Arama Sonuçları - Daraltılmış: E-Kitap - 2017 - Computer networks -- Security measures.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dITYPE$002509Materyal$002bT$0025C3$0025BCr$0025C3$0025BC$0025091$00253AEKITAP$002509E-Kitap$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092017$0025092017$0026qf$003dSUBJECT$002509Konu$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300?2024-06-20T19:05:49ZInformation security handbook : develop a threat model and incident response strategy to build a strong information security frameworkent://SD_ILS/0/SD_ILS:11333812024-06-20T19:05:49Z2024-06-20T19:05:49Zby Death, Darren, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5183382">Click to View</a><br/>Format: Elektronik Kaynak<br/>Kali linux wireless penetration testing cookbook : identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless securityent://SD_ILS/0/SD_ILS:11334342024-06-20T19:05:49Z2024-06-20T19:05:49Zby Oriyano, Sean-Philip, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5188228">Click to View</a><br/>Format: Elektronik Kaynak<br/>Digital forensics with Kali Linux : perform data acquisition, digital investigation, and threat analysis using Kali Linux toolsent://SD_ILS/0/SD_ILS:11336512024-06-20T19:05:49Z2024-06-20T19:05:49Zby Parasram, Shiva V. N., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5207202">Click to View</a><br/>Format: Elektronik Kaynak<br/>ISO 37001 : an introduction to anti-bribery management systems : doing the right thingsent://SD_ILS/0/SD_ILS:11337112024-06-20T19:05:49Z2024-06-20T19:05:49Zby Field, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5211339">Click to View</a><br/>Format: Elektronik Kaynak<br/>Enterprise cloud security and governance : efficiently set data protection and privacy principlesent://SD_ILS/0/SD_ILS:11338402024-06-20T19:05:49Z2024-06-20T19:05:49Zby Vora, Zeal, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5216128">Click to View</a><br/>Format: Elektronik Kaynak<br/>IoT security issuesent://SD_ILS/0/SD_ILS:11235192024-06-20T19:05:49Z2024-06-20T19:05:49Zby Gilchrist, Alasdair, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4810138">Click to View</a><br/>Format: Elektronik Kaynak<br/>Advanced penetration testing : hacking the world's most secure networksent://SD_ILS/0/SD_ILS:11237222024-06-20T19:05:49Z2024-06-20T19:05:49Zby Allsopp, Wil, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4813145">Click to View</a><br/>Format: Elektronik Kaynak<br/>IT-Sicherheitsanalysen : Ein prozessorientiertes Vorgehensmodellent://SD_ILS/0/SD_ILS:11247972024-06-20T19:05:49Z2024-06-20T19:05:49Zby Simić, Daniela, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4830572">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security in network functions virtualizationent://SD_ILS/0/SD_ILS:11319052024-06-20T19:05:49Z2024-06-20T19:05:49Zby Zhang, Zonghua, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5152998">Click to View</a><br/>Format: Elektronik Kaynak<br/>Safety of web applications : risks, encryption and handling vulnerabilities with PHPent://SD_ILS/0/SD_ILS:11253102024-06-20T19:05:49Z2024-06-20T19:05:49Zby Quinton, Eric, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4840953">Click to View</a><br/>Format: Elektronik Kaynak<br/>Kali Linux intrusion and exploitation cookbook : over 70 recipes for system administrator or DevOps to master Kali Linux 2 and perform effective security assessmentent://SD_ILS/0/SD_ILS:11255492024-06-20T19:05:49Z2024-06-20T19:05:49Zby Shah, Dhruv, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4845574">Click to View</a><br/>Format: Elektronik Kaynak<br/>Applied network security : master the art of detecting and averting advanced network security attacks and techniquesent://SD_ILS/0/SD_ILS:11258302024-06-20T19:05:49Z2024-06-20T19:05:49Zby Salmon, Arthur, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4853051">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:11262122024-06-20T19:05:49Z2024-06-20T19:05:49Zby Vacca, John R., editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4858374">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybercrime and business : strategies for global corporate securityent://SD_ILS/0/SD_ILS:11265202024-06-20T19:05:49Z2024-06-20T19:05:49Zby Moskowitz, Sanford, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4863624">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security operations center guidebook : a practical guide for a successful SOCent://SD_ILS/0/SD_ILS:11264572024-06-20T19:05:49Z2024-06-20T19:05:49Zby Jarpey, Gregory , author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4862661">Click to View</a><br/>Format: Elektronik Kaynak<br/>Mastering Kali Linux for web penetration testing : test and evaluate all aspects of the design and implentationent://SD_ILS/0/SD_ILS:11277352024-06-20T19:05:49Z2024-06-20T19:05:49Zby McPhee, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4891263">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network forensicsent://SD_ILS/0/SD_ILS:11282472024-06-20T19:05:49Z2024-06-20T19:05:49Zby Messier, Ric, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4917496">Click to View</a><br/>Format: Elektronik Kaynak<br/>Windows forensics cookbook : 61 recipes to help you analyze windows systemsent://SD_ILS/0/SD_ILS:11286402024-06-20T19:05:49Z2024-06-20T19:05:49Zby Skulkin, Oleg, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4940232">Click to View</a><br/>Format: Elektronik Kaynak<br/>Mobile security and privacy : advances, challenges and future research directionsent://SD_ILS/0/SD_ILS:11182072024-06-20T19:05:49Z2024-06-20T19:05:49Zby Au, Man-Ho, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4689767">Click to View</a><br/>Format: Elektronik Kaynak<br/>Wireless communications security : solutions for the internet of thingsent://SD_ILS/0/SD_ILS:11182192024-06-20T19:05:49Z2024-06-20T19:05:49Zby Penttinen, Jyrki T. J., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4690021">Click to View</a><br/>Format: Elektronik Kaynak<br/>Advanced persistent threat : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategiesent://SD_ILS/0/SD_ILS:11200822024-06-20T19:05:49Z2024-06-20T19:05:49Zby Winkler, Ira, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4730826">Click to View</a><br/>Format: Elektronik Kaynak<br/>Loseless information : hiding in imagesent://SD_ILS/0/SD_ILS:11206462024-06-20T19:05:49Z2024-06-20T19:05:49Zby Lu, Zhe-Ming, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4743573">Click to View</a><br/>Format: Elektronik Kaynak<br/>