Arama Sonuçları - Daraltılmış: ProQuest (Firm) - Computer security.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dAUTHOR$002509Yazar$002509ProQuest$002b$002528Firm$002529$002509ProQuest$002b$002528Firm$002529$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300?dt=list2024-09-26T13:45:59ZBiohackers the politics of open scienceent://SD_ILS/0/SD_ILS:10882072024-09-26T13:45:59Z2024-09-26T13:45:59Zby Delfanti, Alessandro.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3386719">Click to View</a><br/>Format: Elektronik Kaynak<br/>Technocrime, policing and surveillanceent://SD_ILS/0/SD_ILS:10005672024-09-26T13:45:59Z2024-09-26T13:45:59Zby Leman-Langlois, Stéphane, 1965-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1016143">Click to View</a><br/>Format: Elektronik Kaynak<br/>Intelligent systems for security informaticsent://SD_ILS/0/SD_ILS:10094932024-09-26T13:45:59Z2024-09-26T13:45:59Zby Yang, Christopher.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1133729">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber security for educational leaders a guide to understanding and implementing technology policiesent://SD_ILS/0/SD_ILS:10106562024-09-26T13:45:59Z2024-09-26T13:45:59Zby Sianjina, Rayton R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1143733">Click to View</a><br/>Format: Elektronik Kaynak<br/>Pragmatic security metrics applying metametrics to information securityent://SD_ILS/0/SD_ILS:10109722024-09-26T13:45:59Z2024-09-26T13:45:59Zby Brotby, W. Krag.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1153198">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information security risk assessment toolkit practical assessments through data collection and data analysisent://SD_ILS/0/SD_ILS:10028372024-09-26T13:45:59Z2024-09-26T13:45:59Zby Talabis, Mark Ryan N.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1047930">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network intrusion analysis methodologies, tools, and techniques for incident analysis and responseent://SD_ILS/0/SD_ILS:10033762024-09-26T13:45:59Z2024-09-26T13:45:59Zby Fichera, Joe, 1966-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1058152">Click to View</a><br/>Format: Elektronik Kaynak<br/>Data hiding exposing concealed data in multimedia, operating systems, mobile devices, and network protocolsent://SD_ILS/0/SD_ILS:10039162024-09-26T13:45:59Z2024-09-26T13:45:59Zby Raggo, Michael T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073014">Click to View</a><br/>Format: Elektronik Kaynak<br/>Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineersent://SD_ILS/0/SD_ILS:10039222024-09-26T13:45:59Z2024-09-26T13:45:59Zby O'Connor, T. J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073021">Click to View</a><br/>Format: Elektronik Kaynak<br/>Logging and log management the authoritative guide to understanding the concepts surrounding logging and log managementent://SD_ILS/0/SD_ILS:10044582024-09-26T13:45:59Z2024-09-26T13:45:59Zby Chuvakin, Anton A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1077419">Click to View</a><br/>Format: Elektronik Kaynak<br/>Enterprise security a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterpriseent://SD_ILS/0/SD_ILS:10059952024-09-26T13:45:59Z2024-09-26T13:45:59Zby Woody, Aaron.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1103988">Click to View</a><br/>Format: Elektronik Kaynak<br/>Group policy fundamentals, security, and the managed desktopent://SD_ILS/0/SD_ILS:10060892024-09-26T13:45:59Z2024-09-26T13:45:59Zby Moskowitz, Jeremy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1104500">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking for dummiesent://SD_ILS/0/SD_ILS:10062512024-09-26T13:45:59Z2024-09-26T13:45:59Zby Beaver, Kevin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1106542">Click to View</a><br/>Format: Elektronik Kaynak<br/>Web application defender's cookbook battling hackers and protecting usersent://SD_ILS/0/SD_ILS:10066272024-09-26T13:45:59Z2024-09-26T13:45:59Zby Barnett, Ryan C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108733">Click to View</a><br/>Format: Elektronik Kaynak<br/>The complete guide to physical securityent://SD_ILS/0/SD_ILS:10070022024-09-26T13:45:59Z2024-09-26T13:45:59Zby Baker, Paul R., 1958-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1112600">Click to View</a><br/>Format: Elektronik Kaynak<br/>Windows server 2012 security from end to edge and beyond architecting, designing, planning, and deploying Windows server 2012 security solutionsent://SD_ILS/0/SD_ILS:10076122024-09-26T13:45:59Z2024-09-26T13:45:59Zby Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115164">Click to View</a><br/>Format: Elektronik Kaynak<br/>Practical anonymity hiding in plain sight onlineent://SD_ILS/0/SD_ILS:10076142024-09-26T13:45:59Z2024-09-26T13:45:59Zby Loshin, Peter.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115167">Click to View</a><br/>Format: Elektronik Kaynak<br/>Simple steps to data encryption a practical guide to secure computingent://SD_ILS/0/SD_ILS:10076232024-09-26T13:45:59Z2024-09-26T13:45:59Zby Loshin, Pete.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115182">Click to View</a><br/>Format: Elektronik Kaynak<br/>Using social media for global securityent://SD_ILS/0/SD_ILS:10078452024-09-26T13:45:59Z2024-09-26T13:45:59Zby Gupta, Ravi.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1118756">Click to View</a><br/>Format: Elektronik Kaynak<br/>Citrix Access Gateway VPX 5.04 essentials a practical step-by-step guide to provide secure remote access using the Citrix Access Gateway VPXent://SD_ILS/0/SD_ILS:10080152024-09-26T13:45:59Z2024-09-26T13:45:59Zby Mallett, Andrew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1119760">Click to View</a><br/>Format: Elektronik Kaynak<br/>Investigative computer forensics the practical guide for lawyers, accountants, investigators, and business executivesent://SD_ILS/0/SD_ILS:9864922024-09-26T13:45:59Z2024-09-26T13:45:59Zby Laykin, Erik.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=817953">Click to View</a><br/>Format: Elektronik Kaynak<br/>Safety management for software-based equipmentent://SD_ILS/0/SD_ILS:10134392024-09-26T13:45:59Z2024-09-26T13:45:59Zby Boulanger, Jean-Louis.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1187169">Click to View</a><br/>Format: Elektronik Kaynak<br/>Securing SQL servers protecting your database from attackersent://SD_ILS/0/SD_ILS:9989532024-09-26T13:45:59Z2024-09-26T13:45:59Zby Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=980013">Click to View</a><br/>Format: Elektronik Kaynak<br/>Getting started with Citrix XenApp 6.5 design and implement Citrix farms based on XenApp 6.5ent://SD_ILS/0/SD_ILS:9998702024-09-26T13:45:59Z2024-09-26T13:45:59Zby Musumeci, Guillermo.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=995550">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking web apps detecting and preventing web application security problemsent://SD_ILS/0/SD_ILS:10003712024-09-26T13:45:59Z2024-09-26T13:45:59Zby Shema, Mike.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1012529">Click to View</a><br/>Format: Elektronik Kaynak<br/>Microsoft Forefront Identity Manager 2010 R2 handbookent://SD_ILS/0/SD_ILS:10006802024-09-26T13:45:59Z2024-09-26T13:45:59Zby Nordström, Kent.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1019543">Click to View</a><br/>Format: Elektronik Kaynak<br/>Malware forensics field guide for Windows systems digital forensics field guidesent://SD_ILS/0/SD_ILS:9951892024-09-26T13:45:59Z2024-09-26T13:45:59Zby Malin, Cameron H.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=921016">Click to View</a><br/>Format: Elektronik Kaynak<br/>SQL injection attacks and defenseent://SD_ILS/0/SD_ILS:9972872024-09-26T13:45:59Z2024-09-26T13:45:59Zby Clarke, Justin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=953188">Click to View</a><br/>Format: Elektronik Kaynak<br/>Practical malware analysis the hands-on guide to dissecting malicious softwareent://SD_ILS/0/SD_ILS:10099722024-09-26T13:45:59Z2024-09-26T13:45:59Zby Sikorski, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137570">Click to View</a><br/>Format: Elektronik Kaynak<br/>The tangled Web a guide to securing modern Web applicationsent://SD_ILS/0/SD_ILS:10099762024-09-26T13:45:59Z2024-09-26T13:45:59Zby Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137574">Click to View</a><br/>Format: Elektronik Kaynak<br/>Microsoft SQL Server 2012 security cookbookent://SD_ILS/0/SD_ILS:10018912024-09-26T13:45:59Z2024-09-26T13:45:59Zby Bruchez, Rudi.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1036251">Click to View</a><br/>Format: Elektronik Kaynak<br/>Oracle 11g anti-hacker's cookbookent://SD_ILS/0/SD_ILS:10033492024-09-26T13:45:59Z2024-09-26T13:45:59Zby Neagu, Adrian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1057945">Click to View</a><br/>Format: Elektronik Kaynak<br/>Securing WebLogic Server 12c learn to develop, administer, and troubleshot your WebLogic Serverent://SD_ILS/0/SD_ILS:10049592024-09-26T13:45:59Z2024-09-26T13:45:59Zby Masini, Luca.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1085228">Click to View</a><br/>Format: Elektronik Kaynak<br/>Nmap 6 network exploration and security auditing cookbook ; a complete guide to mastering Nmap 6 and its scripting engine, covering practical tasks for penetration testers and system administratorsent://SD_ILS/0/SD_ILS:10049612024-09-26T13:45:59Z2024-09-26T13:45:59Zby Calderon Pale, Paulino.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1085230">Click to View</a><br/>Format: Elektronik Kaynak<br/>Spring Security 3.1 secure your web applications from hackers with the step-by-step guideent://SD_ILS/0/SD_ILS:10065082024-09-26T13:45:59Z2024-09-26T13:45:59Zby Winch, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108351">Click to View</a><br/>Format: Elektronik Kaynak<br/>Safeguarding critical e-documents implementing a program for securing confidential information assetsent://SD_ILS/0/SD_ILS:9871482024-09-26T13:45:59Z2024-09-26T13:45:59Zby Smallwood, Robert F., 1959-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=821999">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity for industrial control systems SCADA, DCS, PLC, HMI, and SISent://SD_ILS/0/SD_ILS:9874492024-09-26T13:45:59Z2024-09-26T13:45:59Zby Macaulay, Tyson.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826923">Click to View</a><br/>Format: Elektronik Kaynak<br/>Data mining tools for malware detectionent://SD_ILS/0/SD_ILS:9874612024-09-26T13:45:59Z2024-09-26T13:45:59Zby Masud, Mehedy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826949">Click to View</a><br/>Format: Elektronik Kaynak<br/>Low tech hacking street smarts for security professionalsent://SD_ILS/0/SD_ILS:9877872024-09-26T13:45:59Z2024-09-26T13:45:59Zby Wiles, Jack.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=829964">Click to View</a><br/>Format: Elektronik Kaynak<br/>Windows forensic analysis toolkit advanced analysis techniques for Windows 7ent://SD_ILS/0/SD_ILS:9899252024-09-26T13:45:59Z2024-09-26T13:45:59Zby Carvey, Harlan A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=850700">Click to View</a><br/>Format: Elektronik Kaynak<br/>Embedded systems security practical methods for safe and secure software and systems developmentent://SD_ILS/0/SD_ILS:9925552024-09-26T13:45:59Z2024-09-26T13:45:59Zby Kleidermacher, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=886256">Click to View</a><br/>Format: Elektronik Kaynak<br/>Advances in intelligence and security informaticsent://SD_ILS/0/SD_ILS:9930232024-09-26T13:45:59Z2024-09-26T13:45:59Zby Mao, Wenji.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=892251">Click to View</a><br/>Format: Elektronik Kaynak<br/>IBM i security administration and complianceent://SD_ILS/0/SD_ILS:9937152024-09-26T13:45:59Z2024-09-26T13:45:59Zby Woodbury, Carol.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=906259">Click to View</a><br/>Format: Elektronik Kaynak<br/>Oracle Identity and Access Manager 11g for administrators administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasksent://SD_ILS/0/SD_ILS:9968352024-09-26T13:45:59Z2024-09-26T13:45:59Zby Kumar, Atul.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948559">Click to View</a><br/>Format: Elektronik Kaynak<br/>Microsoft Forefront UAG 2010 administrator's handbook take full command of Microsoft Forefront Unified Access Gateway to secure your business applications and provide dynamic remote access with DirectAccessent://SD_ILS/0/SD_ILS:9968442024-09-26T13:45:59Z2024-09-26T13:45:59Zby Ben-Ari, Erez.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948568">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security risk management building an information security risk management program from the ground upent://SD_ILS/0/SD_ILS:9768042024-09-26T13:45:59Z2024-09-26T13:45:59Zby Wheeler, Evan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=685406">Click to View</a><br/>Format: Elektronik Kaynak<br/>Securing the cloud cloud computer security techniques and tacticsent://SD_ILS/0/SD_ILS:9770552024-09-26T13:45:59Z2024-09-26T13:45:59Zby Winkler, J. R. (Joachim R.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=686827">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security 2020 reduce security risks this decadeent://SD_ILS/0/SD_ILS:9784162024-09-26T13:45:59Z2024-09-26T13:45:59Zby Howard, Doug.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=694289">Click to View</a><br/>Format: Elektronik Kaynak<br/>Web commerce security design and developmentent://SD_ILS/0/SD_ILS:9789752024-09-26T13:45:59Z2024-09-26T13:45:59Zby Nahari, Hadi.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706729">Click to View</a><br/>Format: Elektronik Kaynak<br/>Social engineering the art of human hackingent://SD_ILS/0/SD_ILS:9789802024-09-26T13:45:59Z2024-09-26T13:45:59Zby Hadnagy, Christopher.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706746">Click to View</a><br/>Format: Elektronik Kaynak<br/>A bug hunter's diary a guided tour through the wilds of software securityent://SD_ILS/0/SD_ILS:10099452024-09-26T13:45:59Z2024-09-26T13:45:59Zby Klein, Tobias.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137526">Click to View</a><br/>Format: Elektronik Kaynak<br/>Formal models and techniques for analyzing security protocolsent://SD_ILS/0/SD_ILS:9843592024-09-26T13:45:59Z2024-09-26T13:45:59Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=784604">Click to View</a><br/>Format: Elektronik Kaynak<br/>The web application hacker's handbook finding and exploiting security flawsent://SD_ILS/0/SD_ILS:9867732024-09-26T13:45:59Z2024-09-26T13:45:59Zby Stuttard, Dafydd.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=819008">Click to View</a><br/>Format: Elektronik Kaynak<br/>The Cloud understanding the security, privacy and trust challengesent://SD_ILS/0/SD_ILS:9873972024-09-26T13:45:59Z2024-09-26T13:45:59Zby Robinson, Neil, 1964-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=825129">Click to View</a><br/>Format: Elektronik Kaynak<br/>Identity management concepts, technologies, and systemsent://SD_ILS/0/SD_ILS:9725072024-09-26T13:45:59Z2024-09-26T13:45:59Zby Bertino, Elisa.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=634511">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer Forensics jumpstartent://SD_ILS/0/SD_ILS:9736802024-09-26T13:45:59Z2024-09-26T13:45:59Zby Solomon, Michael R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=661659">Click to View</a><br/>Format: Elektronik Kaynak<br/>Least privilege security for Windows 7, Vista, And XP secure desktops for regulatory compliance and business agilityent://SD_ILS/0/SD_ILS:9963142024-09-26T13:45:59Z2024-09-26T13:45:59Zby Smith, Russell.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=944038">Click to View</a><br/>Format: Elektronik Kaynak<br/>GlassFish security secure your GlassFish installation, web applications, EJB applications, application client module, and web services using Java EE and GlassFish security measuresent://SD_ILS/0/SD_ILS:9964052024-09-26T13:45:59Z2024-09-26T13:45:59Zby Kalali, Masoud.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=944941">Click to View</a><br/>Format: Elektronik Kaynak<br/>Safety of computer architecturesent://SD_ILS/0/SD_ILS:10081532024-09-26T13:45:59Z2024-09-26T13:45:59Zby Boulanger, Jean-Louis.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1120753">Click to View</a><br/>Format: Elektronik Kaynak<br/>Risk factors in computer-crime victimizationent://SD_ILS/0/SD_ILS:10032442024-09-26T13:45:59Z2024-09-26T13:45:59Zby Choi, Kyung-shick, 1973-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1057793">Click to View</a><br/>Format: Elektronik Kaynak<br/>Advances in artificial intelligence for privacy protection and securityent://SD_ILS/0/SD_ILS:10302722024-09-26T13:45:59Z2024-09-26T13:45:59Zby Solanas, Agusti.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1679374">Click to View</a><br/>Format: Elektronik Kaynak<br/>Group policy fundamentals, security, and the managed desktopent://SD_ILS/0/SD_ILS:9634792024-09-26T13:45:59Z2024-09-26T13:45:59Zby Moskowitz, Jeremy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=530009">Click to View</a><br/>Format: Elektronik Kaynak<br/>Dear hacker letters to the editor of 2600ent://SD_ILS/0/SD_ILS:9648672024-09-26T13:45:59Z2024-09-26T13:45:59Zby Goldstein, Emmanuel J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537340">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hashing in computer science fifty years of slicing and dicingent://SD_ILS/0/SD_ILS:9648692024-09-26T13:45:59Z2024-09-26T13:45:59Zby Konheim, Alan G., 1934-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537352">Click to View</a><br/>Format: Elektronik Kaynak<br/>Professional Cocoa application securityent://SD_ILS/0/SD_ILS:9648702024-09-26T13:45:59Z2024-09-26T13:45:59Zby Lee, Graham J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537355">Click to View</a><br/>Format: Elektronik Kaynak<br/>IT audit, control, and securityent://SD_ILS/0/SD_ILS:9721352024-09-26T13:45:59Z2024-09-26T13:45:59Zby Moeller, Robert R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=624573">Click to View</a><br/>Format: Elektronik Kaynak<br/>Adaptive security management architectureent://SD_ILS/0/SD_ILS:9722382024-09-26T13:45:59Z2024-09-26T13:45:59Zby Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=625004">Click to View</a><br/>Format: Elektronik Kaynak<br/>Logics and languages for reliability and securityent://SD_ILS/0/SD_ILS:9666272024-09-26T13:45:59Z2024-09-26T13:45:59Zby Esparza, Javier.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=557042">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cloud security a comprehensive guide to secure cloud computingent://SD_ILS/0/SD_ILS:9684032024-09-26T13:45:59Z2024-09-26T13:45:59Zby Krutz, Ronald L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=589027">Click to View</a><br/>Format: Elektronik Kaynak<br/>Mac security bibleent://SD_ILS/0/SD_ILS:9603772024-09-26T13:45:59Z2024-09-26T13:45:59Zby Kissell, Joe.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=477803">Click to View</a><br/>Format: Elektronik Kaynak<br/>Gray hat Python Python programming for hackers and reverse engineersent://SD_ILS/0/SD_ILS:10099522024-09-26T13:45:59Z2024-09-26T13:45:59Zby Seitz, Justin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137535">Click to View</a><br/>Format: Elektronik Kaynak<br/>Distributed systems security issues, processes, and solutionsent://SD_ILS/0/SD_ILS:9541832024-09-26T13:45:59Z2024-09-26T13:45:59Zby Belapurkar, Abhijit.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=437429">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:9556372024-09-26T13:45:59Z2024-09-26T13:45:59Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=453166">Click to View</a><br/>Format: Elektronik Kaynak<br/>Enterprise information security and privacyent://SD_ILS/0/SD_ILS:9563312024-09-26T13:45:59Z2024-09-26T13:45:59Zby Axelrod, C. Warren.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456886">Click to View</a><br/>Format: Elektronik Kaynak<br/>The definitive guide to the C&A transformation the first publication of a comprehensive view of the C&A transformationent://SD_ILS/0/SD_ILS:9654532024-09-26T13:45:59Z2024-09-26T13:45:59Zby Mehan, Julie E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=547041">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking the art of exploitationent://SD_ILS/0/SD_ILS:10099552024-09-26T13:45:59Z2024-09-26T13:45:59Zby Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137538">Click to View</a><br/>Format: Elektronik Kaynak<br/>Digital watermarking and steganographyent://SD_ILS/0/SD_ILS:9440152024-09-26T13:45:59Z2024-09-26T13:45:59Zby Cox, I. J. (Ingemar J.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328311">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information assurance dependability and security in networked systemsent://SD_ILS/0/SD_ILS:9440162024-09-26T13:45:59Z2024-09-26T13:45:59Zby Qian, Yi, 1962-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328312">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information security a manager's guide to thwarting data thieves and hackersent://SD_ILS/0/SD_ILS:9452882024-09-26T13:45:59Z2024-09-26T13:45:59Zby Alexander, Philip, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=339307">Click to View</a><br/>Format: Elektronik Kaynak<br/>Secure computer and network systems modeling, analysis and designent://SD_ILS/0/SD_ILS:9463852024-09-26T13:45:59Z2024-09-26T13:45:59Zby Ye, Nong.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=351427">Click to View</a><br/>Format: Elektronik Kaynak<br/>Practical embedded security building secure resource-constrained systemsent://SD_ILS/0/SD_ILS:9425072024-09-26T13:45:59Z2024-09-26T13:45:59Zby Stapko, Timothy John.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=312846">Click to View</a><br/>Format: Elektronik Kaynak<br/>Trust and security in collaborative computingent://SD_ILS/0/SD_ILS:10302552024-09-26T13:45:59Z2024-09-26T13:45:59Zby Zou, Xukai, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1679354">Click to View</a><br/>Format: Elektronik Kaynak<br/>Securing information and communications systems principles, technologies, and applicationsent://SD_ILS/0/SD_ILS:9563262024-09-26T13:45:59Z2024-09-26T13:45:59Zby Furnell, Steven, 1970-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456881">Click to View</a><br/>Format: Elektronik Kaynak<br/>Fuzzing for software security testing and quality assuranceent://SD_ILS/0/SD_ILS:9563292024-09-26T13:45:59Z2024-09-26T13:45:59Zby Takanen, Ari.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456884">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information security policy, processes, and practicesent://SD_ILS/0/SD_ILS:9532972024-09-26T13:45:59Z2024-09-26T13:45:59Zby Straub, Detmar W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=435197">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer forensics for dummiesent://SD_ILS/0/SD_ILS:9477742024-09-26T13:45:59Z2024-09-26T13:45:59Zby Volonino, Linda.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=380503">Click to View</a><br/>Format: Elektronik Kaynak<br/>Toward a safer and more secure cyberspaceent://SD_ILS/0/SD_ILS:10854522024-09-26T13:45:59Z2024-09-26T13:45:59Zby Goodman, Seymour E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3378311">Click to View</a><br/>Format: Elektronik Kaynak<br/>The misuse of information systems the impact of security countermeasuresent://SD_ILS/0/SD_ILS:10580442024-09-26T13:45:59Z2024-09-26T13:45:59Zby D'Arcy, John P., 1975-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3016826">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security data visualization graphical techniques for network analysisent://SD_ILS/0/SD_ILS:10584542024-09-26T13:45:59Z2024-09-26T13:45:59Zby Conti, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3017625">Click to View</a><br/>Format: Elektronik Kaynak<br/>Developer's guide to web application securityent://SD_ILS/0/SD_ILS:9385212024-09-26T13:45:59Z2024-09-26T13:45:59Zby Cross, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=289735">Click to View</a><br/>Format: Elektronik Kaynak<br/>Papers from the first European workshop on technological & security issues in digital rights management (EuDiRights)ent://SD_ILS/0/SD_ILS:9391602024-09-26T13:45:59Z2024-09-26T13:45:59Zby Yagüe, Mariemma.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=291585">Click to View</a><br/>Format: Elektronik Kaynak<br/>A process for developing a common vocabulary in the information security areaent://SD_ILS/0/SD_ILS:9434782024-09-26T13:45:59Z2024-09-26T13:45:59Zby NATO Advanced Research Workshop on a Process for Developing a Common Vocabulary in the Information Security Area (2006 : Moscow, Russia)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=320313">Click to View</a><br/>Format: Elektronik Kaynak<br/>Microsoft Vista for IT security professionalsent://SD_ILS/0/SD_ILS:9440752024-09-26T13:45:59Z2024-09-26T13:45:59Zby Piltzecker, Tony, 1975-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328623">Click to View</a><br/>Format: Elektronik Kaynak<br/>Windows forensic analysis DVD toolkit,ent://SD_ILS/0/SD_ILS:9440762024-09-26T13:45:59Z2024-09-26T13:45:59Zby Carvey, Harlan A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328624">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information management & computer security. Volume 15, Number 5, Papers from the HAISA 2007 Symposiument://SD_ILS/0/SD_ILS:9441192024-09-26T13:45:59Z2024-09-26T13:45:59Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328737">Click to View</a><br/>Format: Elektronik Kaynak<br/>Best damn firewall book periodent://SD_ILS/0/SD_ILS:9442602024-09-26T13:45:59Z2024-09-26T13:45:59Zby Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=330100">Click to View</a><br/>Format: Elektronik Kaynak<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:9442822024-09-26T13:45:59Z2024-09-26T13:45:59Zby Winkler, Ira.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=330200">Click to View</a><br/>Format: Elektronik Kaynak<br/>Role-based access controlent://SD_ILS/0/SD_ILS:9452212024-09-26T13:45:59Z2024-09-26T13:45:59Zby Ferraiolo, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338751">Click to View</a><br/>Format: Elektronik Kaynak<br/>Microsoft windows security fundamentalsent://SD_ILS/0/SD_ILS:9396472024-09-26T13:45:59Z2024-09-26T13:45:59Zby Clercq, Jan de, 1968-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294637">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security convergence managing enterprise security riskent://SD_ILS/0/SD_ILS:9404342024-09-26T13:45:59Z2024-09-26T13:45:59Zby Tyson, Dave.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=299507">Click to View</a><br/>Format: Elektronik Kaynak<br/>Techno security's guide to e-discovery and digital forensicsent://SD_ILS/0/SD_ILS:9480152024-09-26T13:45:59Z2024-09-26T13:45:59Zby Wiles, Jack.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=405426">Click to View</a><br/>Format: Elektronik Kaynak<br/>Trusted platform module basics using TPM in embedded systemsent://SD_ILS/0/SD_ILS:9367052024-09-26T13:45:59Z2024-09-26T13:45:59Zby Kinney, Steven.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=274719">Click to View</a><br/>Format: Elektronik Kaynak<br/>Multimedia security technologies for digital rights managementent://SD_ILS/0/SD_ILS:9366402024-09-26T13:45:59Z2024-09-26T13:45:59Zby Zeng, Wenjun, 1967-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=274233">Click to View</a><br/>Format: Elektronik Kaynak<br/>Combating spyware in the enterpriseent://SD_ILS/0/SD_ILS:9366452024-09-26T13:45:59Z2024-09-26T13:45:59Zby Baskin, Brian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=274289">Click to View</a><br/>Format: Elektronik Kaynak<br/>Part-themed issue on internet securityent://SD_ILS/0/SD_ILS:9379892024-09-26T13:45:59Z2024-09-26T13:45:59Zby Yague, Mariemma.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=285507">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security issues of IT outsourcingent://SD_ILS/0/SD_ILS:9380182024-09-26T13:45:59Z2024-09-26T13:45:59Zby Gritzalis, Stefanos.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=285536">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information assurance and computer securityent://SD_ILS/0/SD_ILS:9381762024-09-26T13:45:59Z2024-09-26T13:45:59Zby NATO Advanced Research Workshop on Information Assurance and Computer Security (2005 : T?etouan, Morocco)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=287000">Click to View</a><br/>Format: Elektronik Kaynak<br/>Securing HP NonStop servers in an open systems world TCP/IP, OSS & SQLent://SD_ILS/0/SD_ILS:9391972024-09-26T13:45:59Z2024-09-26T13:45:59Zby XYPRO Technology Corporation.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=291716">Click to View</a><br/>Format: Elektronik Kaynak<br/>How to cheat at designing security for a Windows Server 2003 networkent://SD_ILS/0/SD_ILS:9338562024-09-26T13:45:59Z2024-09-26T13:45:59Zby Amini, Rob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254832">Click to View</a><br/>Format: Elektronik Kaynak<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:9338582024-09-26T13:45:59Z2024-09-26T13:45:59Zby Long, Johnny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254834">Click to View</a><br/>Format: Elektronik Kaynak<br/>Securing IM and P2P applications for the enterpriseent://SD_ILS/0/SD_ILS:9338712024-09-26T13:45:59Z2024-09-26T13:45:59Zby Piccard, Paul L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254847">Click to View</a><br/>Format: Elektronik Kaynak<br/>Insider threat protecting the enterprise from sabotage, spying, and theftent://SD_ILS/0/SD_ILS:9338732024-09-26T13:45:59Z2024-09-26T13:45:59Zby Cole, Eric.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254849">Click to View</a><br/>Format: Elektronik Kaynak<br/>Perfect passwords selection, protection, authenticationent://SD_ILS/0/SD_ILS:9338752024-09-26T13:45:59Z2024-09-26T13:45:59Zby Burnett, Mark.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254851">Click to View</a><br/>Format: Elektronik Kaynak<br/>BigNum math implementing cryptographic multiple precision arithmeticent://SD_ILS/0/SD_ILS:9346052024-09-26T13:45:59Z2024-09-26T13:45:59Zby St. Denis, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=261284">Click to View</a><br/>Format: Elektronik Kaynak<br/>Essential computer security everyone's guide to e-mail, internet, and wireless securityent://SD_ILS/0/SD_ILS:9433502024-09-26T13:45:59Z2024-09-26T13:45:59Zby Bradley, Tony.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=319200">Click to View</a><br/>Format: Elektronik Kaynak<br/>Click, click, who's really there? protect your family from online predators, pedophiles, privacy loss, and moreent://SD_ILS/0/SD_ILS:9452762024-09-26T13:45:59Z2024-09-26T13:45:59Zby Koh.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338853">Click to View</a><br/>Format: Elektronik Kaynak<br/>Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasuresent://SD_ILS/0/SD_ILS:9394832024-09-26T13:45:59Z2024-09-26T13:45:59Zby Contos, Brian T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294116">Click to View</a><br/>Format: Elektronik Kaynak<br/>Multilevel security and DB2 row-level security revealedent://SD_ILS/0/SD_ILS:10751592024-09-26T13:45:59Z2024-09-26T13:45:59Zby Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306464">Click to View</a><br/>Format: Elektronik Kaynak<br/>Federated identity management and web services security with IBM tivoli security solutionsent://SD_ILS/0/SD_ILS:10752162024-09-26T13:45:59Z2024-09-26T13:45:59Zby Bücker, Axel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306521">Click to View</a><br/>Format: Elektronik Kaynak<br/>IBM rational application developer V6 portlet application development and portal toolsent://SD_ILS/0/SD_ILS:10752422024-09-26T13:45:59Z2024-09-26T13:45:59Zby Rodriguez, Juan R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306547">Click to View</a><br/>Format: Elektronik Kaynak<br/>Buffer overflow attacks detect, exploit, preventent://SD_ILS/0/SD_ILS:9302072024-09-26T13:45:59Z2024-09-26T13:45:59Zby Foster, James C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=222803">Click to View</a><br/>Format: Elektronik Kaynak<br/>Black hat physical device security exploiting hardware and softwareent://SD_ILS/0/SD_ILS:9302092024-09-26T13:45:59Z2024-09-26T13:45:59Zby Miller, Drew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=222851">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber spying tracking your family's (sometimes) secret online livesent://SD_ILS/0/SD_ILS:9302102024-09-26T13:45:59Z2024-09-26T13:45:59Zby Fair, Ted.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=222853">Click to View</a><br/>Format: Elektronik Kaynak<br/>Aggressive network self-defenseent://SD_ILS/0/SD_ILS:9306562024-09-26T13:45:59Z2024-09-26T13:45:59Zby Wyler, Neil R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=225321">Click to View</a><br/>Format: Elektronik Kaynak<br/>Sockets, shellcode, porting & coding reverse engineering exploits and tool coding for security professionalsent://SD_ILS/0/SD_ILS:9307132024-09-26T13:45:59Z2024-09-26T13:45:59Zby Foster, James C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=226568">Click to View</a><br/>Format: Elektronik Kaynak<br/>Intrusion prevention and active response deploying network and host IPSent://SD_ILS/0/SD_ILS:9307142024-09-26T13:45:59Z2024-09-26T13:45:59Zby Henmi, Anne.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=226578">Click to View</a><br/>Format: Elektronik Kaynak<br/>InfoSec career hacking sell your skillz, not your soulent://SD_ILS/0/SD_ILS:9308102024-09-26T13:45:59Z2024-09-26T13:45:59Zby Bayles, Aaron W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227231">Click to View</a><br/>Format: Elektronik Kaynak<br/>Reversing secrets of reverse engineeringent://SD_ILS/0/SD_ILS:9308762024-09-26T13:45:59Z2024-09-26T13:45:59Zby Eilam, Eldad.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227440">Click to View</a><br/>Format: Elektronik Kaynak<br/>User's guide to cryptography and standardsent://SD_ILS/0/SD_ILS:9310172024-09-26T13:45:59Z2024-09-26T13:45:59Zby Dent, Alexander W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227658">Click to View</a><br/>Format: Elektronik Kaynak<br/>Contemporary cryptographyent://SD_ILS/0/SD_ILS:9312872024-09-26T13:45:59Z2024-09-26T13:45:59Zby Oppliger, Rolf.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=231638">Click to View</a><br/>Format: Elektronik Kaynak<br/>Host integrity monitoring using Osiris and Samhainent://SD_ILS/0/SD_ILS:9316062024-09-26T13:45:59Z2024-09-26T13:45:59Zby Wotring, Brian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=233599">Click to View</a><br/>Format: Elektronik Kaynak<br/>Silence on the wire a field guide to passive reconnaissance and indirect attacksent://SD_ILS/0/SD_ILS:9365792024-09-26T13:45:59Z2024-09-26T13:45:59Zby Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273504">Click to View</a><br/>Format: Elektronik Kaynak<br/>Implementing database security and auditingent://SD_ILS/0/SD_ILS:9380792024-09-26T13:45:59Z2024-09-26T13:45:59Zby Ben-Natan, Ron.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=286701">Click to View</a><br/>Format: Elektronik Kaynak<br/>Nessus, Snort, & Ethereal power tools customizing open source security applicationsent://SD_ILS/0/SD_ILS:9338632024-09-26T13:45:59Z2024-09-26T13:45:59Zby Archibald, Neil.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254839">Click to View</a><br/>Format: Elektronik Kaynak<br/>Software piracy exposedent://SD_ILS/0/SD_ILS:9338642024-09-26T13:45:59Z2024-09-26T13:45:59Zby Honick, Ron.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254840">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network security evaluation using the NSA IEMent://SD_ILS/0/SD_ILS:9338662024-09-26T13:45:59Z2024-09-26T13:45:59Zby Fuller, Ed.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254842">Click to View</a><br/>Format: Elektronik Kaynak<br/>Google Hacking for Penetration Testersent://SD_ILS/0/SD_ILS:9394972024-09-26T13:45:59Z2024-09-26T13:45:59Zby Long, Johnny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294147">Click to View</a><br/>Format: Elektronik Kaynak<br/>Dr. Tom Shinder's configuring ISA Server 2004ent://SD_ILS/0/SD_ILS:9394792024-09-26T13:45:59Z2024-09-26T13:45:59Zby Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294094">Click to View</a><br/>Format: Elektronik Kaynak<br/>Risk management for computer security Protecting your network and information assetsent://SD_ILS/0/SD_ILS:9396582024-09-26T13:45:59Z2024-09-26T13:45:59Zby Jones, Andy, 1952-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294671">Click to View</a><br/>Format: Elektronik Kaynak<br/>Basics of contemporary cryptography for IT practitionersent://SD_ILS/0/SD_ILS:9399792024-09-26T13:45:59Z2024-09-26T13:45:59Zby Ryabko, Boris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=296069">Click to View</a><br/>Format: Elektronik Kaynak<br/>zSeries Trusted Key Entry (TKE) version 4.2 updateent://SD_ILS/0/SD_ILS:10753712024-09-26T13:45:59Z2024-09-26T13:45:59Zby Kappeler, Patrick.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306676">Click to View</a><br/>Format: Elektronik Kaynak<br/>iSeries Access for Windows V5R2 hot topics tailored images, application administration, SSL, and Kerberosent://SD_ILS/0/SD_ILS:10753942024-09-26T13:45:59Z2024-09-26T13:45:59Zby Schulz, Jeremy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306699">Click to View</a><br/>Format: Elektronik Kaynak<br/>IBM eserver zSeries 990 (z990) cryptography implementationent://SD_ILS/0/SD_ILS:10754862024-09-26T13:45:59Z2024-09-26T13:45:59Zby Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306791">Click to View</a><br/>Format: Elektronik Kaynak<br/>Linux on IBM e-server zSeries and S/390 best security practicesent://SD_ILS/0/SD_ILS:10755302024-09-26T13:45:59Z2024-09-26T13:45:59Zby Geiselhart, Gregory.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306835">Click to View</a><br/>Format: Elektronik Kaynak<br/>Innocent code a security wake-up call for Web programmersent://SD_ILS/0/SD_ILS:9294742024-09-26T13:45:59Z2024-09-26T13:45:59Zby Huseby, Sverre H.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=210558">Click to View</a><br/>Format: Elektronik Kaynak<br/>Protecting your library's digital sources the essential guide to planning and preservationent://SD_ILS/0/SD_ILS:9300962024-09-26T13:45:59Z2024-09-26T13:45:59Zby Kahn, Miriam (Miriam B.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=218937">Click to View</a><br/>Format: Elektronik Kaynak<br/>Bluetooth securityent://SD_ILS/0/SD_ILS:9310092024-09-26T13:45:59Z2024-09-26T13:45:59Zby Gehrmann, Christian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227650">Click to View</a><br/>Format: Elektronik Kaynak<br/>Defense and detection strategies against Internet wormsent://SD_ILS/0/SD_ILS:9310192024-09-26T13:45:59Z2024-09-26T13:45:59Zby Nazario, Jose.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227660">Click to View</a><br/>Format: Elektronik Kaynak<br/>Privacy protection and computer forensicsent://SD_ILS/0/SD_ILS:9310512024-09-26T13:45:59Z2024-09-26T13:45:59Zby Caloyannides, Michael A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227692">Click to View</a><br/>Format: Elektronik Kaynak<br/>Intelligent watermarking techniquesent://SD_ILS/0/SD_ILS:9312692024-09-26T13:45:59Z2024-09-26T13:45:59Zby Pan, Jeng-Shyang.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=231561">Click to View</a><br/>Format: Elektronik Kaynak<br/>How to cheat at Configuring ISA Server 2004ent://SD_ILS/0/SD_ILS:9338772024-09-26T13:45:59Z2024-09-26T13:45:59Zby Shinder, Dr. Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254853">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network security foundationsent://SD_ILS/0/SD_ILS:9350402024-09-26T13:45:59Z2024-09-26T13:45:59Zby Strebe, Matthew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=267332">Click to View</a><br/>Format: Elektronik Kaynak<br/>Click, click, who's there? a family-based non-technical approach to help parents protect their children onlineent://SD_ILS/0/SD_ILS:9452752024-09-26T13:45:59Z2024-09-26T13:45:59Zby Koh.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338852">Click to View</a><br/>Format: Elektronik Kaynak<br/>Ethereal packet sniffingent://SD_ILS/0/SD_ILS:9394852024-09-26T13:45:59Z2024-09-26T13:45:59Zby Orebaugh, Angela.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294122">Click to View</a><br/>Format: Elektronik Kaynak<br/>WarDriving drive, detect, defend: a guide to wireless securityent://SD_ILS/0/SD_ILS:9396002024-09-26T13:45:59Z2024-09-26T13:45:59Zby Hurley, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294441">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking the code ASP. NET web application securityent://SD_ILS/0/SD_ILS:9395062024-09-26T13:45:59Z2024-09-26T13:45:59Zby Burnett, Mark (Mark M.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294160">Click to View</a><br/>Format: Elektronik Kaynak<br/>MCSE designing security for a Windows Server 2003 network : exam 70-298 study guide & DVD training systement://SD_ILS/0/SD_ILS:9395332024-09-26T13:45:59Z2024-09-26T13:45:59Zby Khnaser, Elias N.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294253">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber adversary characterization auditing the hacker mindent://SD_ILS/0/SD_ILS:9394692024-09-26T13:45:59Z2024-09-26T13:45:59Zby Parker, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294071">Click to View</a><br/>Format: Elektronik Kaynak<br/>Programmer's ultimate security deskrefent://SD_ILS/0/SD_ILS:9395592024-09-26T13:45:59Z2024-09-26T13:45:59Zby Foster, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294328">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security sage's guide to hardening the network infrastructureent://SD_ILS/0/SD_ILS:9395712024-09-26T13:45:59Z2024-09-26T13:45:59Zby Andrés, Steven.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294359">Click to View</a><br/>Format: Elektronik Kaynak<br/>Stealing the network how to own a continentent://SD_ILS/0/SD_ILS:9395802024-09-26T13:45:59Z2024-09-26T13:45:59Zby Rogers, Russ.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294377">Click to View</a><br/>Format: Elektronik Kaynak<br/>zSeries crypto guide updateent://SD_ILS/0/SD_ILS:10754002024-09-26T13:45:59Z2024-09-26T13:45:59Zby Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306705">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information getting, protecting and using data.ent://SD_ILS/0/SD_ILS:10920162024-09-26T13:45:59Z2024-09-26T13:45:59Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411420">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information getting, protecting and using data.ent://SD_ILS/0/SD_ILS:10920322024-09-26T13:45:59Z2024-09-26T13:45:59Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411436">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security secrets, intruders and ID tags.ent://SD_ILS/0/SD_ILS:10920432024-09-26T13:45:59Z2024-09-26T13:45:59Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411447">Click to View</a><br/>Format: Elektronik Kaynak<br/>Techniques and applications of digital watermarking and content protectionent://SD_ILS/0/SD_ILS:9309492024-09-26T13:45:59Z2024-09-26T13:45:59Zby Arnold, Michael (Michael Konrad), 1964-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227587">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security technologies for the World Wide Webent://SD_ILS/0/SD_ILS:9309802024-09-26T13:45:59Z2024-09-26T13:45:59Zby Oppliger, Rolf.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227620">Click to View</a><br/>Format: Elektronik Kaynak<br/>Role-based access controlent://SD_ILS/0/SD_ILS:9309912024-09-26T13:45:59Z2024-09-26T13:45:59Zby Ferraiolo, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227631">Click to View</a><br/>Format: Elektronik Kaynak<br/>Mission-critical network planningent://SD_ILS/0/SD_ILS:9310112024-09-26T13:45:59Z2024-09-26T13:45:59Zby Liotine, Matthew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227652">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking the art of exploitationent://SD_ILS/0/SD_ILS:9365672024-09-26T13:45:59Z2024-09-26T13:45:59Zby Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273488">Click to View</a><br/>Format: Elektronik Kaynak<br/>Configuring Symantec Antivirus, Corporate Editionent://SD_ILS/0/SD_ILS:9394622024-09-26T13:45:59Z2024-09-26T13:45:59Zby Hunter, Laura E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294056">Click to View</a><br/>Format: Elektronik Kaynak<br/>Snort 2.0 intrusion detectionent://SD_ILS/0/SD_ILS:9395752024-09-26T13:45:59Z2024-09-26T13:45:59Zby Beale, Jay.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294371">Click to View</a><br/>Format: Elektronik Kaynak<br/>SSCP study guide and & DVD training systement://SD_ILS/0/SD_ILS:9395782024-09-26T13:45:59Z2024-09-26T13:45:59Zby Jacobs, Josh.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294375">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network security a practical guideent://SD_ILS/0/SD_ILS:9403342024-09-26T13:45:59Z2024-09-26T13:45:59Zby Poole, Owen.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=298471">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity operations handbookent://SD_ILS/0/SD_ILS:9426132024-09-26T13:45:59Z2024-09-26T13:45:59Zby Rittinghouse, John W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=313612">Click to View</a><br/>Format: Elektronik Kaynak<br/>Finding and fixing vulnerabilities in information systems the vulnerability assessment & mitigation methodologyent://SD_ILS/0/SD_ILS:9277922024-09-26T13:45:59Z2024-09-26T13:45:59Zby Antón, Philip S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=197482">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity today and tomorrow pay now or pay laterent://SD_ILS/0/SD_ILS:10825832024-09-26T13:45:59Z2024-09-26T13:45:59Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3375180">Click to View</a><br/>Format: Elektronik Kaynak<br/>Putting the latest z/OS security features to workent://SD_ILS/0/SD_ILS:10753582024-09-26T13:45:59Z2024-09-26T13:45:59Zby Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306663">Click to View</a><br/>Format: Elektronik Kaynak<br/>An introduction to security in a CSM 1.3 for AIX 5L environmentent://SD_ILS/0/SD_ILS:10754072024-09-26T13:45:59Z2024-09-26T13:45:59Zby Lascu, Octavian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306712">Click to View</a><br/>Format: Elektronik Kaynak<br/>Developing secure distributed systems with CORBAent://SD_ILS/0/SD_ILS:9309642024-09-26T13:45:59Z2024-09-26T13:45:59Zby Lang, Ulrich.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227602">Click to View</a><br/>Format: Elektronik Kaynak<br/>Special issue on internet securityent://SD_ILS/0/SD_ILS:9315302024-09-26T13:45:59Z2024-09-26T13:45:59Zby Dhillon, Gurpreet.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=232281">Click to View</a><br/>Format: Elektronik Kaynak<br/>Crackproof your software the best ways to protect your software against crackersent://SD_ILS/0/SD_ILS:9365642024-09-26T13:45:59Z2024-09-26T13:45:59Zby C̆ervĕn, Pavol.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273482">Click to View</a><br/>Format: Elektronik Kaynak<br/>Analysis, design, and implementation of secure and interoperable distributed health information systemsent://SD_ILS/0/SD_ILS:9351012024-09-26T13:45:59Z2024-09-26T13:45:59Zby Blobel, Bernd.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=267473">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hack proofing ColdFusionent://SD_ILS/0/SD_ILS:9394982024-09-26T13:45:59Z2024-09-26T13:45:59Zby Meyer, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294151">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hack proofing XMLent://SD_ILS/0/SD_ILS:9395022024-09-26T13:45:59Z2024-09-26T13:45:59Zby O'Farrell, Neal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294155">Click to View</a><br/>Format: Elektronik Kaynak<br/>Check Point NG next generation security administrationent://SD_ILS/0/SD_ILS:9394472024-09-26T13:45:59Z2024-09-26T13:45:59Zby Simonis, Drew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294029">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hack proofing Linux: a guide to open source security the only way to stop a hacker is to think like oneent://SD_ILS/0/SD_ILS:9394992024-09-26T13:45:59Z2024-09-26T13:45:59Zby Stanger, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294152">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hack proofing Sun Solaris 8ent://SD_ILS/0/SD_ILS:9395002024-09-26T13:45:59Z2024-09-26T13:45:59Zby Vincent, Thomas.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294153">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hack proofing Windows 2000ent://SD_ILS/0/SD_ILS:9395012024-09-26T13:45:59Z2024-09-26T13:45:59Zby Todd, Chad.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294154">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hack proofing your e-commerce site the only way to stop a hacker is to think like oneent://SD_ILS/0/SD_ILS:9395032024-09-26T13:45:59Z2024-09-26T13:45:59Zby Russell, Ryan, 1969-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294156">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hack proofing your Web applications the only way to stop a hacker is to think like oneent://SD_ILS/0/SD_ILS:9395052024-09-26T13:45:59Z2024-09-26T13:45:59Zby Forristal, Jeff.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294159">Click to View</a><br/>Format: Elektronik Kaynak<br/>Configuring ISA server 2000 building firewalls for windows 2000ent://SD_ILS/0/SD_ILS:9394602024-09-26T13:45:59Z2024-09-26T13:45:59Zby Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294054">Click to View</a><br/>Format: Elektronik Kaynak<br/>Summary of discussions at a planning meeting on cyber-security and the insider threat to classified informationent://SD_ILS/0/SD_ILS:10848892024-09-26T13:45:59Z2024-09-26T13:45:59Zby National Research Council (U.S.). Computer Science and Telecommunications Board.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3377658">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security and control in information systems a guide for business and accountingent://SD_ILS/0/SD_ILS:9324512024-09-26T13:45:59Z2024-09-26T13:45:59Zby Hawker, Andrew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=240531">Click to View</a><br/>Format: Elektronik Kaynak<br/>Technology and privacy the new landscapeent://SD_ILS/0/SD_ILS:10811092024-09-26T13:45:59Z2024-09-26T13:45:59Zby Agre, Philip.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3338469">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computers at risk safe computing in the information ageent://SD_ILS/0/SD_ILS:10838592024-09-26T13:45:59Z2024-09-26T13:45:59Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3376465">Click to View</a><br/>Format: Elektronik Kaynak<br/>