Arama Sonu&ccedil;lar&#305; - Daralt&#305;lm&#305;&#351;: E-Kitap - 2017 - Computer networks -- Security measures. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dITYPE$002509Materyal$002bT$0025C3$0025BCr$0025C3$0025BC$0025091$00253AEKITAP$002509E-Kitap$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092017$0025092017$0026qf$003dSUBJECT$002509Konu$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300? 2024-06-20T19:05:49Z Information security handbook : develop a threat model and incident response strategy to build a strong information security framework ent://SD_ILS/0/SD_ILS:1133381 2024-06-20T19:05:49Z 2024-06-20T19:05:49Z by&#160;Death, Darren, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5183382">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Kali linux wireless penetration testing cookbook : identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security ent://SD_ILS/0/SD_ILS:1133434 2024-06-20T19:05:49Z 2024-06-20T19:05:49Z by&#160;Oriyano, Sean-Philip, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5188228">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Digital forensics with Kali Linux : perform data acquisition, digital investigation, and threat analysis using Kali Linux tools ent://SD_ILS/0/SD_ILS:1133651 2024-06-20T19:05:49Z 2024-06-20T19:05:49Z by&#160;Parasram, Shiva V. N., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5207202">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> ISO 37001 : an introduction to anti-bribery management systems : doing the right things ent://SD_ILS/0/SD_ILS:1133711 2024-06-20T19:05:49Z 2024-06-20T19:05:49Z by&#160;Field, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5211339">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Enterprise cloud security and governance : efficiently set data protection and privacy principles ent://SD_ILS/0/SD_ILS:1133840 2024-06-20T19:05:49Z 2024-06-20T19:05:49Z by&#160;Vora, Zeal, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5216128">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IoT security issues ent://SD_ILS/0/SD_ILS:1123519 2024-06-20T19:05:49Z 2024-06-20T19:05:49Z by&#160;Gilchrist, Alasdair, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4810138">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Advanced penetration testing : hacking the world's most secure networks ent://SD_ILS/0/SD_ILS:1123722 2024-06-20T19:05:49Z 2024-06-20T19:05:49Z by&#160;Allsopp, Wil, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4813145">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IT-Sicherheitsanalysen : Ein prozessorientiertes Vorgehensmodell ent://SD_ILS/0/SD_ILS:1124797 2024-06-20T19:05:49Z 2024-06-20T19:05:49Z by&#160;Simi&#263;, Daniela, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4830572">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security in network functions virtualization ent://SD_ILS/0/SD_ILS:1131905 2024-06-20T19:05:49Z 2024-06-20T19:05:49Z by&#160;Zhang, Zonghua, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5152998">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Safety of web applications : risks, encryption and handling vulnerabilities with PHP ent://SD_ILS/0/SD_ILS:1125310 2024-06-20T19:05:49Z 2024-06-20T19:05:49Z by&#160;Quinton, Eric, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4840953">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Kali Linux intrusion and exploitation cookbook : over 70 recipes for system administrator or DevOps to master Kali Linux 2 and perform effective security assessment ent://SD_ILS/0/SD_ILS:1125549 2024-06-20T19:05:49Z 2024-06-20T19:05:49Z by&#160;Shah, Dhruv, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4845574">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Applied network security : master the art of detecting and averting advanced network security attacks and techniques ent://SD_ILS/0/SD_ILS:1125830 2024-06-20T19:05:49Z 2024-06-20T19:05:49Z by&#160;Salmon, Arthur, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4853051">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:1126212 2024-06-20T19:05:49Z 2024-06-20T19:05:49Z by&#160;Vacca, John R., editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4858374">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybercrime and business : strategies for global corporate security ent://SD_ILS/0/SD_ILS:1126520 2024-06-20T19:05:49Z 2024-06-20T19:05:49Z by&#160;Moskowitz, Sanford, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4863624">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security operations center guidebook : a practical guide for a successful SOC ent://SD_ILS/0/SD_ILS:1126457 2024-06-20T19:05:49Z 2024-06-20T19:05:49Z by&#160;Jarpey, Gregory , author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4862661">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Mastering Kali Linux for web penetration testing : test and evaluate all aspects of the design and implentation ent://SD_ILS/0/SD_ILS:1127735 2024-06-20T19:05:49Z 2024-06-20T19:05:49Z by&#160;McPhee, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4891263">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network forensics ent://SD_ILS/0/SD_ILS:1128247 2024-06-20T19:05:49Z 2024-06-20T19:05:49Z by&#160;Messier, Ric, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4917496">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows forensics cookbook : 61 recipes to help you analyze windows systems ent://SD_ILS/0/SD_ILS:1128640 2024-06-20T19:05:49Z 2024-06-20T19:05:49Z by&#160;Skulkin, Oleg, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4940232">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Mobile security and privacy : advances, challenges and future research directions ent://SD_ILS/0/SD_ILS:1118207 2024-06-20T19:05:49Z 2024-06-20T19:05:49Z by&#160;Au, Man-Ho, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4689767">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Wireless communications security : solutions for the internet of things ent://SD_ILS/0/SD_ILS:1118219 2024-06-20T19:05:49Z 2024-06-20T19:05:49Z by&#160;Penttinen, Jyrki T. J., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4690021">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Advanced persistent threat : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies ent://SD_ILS/0/SD_ILS:1120082 2024-06-20T19:05:49Z 2024-06-20T19:05:49Z by&#160;Winkler, Ira, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4730826">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Loseless information : hiding in images ent://SD_ILS/0/SD_ILS:1120646 2024-06-20T19:05:49Z 2024-06-20T19:05:49Z by&#160;Lu, Zhe-Ming, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4743573">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/>