Arama Sonu&ccedil;lar&#305; - Daralt&#305;lm&#305;&#351;: English - Ebook Central - 2013 - Computer security. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dLOCATION$002509Lokasyon$0025091$00253AEBOOKCENT$002509Ebook$002bCentral$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092013$0025092013$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300? 2024-06-20T04:23:17Z Investigative computer forensics the practical guide for lawyers, accountants, investigators, and business executives ent://SD_ILS/0/SD_ILS:986492 2024-06-20T04:23:17Z 2024-06-20T04:23:17Z by&#160;Laykin, Erik.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=817953">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Technocrime, policing and surveillance ent://SD_ILS/0/SD_ILS:1000567 2024-06-20T04:23:17Z 2024-06-20T04:23:17Z by&#160;Leman-Langlois, St&eacute;phane, 1965-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1016143">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Biohackers the politics of open science ent://SD_ILS/0/SD_ILS:1088207 2024-06-20T04:23:17Z 2024-06-20T04:23:17Z by&#160;Delfanti, Alessandro.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3386719">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Convergence : illicit networks and national security in the age of globalization ent://SD_ILS/0/SD_ILS:1102033 2024-06-20T04:23:17Z 2024-06-20T04:23:17Z by&#160;Miklaucic, Michael, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3571653">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Getting started with FortiGate ent://SD_ILS/0/SD_ILS:1023474 2024-06-20T04:23:17Z 2024-06-20T04:23:17Z by&#160;Fabbri, Rosato.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572901">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Instant Java password and authentication security ent://SD_ILS/0/SD_ILS:1023486 2024-06-20T04:23:17Z 2024-06-20T04:23:17Z by&#160;Mayoral, Fernando.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572913">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> OAuth 2.0 identity and access management patterns ent://SD_ILS/0/SD_ILS:1023480 2024-06-20T04:23:17Z 2024-06-20T04:23:17Z by&#160;Spasovski, Martin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572907">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Data visualization. Part 2 ent://SD_ILS/0/SD_ILS:1024206 2024-06-20T04:23:17Z 2024-06-20T04:23:17Z by&#160;Assam, Tarek.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1579356">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Safety management for software-based equipment ent://SD_ILS/0/SD_ILS:1013439 2024-06-20T04:23:17Z 2024-06-20T04:23:17Z by&#160;Boulanger, Jean-Louis.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1187169">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Using social media for global security ent://SD_ILS/0/SD_ILS:1007845 2024-06-20T04:23:17Z 2024-06-20T04:23:17Z by&#160;Gupta, Ravi.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1118756">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Citrix Access Gateway VPX 5.04 essentials a practical step-by-step guide to provide secure remote access using the Citrix Access Gateway VPX ent://SD_ILS/0/SD_ILS:1008015 2024-06-20T04:23:17Z 2024-06-20T04:23:17Z by&#160;Mallett, Andrew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1119760">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Intelligent systems for security informatics ent://SD_ILS/0/SD_ILS:1009493 2024-06-20T04:23:17Z 2024-06-20T04:23:17Z by&#160;Yang, Christopher.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1133729">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber security for educational leaders a guide to understanding and implementing technology policies ent://SD_ILS/0/SD_ILS:1010656 2024-06-20T04:23:17Z 2024-06-20T04:23:17Z by&#160;Sianjina, Rayton R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1143733">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Pragmatic security metrics applying metametrics to information security ent://SD_ILS/0/SD_ILS:1010972 2024-06-20T04:23:17Z 2024-06-20T04:23:17Z by&#160;Brotby, W. Krag.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1153198">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security risk assessment toolkit practical assessments through data collection and data analysis ent://SD_ILS/0/SD_ILS:1002837 2024-06-20T04:23:17Z 2024-06-20T04:23:17Z by&#160;Talabis, Mark Ryan N.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1047930">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network intrusion analysis methodologies, tools, and techniques for incident analysis and response ent://SD_ILS/0/SD_ILS:1003376 2024-06-20T04:23:17Z 2024-06-20T04:23:17Z by&#160;Fichera, Joe, 1966-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1058152">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Data hiding exposing concealed data in multimedia, operating systems, mobile devices, and network protocols ent://SD_ILS/0/SD_ILS:1003916 2024-06-20T04:23:17Z 2024-06-20T04:23:17Z by&#160;Raggo, Michael T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073014">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineers ent://SD_ILS/0/SD_ILS:1003922 2024-06-20T04:23:17Z 2024-06-20T04:23:17Z by&#160;O'Connor, T. J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073021">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Logging and log management the authoritative guide to understanding the concepts surrounding logging and log management ent://SD_ILS/0/SD_ILS:1004458 2024-06-20T04:23:17Z 2024-06-20T04:23:17Z by&#160;Chuvakin, Anton A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1077419">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Enterprise security a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise ent://SD_ILS/0/SD_ILS:1005995 2024-06-20T04:23:17Z 2024-06-20T04:23:17Z by&#160;Woody, Aaron.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1103988">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Group policy fundamentals, security, and the managed desktop ent://SD_ILS/0/SD_ILS:1006089 2024-06-20T04:23:17Z 2024-06-20T04:23:17Z by&#160;Moskowitz, Jeremy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1104500">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking for dummies ent://SD_ILS/0/SD_ILS:1006251 2024-06-20T04:23:17Z 2024-06-20T04:23:17Z by&#160;Beaver, Kevin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1106542">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Web application defender's cookbook battling hackers and protecting users ent://SD_ILS/0/SD_ILS:1006627 2024-06-20T04:23:17Z 2024-06-20T04:23:17Z by&#160;Barnett, Ryan C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108733">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The complete guide to physical security ent://SD_ILS/0/SD_ILS:1007002 2024-06-20T04:23:17Z 2024-06-20T04:23:17Z by&#160;Baker, Paul R., 1958-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1112600">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows server 2012 security from end to edge and beyond architecting, designing, planning, and deploying Windows server 2012 security solutions ent://SD_ILS/0/SD_ILS:1007612 2024-06-20T04:23:17Z 2024-06-20T04:23:17Z by&#160;Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115164">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Practical anonymity hiding in plain sight online ent://SD_ILS/0/SD_ILS:1007614 2024-06-20T04:23:17Z 2024-06-20T04:23:17Z by&#160;Loshin, Peter.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115167">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Social media security : leveraging social networking while mitigating risk ent://SD_ILS/0/SD_ILS:1007617 2024-06-20T04:23:17Z 2024-06-20T04:23:17Z by&#160;Cross, Michael, 1965-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115173">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Simple steps to data encryption a practical guide to secure computing ent://SD_ILS/0/SD_ILS:1007623 2024-06-20T04:23:17Z 2024-06-20T04:23:17Z by&#160;Loshin, Pete.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115182">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Linux malware incident response : a practitioner's guide to forensic collection and examination of volatile data : an excerpt from Malware forensics field guide for Linux systems ent://SD_ILS/0/SD_ILS:1007625 2024-06-20T04:23:17Z 2024-06-20T04:23:17Z by&#160;Malin, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115185">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IBM mainframe security beyond the basics : a practical guide from a z/OS and RACF perspective ent://SD_ILS/0/SD_ILS:1019878 2024-06-20T04:23:17Z 2024-06-20T04:23:17Z by&#160;Dattani, Dinesh D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1411689">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information protection playbook ent://SD_ILS/0/SD_ILS:1019990 2024-06-20T04:23:17Z 2024-06-20T04:23:17Z by&#160;Kane, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1418381">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyberspace and cybersecurity ent://SD_ILS/0/SD_ILS:1020695 2024-06-20T04:23:17Z 2024-06-20T04:23:17Z by&#160;Kostopoulos, George K., 1939- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1446799">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> An introduction to information security and ISO27001:2013 : a pocket guide ent://SD_ILS/0/SD_ILS:1020992 2024-06-20T04:23:17Z 2024-06-20T04:23:17Z by&#160;Watkins, Steve G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1463578">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> ISO27001 / ISO27002 : a pocket guide ent://SD_ILS/0/SD_ILS:1020993 2024-06-20T04:23:17Z 2024-06-20T04:23:17Z by&#160;Calder, Alan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1463579">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/>