Arama Sonu&ccedil;lar&#305; - Daralt&#305;lm&#305;&#351;: English - Ba&#351;kent K&uuml;t&uuml;phanesi - 2003 - Computer security. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dLIBRARY$002509K$0025C3$0025BCt$0025C3$0025BCphane$0025091$00253ABASKENT$002509Ba$0025C5$00259Fkent$002bK$0025C3$0025BCt$0025C3$0025BCphanesi$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092003$0025092003$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300? 2024-06-23T14:21:52Z Finding and fixing vulnerabilities in information systems the vulnerability assessment &amp; mitigation methodology ent://SD_ILS/0/SD_ILS:927792 2024-06-23T14:21:52Z 2024-06-23T14:21:52Z by&#160;Ant&oacute;n, Philip S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=197482">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Configuring Symantec Antivirus, Corporate Edition ent://SD_ILS/0/SD_ILS:939462 2024-06-23T14:21:52Z 2024-06-23T14:21:52Z by&#160;Hunter, Laura E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294056">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Snort 2.0 intrusion detection ent://SD_ILS/0/SD_ILS:939575 2024-06-23T14:21:52Z 2024-06-23T14:21:52Z by&#160;Beale, Jay.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294371">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> SSCP study guide and &amp; DVD training system ent://SD_ILS/0/SD_ILS:939578 2024-06-23T14:21:52Z 2024-06-23T14:21:52Z by&#160;Jacobs, Josh.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294375">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security a practical guide ent://SD_ILS/0/SD_ILS:940334 2024-06-23T14:21:52Z 2024-06-23T14:21:52Z by&#160;Poole, Owen.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=298471">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity operations handbook ent://SD_ILS/0/SD_ILS:942613 2024-06-23T14:21:52Z 2024-06-23T14:21:52Z by&#160;Rittinghouse, John W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=313612">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Role-based access control ent://SD_ILS/0/SD_ILS:930991 2024-06-23T14:21:52Z 2024-06-23T14:21:52Z by&#160;Ferraiolo, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227631">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Mission-critical network planning ent://SD_ILS/0/SD_ILS:931011 2024-06-23T14:21:52Z 2024-06-23T14:21:52Z by&#160;Liotine, Matthew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227652">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Techniques and applications of digital watermarking and content protection ent://SD_ILS/0/SD_ILS:930949 2024-06-23T14:21:52Z 2024-06-23T14:21:52Z by&#160;Arnold, Michael (Michael Konrad), 1964-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227587">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security technologies for the World Wide Web ent://SD_ILS/0/SD_ILS:930980 2024-06-23T14:21:52Z 2024-06-23T14:21:52Z by&#160;Oppliger, Rolf.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227620">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking the art of exploitation ent://SD_ILS/0/SD_ILS:936567 2024-06-23T14:21:52Z 2024-06-23T14:21:52Z by&#160;Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273488">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> zSeries crypto guide update ent://SD_ILS/0/SD_ILS:1075400 2024-06-23T14:21:52Z 2024-06-23T14:21:52Z by&#160;Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306705">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information getting, protecting and using data. ent://SD_ILS/0/SD_ILS:1092016 2024-06-23T14:21:52Z 2024-06-23T14:21:52Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411420">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information getting, protecting and using data. ent://SD_ILS/0/SD_ILS:1092032 2024-06-23T14:21:52Z 2024-06-23T14:21:52Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411436">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security secrets, intruders and ID tags. ent://SD_ILS/0/SD_ILS:1092043 2024-06-23T14:21:52Z 2024-06-23T14:21:52Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411447">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Internet security : a jumpstart for systems administrators and IT managers ent://SD_ILS/0/SD_ILS:1188090 2024-06-23T14:21:52Z 2024-06-23T14:21:52Z by&#160;Speed, Tim.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582982">http://www.sciencedirect.com/science/book/9781555582982</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity operations handbook ent://SD_ILS/0/SD_ILS:1188095 2024-06-23T14:21:52Z 2024-06-23T14:21:52Z by&#160;Rittinghouse, John W.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583064">https://www.sciencedirect.com/science/book/9781555583064</a><br/>Format:&#160;Elektronik Kaynak<br/> Snort 2.0 intrusion detection ent://SD_ILS/0/SD_ILS:1188387 2024-06-23T14:21:52Z 2024-06-23T14:21:52Z by&#160;Beale, Jay.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836746">http://www.sciencedirect.com/science/book/9781931836746</a><br/>Format:&#160;Elektronik Kaynak<br/> Configuring Symantec Antivirus, Corporate Edition ent://SD_ILS/0/SD_ILS:1188389 2024-06-23T14:21:52Z 2024-06-23T14:21:52Z by&#160;Hunter, Laura E.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836814">http://www.sciencedirect.com/science/book/9781931836814</a><br/>Format:&#160;Elektronik Kaynak<br/> Stealing the network : how to own the box ent://SD_ILS/0/SD_ILS:1188391 2024-06-23T14:21:52Z 2024-06-23T14:21:52Z by&#160;Russell, Ryan, 1969-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836876">https://www.sciencedirect.com/science/book/9781931836876</a><br/>Format:&#160;Elektronik Kaynak<br/> Cisco security professional's guide to secure intrusion detection systems ent://SD_ILS/0/SD_ILS:1188408 2024-06-23T14:21:52Z 2024-06-23T14:21:52Z by&#160;Burton, James.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266696">http://www.sciencedirect.com/science/book/9781932266696</a><br/>Format:&#160;Elektronik Kaynak<br/>