Arama Sonuçları - Daraltılmış: English - 2005 - Computer security.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLANGUAGE$002509Dil$002509ENG$002509English$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092005$0025092005$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?dt=list2024-09-24T23:51:13ZMultilevel security and DB2 row-level security revealedent://SD_ILS/0/SD_ILS:10751592024-09-24T23:51:13Z2024-09-24T23:51:13Zby Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306464">Click to View</a><br/>Format: Elektronik Kaynak<br/>Federated identity management and web services security with IBM tivoli security solutionsent://SD_ILS/0/SD_ILS:10752162024-09-24T23:51:13Z2024-09-24T23:51:13Zby Bücker, Axel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306521">Click to View</a><br/>Format: Elektronik Kaynak<br/>IBM rational application developer V6 portlet application development and portal toolsent://SD_ILS/0/SD_ILS:10752422024-09-24T23:51:13Z2024-09-24T23:51:13Zby Rodriguez, Juan R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306547">Click to View</a><br/>Format: Elektronik Kaynak<br/>Buffer overflow attacks detect, exploit, preventent://SD_ILS/0/SD_ILS:9302072024-09-24T23:51:13Z2024-09-24T23:51:13Zby Foster, James C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=222803">Click to View</a><br/>Format: Elektronik Kaynak<br/>Black hat physical device security exploiting hardware and softwareent://SD_ILS/0/SD_ILS:9302092024-09-24T23:51:13Z2024-09-24T23:51:13Zby Miller, Drew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=222851">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber spying tracking your family's (sometimes) secret online livesent://SD_ILS/0/SD_ILS:9302102024-09-24T23:51:13Z2024-09-24T23:51:13Zby Fair, Ted.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=222853">Click to View</a><br/>Format: Elektronik Kaynak<br/>Aggressive network self-defenseent://SD_ILS/0/SD_ILS:9306562024-09-24T23:51:13Z2024-09-24T23:51:13Zby Wyler, Neil R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=225321">Click to View</a><br/>Format: Elektronik Kaynak<br/>Sockets, shellcode, porting & coding reverse engineering exploits and tool coding for security professionalsent://SD_ILS/0/SD_ILS:9307132024-09-24T23:51:13Z2024-09-24T23:51:13Zby Foster, James C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=226568">Click to View</a><br/>Format: Elektronik Kaynak<br/>Intrusion prevention and active response deploying network and host IPSent://SD_ILS/0/SD_ILS:9307142024-09-24T23:51:13Z2024-09-24T23:51:13Zby Henmi, Anne.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=226578">Click to View</a><br/>Format: Elektronik Kaynak<br/>InfoSec career hacking sell your skillz, not your soulent://SD_ILS/0/SD_ILS:9308102024-09-24T23:51:13Z2024-09-24T23:51:13Zby Bayles, Aaron W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227231">Click to View</a><br/>Format: Elektronik Kaynak<br/>Reversing secrets of reverse engineeringent://SD_ILS/0/SD_ILS:9308762024-09-24T23:51:13Z2024-09-24T23:51:13Zby Eilam, Eldad.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227440">Click to View</a><br/>Format: Elektronik Kaynak<br/>User's guide to cryptography and standardsent://SD_ILS/0/SD_ILS:9310172024-09-24T23:51:13Z2024-09-24T23:51:13Zby Dent, Alexander W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227658">Click to View</a><br/>Format: Elektronik Kaynak<br/>Contemporary cryptographyent://SD_ILS/0/SD_ILS:9312872024-09-24T23:51:13Z2024-09-24T23:51:13Zby Oppliger, Rolf.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=231638">Click to View</a><br/>Format: Elektronik Kaynak<br/>Host integrity monitoring using Osiris and Samhainent://SD_ILS/0/SD_ILS:9316062024-09-24T23:51:13Z2024-09-24T23:51:13Zby Wotring, Brian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=233599">Click to View</a><br/>Format: Elektronik Kaynak<br/>Silence on the wire a field guide to passive reconnaissance and indirect attacksent://SD_ILS/0/SD_ILS:9365792024-09-24T23:51:13Z2024-09-24T23:51:13Zby Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273504">Click to View</a><br/>Format: Elektronik Kaynak<br/>Implementing database security and auditingent://SD_ILS/0/SD_ILS:9380792024-09-24T23:51:13Z2024-09-24T23:51:13Zby Ben-Natan, Ron.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=286701">Click to View</a><br/>Format: Elektronik Kaynak<br/>Nessus, Snort, & Ethereal power tools customizing open source security applicationsent://SD_ILS/0/SD_ILS:9338632024-09-24T23:51:13Z2024-09-24T23:51:13Zby Archibald, Neil.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254839">Click to View</a><br/>Format: Elektronik Kaynak<br/>Software piracy exposedent://SD_ILS/0/SD_ILS:9338642024-09-24T23:51:13Z2024-09-24T23:51:13Zby Honick, Ron.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254840">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network security evaluation using the NSA IEMent://SD_ILS/0/SD_ILS:9338662024-09-24T23:51:13Z2024-09-24T23:51:13Zby Fuller, Ed.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254842">Click to View</a><br/>Format: Elektronik Kaynak<br/>Google Hacking for Penetration Testersent://SD_ILS/0/SD_ILS:9394972024-09-24T23:51:13Z2024-09-24T23:51:13Zby Long, Johnny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294147">Click to View</a><br/>Format: Elektronik Kaynak<br/>Dr. Tom Shinder's configuring ISA Server 2004ent://SD_ILS/0/SD_ILS:9394792024-09-24T23:51:13Z2024-09-24T23:51:13Zby Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294094">Click to View</a><br/>Format: Elektronik Kaynak<br/>Risk management for computer security Protecting your network and information assetsent://SD_ILS/0/SD_ILS:9396582024-09-24T23:51:13Z2024-09-24T23:51:13Zby Jones, Andy, 1952-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294671">Click to View</a><br/>Format: Elektronik Kaynak<br/>Basics of contemporary cryptography for IT practitionersent://SD_ILS/0/SD_ILS:9399792024-09-24T23:51:13Z2024-09-24T23:51:13Zby Ryabko, Boris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=296069">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking a terror network : the silent threat of covert channelsent://SD_ILS/0/SD_ILS:11883632024-09-24T23:51:13Z2024-09-24T23:51:13Zby Rogers, Russ.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994985">https://www.sciencedirect.com/science/book/9781928994985</a><br/>Format: Elektronik Kaynak<br/>Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionalsent://SD_ILS/0/SD_ILS:11882422024-09-24T23:51:13Z2024-09-24T23:51:13Zby Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490054">http://www.sciencedirect.com/science/book/9781597490054</a><br/>Format: Elektronik Kaynak<br/>Stealing the network : how to own an identityent://SD_ILS/0/SD_ILS:11882432024-09-24T23:51:13Z2024-09-24T23:51:13Zby Alder, Raven.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490061">https://www.sciencedirect.com/science/book/9781597490061</a><br/>Format: Elektronik Kaynak<br/>InfoSec career hacking : sell your skillz, not your soulent://SD_ILS/0/SD_ILS:11882442024-09-24T23:51:13Z2024-09-24T23:51:13Zby Bayles, Aaron W.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490115">https://www.sciencedirect.com/science/book/9781597490115</a><br/>Format: Elektronik Kaynak<br/>Host integrity monitoring : using Osiris and Samhainent://SD_ILS/0/SD_ILS:11882452024-09-24T23:51:13Z2024-09-24T23:51:13Zby Wotring, Brian.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490184">http://www.sciencedirect.com/science/book/9781597490184</a><br/>Format: Elektronik Kaynak<br/>Cyber spying : tracking your family's (sometimes) secret online livesent://SD_ILS/0/SD_ILS:11883792024-09-24T23:51:13Z2024-09-24T23:51:13Zby Fair, Ted.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836418">https://www.sciencedirect.com/science/book/9781931836418</a><br/>Format: Elektronik Kaynak<br/>Aggressive network self-defenseent://SD_ILS/0/SD_ILS:11884902024-09-24T23:51:13Z2024-09-24T23:51:13Zby Wyler, Neil R.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">http://www.sciencedirect.com/science/book/9781931836203</a><br/>Format: Elektronik Kaynak<br/>Intrusion prevention and active response : deploying network and host IPSent://SD_ILS/0/SD_ILS:11884002024-09-24T23:51:13Z2024-09-24T23:51:13Zby Rash, Michael.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266474">http://www.sciencedirect.com/science/book/9781932266474</a><br/>Format: Elektronik Kaynak<br/>Buffer overflow attacks : detect, exploit, preventent://SD_ILS/0/SD_ILS:11884072024-09-24T23:51:13Z2024-09-24T23:51:13Zby Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266672">http://www.sciencedirect.com/science/book/9781932266672</a><br/>Format: Elektronik Kaynak<br/>Black Hat physical device security : exploiting hardware and softwareent://SD_ILS/0/SD_ILS:11884102024-09-24T23:51:13Z2024-09-24T23:51:13Zby Miller, Drew, 1978-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266818">http://www.sciencedirect.com/science/book/9781932266818</a><br/>Format: Elektronik Kaynak<br/>Software piracy exposedent://SD_ILS/0/SD_ILS:11884172024-09-24T23:51:13Z2024-09-24T23:51:13Zby Craig, Paul.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781932266986">https://www.sciencedirect.com/science/book/9781932266986</a><br/>Format: Elektronik Kaynak<br/>Implementing database security and auditing : a guide for DBAs, information security administrators and auditorsent://SD_ILS/0/SD_ILS:11881152024-09-24T23:51:13Z2024-09-24T23:51:13Zby Ben-Natan, Ron.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">http://www.sciencedirect.com/science/book/9781555583347</a><br/>Format: Elektronik Kaynak<br/>IM, instant messaging, securityent://SD_ILS/0/SD_ILS:11856392024-09-24T23:51:13Z2024-09-24T23:51:13Zby Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583385">http://www.sciencedirect.com/science/book/9781555583385</a><br/>Format: Elektronik Kaynak<br/>