak<br/>How to cheat at managing information securityent://SD_ILS/0/SD_ILS:9347422024-09-25T01:28:15Z2024-09-25T01:28:15Zby Osborne, Mark.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=266207">Click to View</a><br/>Format: Elektronik Kaynak<br/>Designing and building enterprise DMZsent://SD_ILS/0/SD_ILS:9433482024-09-25T01:28:15Z2024-09-25T01:28:15Zby Flynn, Hal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=319198">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security for mobile networks and platformsent://SD_ILS/0/SD_ILS:9452042024-09-25T01:28:15Z2024-09-25T01:28:15Zby Aissi, Selim.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338731">Click to View</a><br/>Format: Elektronik Kaynak<br/>Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasuresent://SD_ILS/0/SD_ILS:9394832024-09-25T01:28:15Z2024-09-25T01:28:15Zby Contos, Brian T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294116">Click to View</a><br/>Format: Elektronik Kaynak<br/>WebSphere application server for z/OS V5 and J2EE 1.3 security handbookent://SD_ILS/0/SD_ILS:10750772024-09-25T01:28:15Z2024-09-25T01:28:15Zby Allison, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306382">Click to View</a><br/>Format: Elektronik Kaynak<br/>z/OS 1.6 security services updateent://SD_ILS/0/SD_ILS:10751482024-09-25T01:28:15Z2024-09-25T01:28:15Zby Kappeler, Patrick.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306453">Click to View</a><br/>Format: Elektronik Kaynak<br/>Secure production deployment of B2B solutions using WebSphere business integration connectent://SD_ILS/0/SD_ILS:10751512024-09-25T01:28:15Z2024-09-25T01:28:15Zby Putte, Geert van de.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306456">Click to View</a><br/>Format: Elektronik Kaynak<br/>Identity and access management solutions using WebSphere Portal V5.1, Tivoli Identity Manager V4.5.1, and Tivoli Access Manager V5.1ent://SD_ILS/0/SD_ILS:10752412024-09-25T01:28:15Z2024-09-25T01:28:15Zby Ganci, John.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306546">Click to View</a><br/>Format: Elektronik Kaynak<br/>IBM system z9 109 technical introductionent://SD_ILS/0/SD_ILS:10752772024-09-25T01:28:15Z2024-09-25T01:28:15Zby Ogden, Bill.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306582">Click to View</a><br/>Format: Elektronik Kaynak<br/>Distributed security and high availability with Tivoli Access Manager and WebSphere Application Server for z/OSent://SD_ILS/0/SD_ILS:10752972024-09-25T01:28:15Z2024-09-25T01:28:15Zby Davies, Saida.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306602">Click to View</a><br/>Format: Elektronik Kaynak<br/>z/OS diagnostic data collection and analysisent://SD_ILS/0/SD_ILS:10754652024-09-25T01:28:15Z2024-09-25T01:28:15Zby Rogers, Paul.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306770">Click to View</a><br/>Format: Elektronik Kaynak<br/>Buffer overflow attacks detect, exploit, preventent://SD_ILS/0/SD_ILS:9302072024-09-25T01:28:15Z2024-09-25T01:28:15Zby Foster, James C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=222803">Click to View</a><br/>Format: Elektronik Kaynak<br/>Intrusion prevention and active response deploying network and host IPSent://SD_ILS/0/SD_ILS:9307142024-09-25T01:28:15Z2024-09-25T01:28:15Zby Henmi, Anne.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=226578">Click to View</a><br/>Format: Elektronik Kaynak<br/>Host integrity monitoring using Osiris and Samhainent://SD_ILS/0/SD_ILS:9316062024-09-25T01:28:15Z2024-09-25T01:28:15Zby Wotring, Brian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=233599">Click to View</a><br/>Format: Elektronik Kaynak<br/>Silence on the wire a field guide to passive reconnaissance and indirect attacksent://SD_ILS/0/SD_ILS:9365792024-09-25T01:28:15Z2024-09-25T01:28:15Zby Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273504">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cisco Pix firewalls configure, manage and troubleshootent://SD_ILS/0/SD_ILS:9338592024-09-25T01:28:15Z2024-09-25T01:28:15Zby Behrens, Thorsten.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254835">Click to View</a><br/>Format: Elektronik Kaynak<br/>Nessus, Snort, & Ethereal power tools customizing open source security applicationsent://SD_ILS/0/SD_ILS:9338632024-09-25T01:28:15Z2024-09-25T01:28:15Zby Archibald, Neil.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254839">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network security evaluation using the NSA IEMent://SD_ILS/0/SD_ILS:9338662024-09-25T01:28:15Z2024-09-25T01:28:15Zby Fuller, Ed.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254842">Click to View</a><br/>Format: Elektronik Kaynak<br/>Configuring NetScreen Firewallsent://SD_ILS/0/SD_ILS:9394612024-09-25T01:28:15Z2024-09-25T01:28:15Zby Cameron, Rob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294055">Click to View</a><br/>Format: Elektronik Kaynak<br/>Dr. Tom Shinder's configuring ISA Server 2004ent://SD_ILS/0/SD_ILS:9394792024-09-25T01:28:15Z2024-09-25T01:28:15Zby Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294094">Click to View</a><br/>Format: Elektronik Kaynak<br/>Implementing PKI Services on z/OSent://SD_ILS/0/SD_ILS:10755722024-09-25T01:28:15Z2024-09-25T01:28:15Zby Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306877">Click to View</a><br/>Format: Elektronik Kaynak<br/>Internet applications the emerging global computer.ent://SD_ILS/0/SD_ILS:10920462024-09-25T01:28:15Z2024-09-25T01:28:15Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411450">Click to View</a><br/>Format: Elektronik Kaynak<br/>Innocent code a security wake-up call for Web programmersent://SD_ILS/0/SD_ILS:9294742024-09-25T01:28:15Z2024-09-25T01:28:15Zby Huseby, Sverre H.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=210558">Click to View</a><br/>Format: Elektronik Kaynak<br/>Implementing SSH strategies for optimizing the Secure Shellent://SD_ILS/0/SD_ILS:9297212024-09-25T01:28:15Z2024-09-25T01:28:15Zby Dwivedi, Himanshu.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=215119">Click to View</a><br/>Format: Elektronik Kaynak<br/>Defense and detection strategies against Internet wormsent://SD_ILS/0/SD_ILS:9310192024-09-25T01:28:15Z2024-09-25T01:28:15Zby Nazario, Jose.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227660">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network and security issues for internet mobile entertainmentent://SD_ILS/0/SD_ILS:9385962024-09-25T01:28:15Z2024-09-25T01:28:15Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=289848">Click to View</a><br/>Format: Elektronik Kaynak<br/>How to cheat at Configuring ISA Server 2004ent://SD_ILS/0/SD_ILS:9338772024-09-25T01:28:15Z2024-09-25T01:28:15Zby Shinder, Dr. Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254853">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network security foundationsent://SD_ILS/0/SD_ILS:9350402024-09-25T01:28:15Z2024-09-25T01:28:15Zby Strebe, Matthew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=267332">Click to View</a><br/>Format: Elektronik Kaynak<br/>Ethereal packet sniffingent://SD_ILS/0/SD_ILS:9394852024-09-25T01:28:15Z2024-09-25T01:28:15Zby Orebaugh, Angela.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294122">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking the code ASP. NET web application securityent://SD_ILS/0/SD_ILS:9395062024-09-25T01:28:15Z2024-09-25T01:28:15Zby Burnett, Mark (Mark M.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294160">Click to View</a><br/>Format: Elektronik Kaynak<br/>MCSE designing security for a Windows Server 2003 network : exam 70-298 study guide & DVD training systement://SD_ILS/0/SD_ILS:9395332024-09-25T01:28:15Z2024-09-25T01:28:15Zby Khnaser, Elias N.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294253">Click to View</a><br/>Format: Elektronik Kaynak<br/>Nessus network auditingent://SD_ILS/0/SD_ILS:9395402024-09-25T01:28:15Z2024-09-25T01:28:15Zby Beale, Jay.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294281">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber adversary characterization auditing the hacker mindent://SD_ILS/0/SD_ILS:9394692024-09-25T01:28:15Z2024-09-25T01:28:15Zby Parker, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294071">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security sage's guide to hardening the network infrastructureent://SD_ILS/0/SD_ILS:9395712024-09-25T01:28:15Z2024-09-25T01:28:15Zby Andrés, Steven.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294359">Click to View</a><br/>Format: Elektronik Kaynak<br/>Virtual private networking a construction, operation and utilization guideent://SD_ILS/0/SD_ILS:9587982024-09-25T01:28:15Z2024-09-25T01:28:15Zby Held, Gilbert, 1943-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=470565">Click to View</a><br/>Format: Elektronik Kaynak<br/>The Internet under crisis conditions learning from September 11ent://SD_ILS/0/SD_ILS:10827722024-09-25T01:28:15Z2024-09-25T01:28:15Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3375369">Click to View</a><br/>Format: Elektronik Kaynak<br/>Z/OS WebSphere and J2EE security handbookent://SD_ILS/0/SD_ILS:10753152024-09-25T01:28:15Z2024-09-25T01:28:15Zby Wunderlich, Holger.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306620">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security configuration in a TCP/IP Sysplex environmentent://SD_ILS/0/SD_ILS:10753562024-09-25T01:28:15Z2024-09-25T01:28:15Zby Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306661">Click to View</a><br/>Format: Elektronik Kaynak<br/>Enterprise business portals II with IBM tivoli access managerent://SD_ILS/0/SD_ILS:10754522024-09-25T01:28:15Z2024-09-25T01:28:15Zby Bücker, Axel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306757">Click to View</a><br/>Format: Elektronik Kaynak<br/>ExamWise for CIW security professional exam 1D0-470ent://SD_ILS/0/SD_ILS:10919422024-09-25T01:28:15Z2024-09-25T01:28:15Zby Bayer, Chad M.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3410580">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security secrets, intruders and ID tags.ent://SD_ILS/0/SD_ILS:10920432024-09-25T01:28:15Z2024-09-25T01:28:15Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411447">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking the art of exploitationent://SD_ILS/0/SD_ILS:9365672024-09-25T01:28:15Z2024-09-25T01:28:15Zby Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273488">Click to View</a><br/>Format: Elektronik Kaynak<br/>Best damn firewall book periodent://SD_ILS/0/SD_ILS:9395852024-09-25T01:28:15Z2024-09-25T01:28:15Zby Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294396">Click to View</a><br/>Format: Elektronik Kaynak<br/>Building DMZs for Enterprise networksent://SD_ILS/0/SD_ILS:9394442024-09-25T01:28:15Z2024-09-25T01:28:15Zby Shimonski, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294015">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cisco security professional's guide to secure intrusion detection systemsent://SD_ILS/0/SD_ILS:9394512024-09-25T01:28:15Z2024-09-25T01:28:15Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294035">Click to View</a><br/>Format: Elektronik Kaynak<br/>Configuring Symantec Antivirus, Corporate Editionent://SD_ILS/0/SD_ILS:9394622024-09-25T01:28:15Z2024-09-25T01:28:15Zby Hunter, Laura E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294056">Click to View</a><br/>Format: Elektronik Kaynak<br/>Snort 2.0 intrusion detectionent://SD_ILS/0/SD_ILS:9395752024-09-25T01:28:15Z2024-09-25T01:28:15Zby Beale, Jay.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294371">Click to View</a><br/>Format: Elektronik Kaynak<br/>Special ops host and Network security for Microsoft, UNIX, and Oracleent://SD_ILS/0/SD_ILS:9395772024-09-25T01:28:15Z2024-09-25T01:28:15Zby Birkholz, Erik Pace.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294373">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network security a practical guideent://SD_ILS/0/SD_ILS:9403342024-09-25T01:28:15Z2024-09-25T01:28:15Zby Poole, Owen.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=298471">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity operations handbookent://SD_ILS/0/SD_ILS:9426132024-09-25T01:28:15Z2024-09-25T01:28:15Zby Rittinghouse, John W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=313612">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity today and tomorrow pay now or pay laterent://SD_ILS/0/SD_ILS:10825832024-09-25T01:28:15Z2024-09-25T01:28:15Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3375180">Click to View</a><br/>Format: Elektronik Kaynak<br/>Introduction to communication electronic warfare systemsent://SD_ILS/0/SD_ILS:9309792024-09-25T01:28:15Z2024-09-25T01:28:15Zby Poisel, Richard.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227618">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network security jumpstartent://SD_ILS/0/SD_ILS:9360082024-09-25T01:28:15Z2024-09-25T01:28:15Zby Strebe, Matthew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=272216">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hack proofing ColdFusionent://SD_ILS/0/SD_ILS:9394982024-09-25T01:28:15Z2024-09-25T01:28:15Zby Meyer, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294151">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hack proofing your networkent://SD_ILS/0/SD_ILS:9395042024-09-25T01:28:15Z2024-09-25T01:28:15Zby Ahmad, David R. Mirza.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294158">Click to View</a><br/>Format: Elektronik Kaynak<br/>Managing Cisco network securityent://SD_ILS/0/SD_ILS:9395242024-09-25T01:28:15Z2024-09-25T01:28:15Zby Danielyan, Edgar.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294234">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cisco security specialist's guide to PIX Firewallent://SD_ILS/0/SD_ILS:9394522024-09-25T01:28:15Z2024-09-25T01:28:15Zby Osipov, Vitaly.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294036">Click to View</a><br/>Format: Elektronik Kaynak<br/>Nokia Network security solutions handbookent://SD_ILS/0/SD_ILS:9395422024-09-25T01:28:15Z2024-09-25T01:28:15Zby Maxwell, Douglas D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294289">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hack proofing Windows 2000ent://SD_ILS/0/SD_ILS:9395012024-09-25T01:28:15Z2024-09-25T01:28:15Zby Todd, Chad.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294154">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hack proofing your wireless networkent://SD_ILS/0/SD_ILS:9395072024-09-25T01:28:15Z2024-09-25T01:28:15Zby Owens, Les.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294161">Click to View</a><br/>Format: Elektronik Kaynak<br/>Configuring ISA server 2000 building firewalls for windows 2000ent://SD_ILS/0/SD_ILS:9394602024-09-25T01:28:15Z2024-09-25T01:28:15Zby Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294054">Click to View</a><br/>Format: Elektronik Kaynak<br/>Trust in cyberspaceent://SD_ILS/0/SD_ILS:10859602024-09-25T01:28:15Z2024-09-25T01:28:15Zby Schneider, Fred B.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3378820">Click to View</a><br/>Format: Elektronik Kaynak<br/>