Arama Sonu&ccedil;lar&#305; - Daralt&#305;lm&#305;&#351;: English - Ebook Central - Computer networks -- Security measures. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dLOCATION$002509Lokasyon$0025091$00253AEBOOKCENT$002509Ebook$002bCentral$0026qf$003dSUBJECT$002509Konu$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300? 2024-05-24T15:02:49Z Cyber and you : the impact of technology on our lives ent://SD_ILS/0/SD_ILS:1147155 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Kendal, Maureen, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5811334">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The business of cybersecurity : foundations and ideologies ent://SD_ILS/0/SD_ILS:1146381 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Sathnur, Ashwini, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5770273">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Smart cities cybersecurity and privacy ent://SD_ILS/0/SD_ILS:1143849 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Kayhan Zrar Ghafoor, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5609779">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber smart : five habits to protect your family, money, and identity from cyber criminals ent://SD_ILS/0/SD_ILS:1143906 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;McDonough, Bart, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5612908">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies ent://SD_ILS/0/SD_ILS:1145686 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Le, Dac-Nhuong, 1983- editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5741215">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors ent://SD_ILS/0/SD_ILS:1146214 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Carpenter, Perry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5763515">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Understanding security issues ent://SD_ILS/0/SD_ILS:1132529 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Donaldson, Scott E., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5157542">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Fuzzing for software security testing and quality assurance ent://SD_ILS/0/SD_ILS:1139237 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Takanen, Ari, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5430720">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Learn ethical hacking from scratch : your stepping stone to penetration testing ent://SD_ILS/0/SD_ILS:1141111 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Sabih, Zaid, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5485020">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Practical industrial internet of things security : a practitioner's guide to securing connected industries ent://SD_ILS/0/SD_ILS:1141474 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Bhattacharjee, Sravani, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5495617">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network vulnerability assessment : identify security loopholes in your network's infrastructure ent://SD_ILS/0/SD_ILS:1141744 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Rahalkar, Sagar, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5507753">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security with pfSense : architect, deploy, and operate enterprise-grade firewalls ent://SD_ILS/0/SD_ILS:1142128 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Aggarwal, Manuj, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5520881">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hands-on security in DevOps : ensure continuous security, deployment, and delivery with DevSecOps ent://SD_ILS/0/SD_ILS:1142132 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Hsu, Tony, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5520885">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Empirical research for software security : foundations and experience ent://SD_ILS/0/SD_ILS:1132973 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;ben Othmane, Lotfi, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5164090">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team tactics ent://SD_ILS/0/SD_ILS:1134722 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Diogenes, Yuri, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5259454">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cloud security automation : get to grips with automating your cloud security on AWS and OpenStack ent://SD_ILS/0/SD_ILS:1136691 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Priyam, Prashant, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5332125">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Practical cyber intelligence : how action-based intelligence can be an effective response to incidents ent://SD_ILS/0/SD_ILS:1136693 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Bautista, Wilson, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5332127">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity program development for business : the essential planning guide ent://SD_ILS/0/SD_ILS:1137119 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Moschovitis, Christos J. P., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5342325">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Learn social engineering : learn the art of human hacking with an internationally renowned expert ent://SD_ILS/0/SD_ILS:1137560 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Ozkaya, Erdal, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5379705">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security and cryptography : a self-teaching introduction ent://SD_ILS/0/SD_ILS:1137804 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Musa, Sarhan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5389089">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> .NET Standard 2.0 Cookbook : develop high quality, fast and portable applications by leveraging the power of .NET Standard Library ent://SD_ILS/0/SD_ILS:1138141 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Ismail, Fiqri, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5400395">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The five technological forces disrupting security : how social, mobile, cloud and iot are fundamentally changing the practice of physical security ent://SD_ILS/0/SD_ILS:1128883 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Van Till, Steve, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4981408">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security and privacy in cyber-physical systems : foundations, principles, and applications ent://SD_ILS/0/SD_ILS:1129049 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Song, Houbing, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4987646">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security and resilience in intelligent data-centric systems and communication networks ent://SD_ILS/0/SD_ILS:1130161 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Ficco, Massimo, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5090270">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Advanced persistent threat : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies ent://SD_ILS/0/SD_ILS:1120082 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Winkler, Ira, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4730826">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Loseless information : hiding in images ent://SD_ILS/0/SD_ILS:1120646 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Lu, Zhe-Ming, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4743573">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IoT security issues ent://SD_ILS/0/SD_ILS:1123519 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Gilchrist, Alasdair, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4810138">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Advanced penetration testing : hacking the world's most secure networks ent://SD_ILS/0/SD_ILS:1123722 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Allsopp, Wil, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4813145">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Mobile security and privacy : advances, challenges and future research directions ent://SD_ILS/0/SD_ILS:1118207 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Au, Man-Ho, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4689767">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Wireless communications security : solutions for the internet of things ent://SD_ILS/0/SD_ILS:1118219 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Penttinen, Jyrki T. J., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4690021">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Applied network security : master the art of detecting and averting advanced network security attacks and techniques ent://SD_ILS/0/SD_ILS:1125830 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Salmon, Arthur, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4853051">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Kali Linux intrusion and exploitation cookbook : over 70 recipes for system administrator or DevOps to master Kali Linux 2 and perform effective security assessment ent://SD_ILS/0/SD_ILS:1125549 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Shah, Dhruv, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4845574">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Safety of web applications : risks, encryption and handling vulnerabilities with PHP ent://SD_ILS/0/SD_ILS:1125310 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Quinton, Eric, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4840953">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:1126212 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Vacca, John R., editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4858374">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security operations center guidebook : a practical guide for a successful SOC ent://SD_ILS/0/SD_ILS:1126457 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Jarpey, Gregory , author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4862661">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybercrime and business : strategies for global corporate security ent://SD_ILS/0/SD_ILS:1126520 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Moskowitz, Sanford, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4863624">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Mastering Kali Linux for web penetration testing : test and evaluate all aspects of the design and implentation ent://SD_ILS/0/SD_ILS:1127735 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;McPhee, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4891263">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network forensics ent://SD_ILS/0/SD_ILS:1128247 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Messier, Ric, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4917496">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security handbook : develop a threat model and incident response strategy to build a strong information security framework ent://SD_ILS/0/SD_ILS:1133381 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Death, Darren, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5183382">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Kali linux wireless penetration testing cookbook : identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security ent://SD_ILS/0/SD_ILS:1133434 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Oriyano, Sean-Philip, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5188228">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Digital forensics with Kali Linux : perform data acquisition, digital investigation, and threat analysis using Kali Linux tools ent://SD_ILS/0/SD_ILS:1133651 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Parasram, Shiva V. N., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5207202">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> ISO 37001 : an introduction to anti-bribery management systems : doing the right things ent://SD_ILS/0/SD_ILS:1133711 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Field, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5211339">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Enterprise cloud security and governance : efficiently set data protection and privacy principles ent://SD_ILS/0/SD_ILS:1133840 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Vora, Zeal, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5216128">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows forensics cookbook : 61 recipes to help you analyze windows systems ent://SD_ILS/0/SD_ILS:1128640 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Skulkin, Oleg, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4940232">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security in network functions virtualization ent://SD_ILS/0/SD_ILS:1131905 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Zhang, Zonghua, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5152998">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information hiding in communication networks : fundamentals, mechanisms, applications, and countermeasures ent://SD_ILS/0/SD_ILS:1107654 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Mazurczyk, Wojciech, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4405578">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Essential skills for hackers ent://SD_ILS/0/SD_ILS:1104568 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4189281">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Malware diffusion models for modern complex networks : theory and applications ent://SD_ILS/0/SD_ILS:1108684 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Karyotis, Vasileios, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4438752">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows registry forensics : advanced digital forensic analysis of the windows registry ent://SD_ILS/0/SD_ILS:1108686 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Carvey, Harlan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4438754">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Building a corporate culture of security : strategies for strengthening organizational resiliency ent://SD_ILS/0/SD_ILS:1108349 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Sullivant, John, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4425984">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hiding behind the keyboard : uncovering covert communication methods with forensic analysis ent://SD_ILS/0/SD_ILS:1109062 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Shavers, Brett, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4452264">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network performance and security : testing and analyzing using open source and low-cost tools ent://SD_ILS/0/SD_ILS:1109063 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Chapman, Chris, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4452265">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Advanced penetration testing for highly-secured environments. ent://SD_ILS/0/SD_ILS:1111214 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Allen, Lee, 1946- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4520648">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> You : for sale protecting your personal data and privacy online ent://SD_ILS/0/SD_ILS:1053757 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Sumner, Stuart, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2187472">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> SSL and TLS : theory and practice ent://SD_ILS/0/SD_ILS:1124318 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Oppliger, Rolf, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4821279">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security in fixed and wireless networks ent://SD_ILS/0/SD_ILS:1115585 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Sch&auml;fer, G&uuml;nter, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4658592">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security and privacy in the digital era. Volume 1 ent://SD_ILS/0/SD_ILS:1115270 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Guerrier, Claudine, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4648717">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Dns security : defending the domain name system ent://SD_ILS/0/SD_ILS:1113215 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Liska, Allan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4556898">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Data breach preparation and response : breaches are certain, impact is not ent://SD_ILS/0/SD_ILS:1113216 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Fowler, Kevvie, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4556899">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber guerilla ent://SD_ILS/0/SD_ILS:1113262 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Haaster, Jelle van, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4557157">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Introduction to network security : theory and practice ent://SD_ILS/0/SD_ILS:1103122 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Wang, Jie, 1961- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040040">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The network security test lab : a step-by-step guide ent://SD_ILS/0/SD_ILS:1103143 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Gregg, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040350">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Web application security is a stack : how to CYA (Cover Your Apps) completely ent://SD_ILS/0/SD_ILS:1053836 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Vittie, Lori Mac, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192126">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Zabbix network monitoring essentials : your one-stop solution to efficient network monitoring with zabbix ent://SD_ILS/0/SD_ILS:1046048 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Vacche, Andrea Dalle, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1973849">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Learning iOS security : enhance the security of your iOS platform and applications using iOS-centric security techniques ent://SD_ILS/0/SD_ILS:1046059 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Banks, Allister, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1973863">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Python passive network mapping : P2NMAP ent://SD_ILS/0/SD_ILS:1050504 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Hosmer, Chet, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2068785">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The defende&#341;s dilemma : charting a course toward cybersecurity ent://SD_ILS/0/SD_ILS:1050852 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Libicki, Martin C., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2075897">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Dissecting the hack : the V3rb0ten network ent://SD_ILS/0/SD_ILS:1053000 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Street, Jayson E., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2098440">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security technology convergence insights ent://SD_ILS/0/SD_ILS:1047505 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Bernard, Ray, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2008287">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking web intelligence : open source intelligence and web reconnaissance concepts and techniques ent://SD_ILS/0/SD_ILS:1047851 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Chauhan, Sudhanshu, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2025500">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Two-factor authentication ent://SD_ILS/0/SD_ILS:1049535 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Stanislav, Mark, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2048577">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computational network science : an algorithmic approach ent://SD_ILS/0/SD_ILS:1038184 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Hexmoor, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1798312">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Managing online risk : apps, mobile, and social media security ent://SD_ILS/0/SD_ILS:1038176 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Gonzalez, Deborah, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1798304">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Understanding bitcoin : cryptography, engineering and economics. ent://SD_ILS/0/SD_ILS:1040180 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Franco, Pedro, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1823060">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> PCI compliance : understand and implement effective PCI data security standard compliance ent://SD_ILS/0/SD_ILS:1040570 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Williams, Branden R., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1832710">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Building an intelligence-led security program ent://SD_ILS/0/SD_ILS:1042561 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Liska, Allan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1888751">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> How to define and build an effective cyber threat intelligence capability ent://SD_ILS/0/SD_ILS:1042565 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1888755">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> How to defeat advanced malware : new tools for protection and forensics ent://SD_ILS/0/SD_ILS:1042566 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Dalziel, Max, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1888756">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security intelligence : a practitioner's guide to solving enterprise security challenges ent://SD_ILS/0/SD_ILS:1042735 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Li, Qing, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1895130">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Beyond cybersecurity : protecting your digital business ent://SD_ILS/0/SD_ILS:1042775 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Kaplan, James M., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1895275">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Assessing information security : strategies, tactics, logic and framework ent://SD_ILS/0/SD_ILS:1053834 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Vladimirov, A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192124">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking with Kali : practical penetration testing techniques ent://SD_ILS/0/SD_ILS:1007619 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Broad, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115177">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Business continuity and disaster recovery planning for IT professionals ent://SD_ILS/0/SD_ILS:1007620 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Snedaker, Susan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115178">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Procuring penetration testing services. ent://SD_ILS/0/SD_ILS:1037085 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z <a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778766">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Integrated security systems design : a complete reference for building enterprise-wide digital security systems ent://SD_ILS/0/SD_ILS:1037343 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Norman, Thomas, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1781681">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security ent://SD_ILS/0/SD_ILS:1038551 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Perez, Andre, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1800888">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber security and resiliency policy framework ent://SD_ILS/0/SD_ILS:1039877 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Vaseashta, A. (Ashok), editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1818046">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of digital privacy : simple tools to protect your personal information and your identity online ent://SD_ILS/0/SD_ILS:1023569 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1573362">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Applied network security monitoring : collection, detection, and analysis ent://SD_ILS/0/SD_ILS:1023659 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Sanders, Chris, 1986-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1574451">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Mastering metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach ent://SD_ILS/0/SD_ILS:1025364 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Jaswal, Nipun, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1593853">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security careers : skills, compensation, and career paths ent://SD_ILS/0/SD_ILS:1025703 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Walker, Stephen W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1598238">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber security ent://SD_ILS/0/SD_ILS:1025719 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Voeller, John G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1598809">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Communications and information infrastructure security ent://SD_ILS/0/SD_ILS:1025720 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Voeller, John G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1598810">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber threat! : how to manage the growing risk of cyber attacks ent://SD_ILS/0/SD_ILS:1034296 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Ulsch, N. MacDonnell, 1951- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1742833">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013 ent://SD_ILS/0/SD_ILS:1035010 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Ginodman, Veniamin, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1752831">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning ent://SD_ILS/0/SD_ILS:1036178 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Hutchens, Justin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1771381">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Online security for the business traveler ent://SD_ILS/0/SD_ILS:1036251 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Gonzalez, Deborah, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1772301">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux ent://SD_ILS/0/SD_ILS:1031737 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Buchanan, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1688607">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:1032266 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Andress, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1699255">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity for executives : a practical guide ent://SD_ILS/0/SD_ILS:1032594 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Touhill, Gregory J., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1707094">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security architect : careers in information security ent://SD_ILS/0/SD_ILS:1033065 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Collins, Jon, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1713960">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking point of sale : payment application secrets, threats, and solutions ent://SD_ILS/0/SD_ILS:1027046 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Gomzin, Slava.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629175">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Threat modeling : designing for security ent://SD_ILS/0/SD_ILS:1027048 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Shostack, Adam.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629177">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Critical infrastructure protection ent://SD_ILS/0/SD_ILS:1027637 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Edwards, Matthew, editor of compilation.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1637644">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Best practices in computer network defense : incident detection and response ent://SD_ILS/0/SD_ILS:1027641 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Hathaway, Melissa E., editor of compilation.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1637648">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually ent://SD_ILS/0/SD_ILS:1028145 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1644005">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Learning pentesting for Android devices : a practical guide to learning penetration testing for Android devices and applications ent://SD_ILS/0/SD_ILS:1028152 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Gupta, Aditya, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1644013">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer forensics with FTK : enhance your computer forensics knowledge through illustrations, tips, tricks, and practical real-world scenarios ent://SD_ILS/0/SD_ILS:1029107 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Carbone, Fernando, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1657797">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 ent://SD_ILS/0/SD_ILS:1029162 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Carvey, Harlan A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1659012">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Targeted cyber attacks : multi-staged attacks driven by exploits and malware ent://SD_ILS/0/SD_ILS:1029784 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Sood, Aditya K., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1673591">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network and system security ent://SD_ILS/0/SD_ILS:1018501 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1364061">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber security and IT infrastructure protection ent://SD_ILS/0/SD_ILS:1018941 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1377640">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cryptography for security and privacy in cloud computing ent://SD_ILS/0/SD_ILS:1020988 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Rass, Stefan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1463547">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity : managing systems, conducting testing, and investigating intrusions ent://SD_ILS/0/SD_ILS:1021516 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Mowbray, Thomas J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1481185">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of IT audit : purposes, processes, and practical information ent://SD_ILS/0/SD_ILS:1022729 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Gantz, Stephen D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1550527">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Biohackers the politics of open science ent://SD_ILS/0/SD_ILS:1088207 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Delfanti, Alessandro.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3386719">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Iris biometric model for secured network access ent://SD_ILS/0/SD_ILS:1012479 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Khoury, Franjieh El.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1177222">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network intrusion analysis methodologies, tools, and techniques for incident analysis and response ent://SD_ILS/0/SD_ILS:1003376 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Fichera, Joe, 1966-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1058152">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> UTM security with Fortinet Mastering FortiOS ent://SD_ILS/0/SD_ILS:1003496 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Tam, Kenneth.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1068442">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Advanced persistent threat understanding the danger and how to protect your organization ent://SD_ILS/0/SD_ILS:1003921 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Cole, Eric.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073020">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice ent://SD_ILS/0/SD_ILS:1003926 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Winterfeld, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073026">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows 2012 server network security securing your windows network systems and infrastructure ent://SD_ILS/0/SD_ILS:1007610 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Rountree, Derrick.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115160">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Practical anonymity hiding in plain sight online ent://SD_ILS/0/SD_ILS:1007614 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Loshin, Peter.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115167">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Professional penetration testing creating and learning in a hacking lab ent://SD_ILS/0/SD_ILS:1007616 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Wilhelm, Thomas.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115172">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Applied cyber security and the smart grid implementing security controls into the modern power infrastructure ent://SD_ILS/0/SD_ILS:1007626 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Knapp, Eric D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115187">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Mobile access safety beyond BYOD ent://SD_ILS/0/SD_ILS:1008414 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Assing, Dominique.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1124007">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The practice of network security monitoring : understanding incident detection and response ent://SD_ILS/0/SD_ILS:1023457 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Bejtlich, Richard.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572876">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security risks in social media technologies : safe practices in public service applications ent://SD_ILS/0/SD_ILS:1023776 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Oxley, Alan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1574994">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Data visualization. Part 2 ent://SD_ILS/0/SD_ILS:1024206 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Assam, Tarek.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1579356">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> SolarWinds Server &amp; Application Monitor : deployment and administration : an intuitive guide to implementing and calibrating SolarWinds Server &amp; Application Monitor with minimum hassle ent://SD_ILS/0/SD_ILS:1024621 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Brant, Justin M.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1582950">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Federated identity primer ent://SD_ILS/0/SD_ILS:1004672 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Rountree, Derrick.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1081145">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking for dummies ent://SD_ILS/0/SD_ILS:1006251 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Beaver, Kevin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1106542">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Web application defender's cookbook battling hackers and protecting users ent://SD_ILS/0/SD_ILS:1006627 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Barnett, Ryan C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108733">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The benefits and security risks of web-based applications for business trend report ent://SD_ILS/0/SD_ILS:1014733 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Kotwica, Kathleen.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1210948">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:1014191 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1195617">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Digital whoness identity, privacy and freedom in the cyberworld ent://SD_ILS/0/SD_ILS:1015068 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Capurro, Rafael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1215540">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Automatic defense against zero-day polymorphic worms in communication networks ent://SD_ILS/0/SD_ILS:1015261 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Mohammed, Mohssen, 1982- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1220106">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of web hacking tools and techniques to attack the Web ent://SD_ILS/0/SD_ILS:1015545 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Pauli, Joshua J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1222592">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security patterns in practice : designing secure architectures using software patterns ent://SD_ILS/0/SD_ILS:1015811 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Fernandez, Eduardo B., 1936- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1245159">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Instant Spring Security starter learn the fundamentals of web authentication and authorization using Spring Security ent://SD_ILS/0/SD_ILS:1016268 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Jagielski, Piotr.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1274894">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> American exceptionalism, the French exception, and digital media law ent://SD_ILS/0/SD_ILS:1018352 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Eko, Lyombe.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1358660">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Microsoft DirectAccess best practices and troubleshooting ent://SD_ILS/0/SD_ILS:1019261 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Krause, Jordan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1389355">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IBM mainframe security beyond the basics : a practical guide from a z/OS and RACF perspective ent://SD_ILS/0/SD_ILS:1019878 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Dattani, Dinesh D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1411689">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information protection playbook ent://SD_ILS/0/SD_ILS:1019990 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Kane, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1418381">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Web penetration testing with Kali Linux : a practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux ent://SD_ILS/0/SD_ILS:1020047 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Muniz, Joseph.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1420531">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Spring Security 3.x cookbook ent://SD_ILS/0/SD_ILS:1022304 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Mankale, Anjana.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1532014">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Advances in cyber security : technology, operations, and experiences ent://SD_ILS/0/SD_ILS:1123247 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Hsu, D. Frank (Derbiau Frank), 1948- editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4803841">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> What should go on the internet? : privacy, freedom, and security online ent://SD_ILS/0/SD_ILS:1111834 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Engel, Mary, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4533280">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Wiki at war conflict in a socially networked world ent://SD_ILS/0/SD_ILS:1063016 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Carafano, James Jay, 1955-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3038033">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> PCI compliance understand and implement effective PCI data security standard compliance ent://SD_ILS/0/SD_ILS:999631 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Williams, Branden R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=989201">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking web apps detecting and preventing web application security problems ent://SD_ILS/0/SD_ILS:1000371 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Shema, Mike.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1012529">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Mastering windows network forensics and investigation ent://SD_ILS/0/SD_ILS:986549 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Anson, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=818114">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Asset protection through security awareness ent://SD_ILS/0/SD_ILS:987451 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Speed, Tyler Justin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826927">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Data mining tools for malware detection ent://SD_ILS/0/SD_ILS:987461 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Masud, Mehedy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826949">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows forensic analysis toolkit advanced analysis techniques for Windows 7 ent://SD_ILS/0/SD_ILS:989925 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Carvey, Harlan A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=850700">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Client-side attacks and defense ent://SD_ILS/0/SD_ILS:1001905 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Shimonski, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1036349">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> SQL injection attacks and defense ent://SD_ILS/0/SD_ILS:997287 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Clarke, Justin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=953188">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber conflict competing national perspectives ent://SD_ILS/0/SD_ILS:1008510 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Ventre, Daniel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1124641">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The tangled Web a guide to securing modern Web applications ent://SD_ILS/0/SD_ILS:1009976 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137574">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> A multidisciplinary introduction to information security ent://SD_ILS/0/SD_ILS:1028416 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Mj&oslash;lsnes, Stig F., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1648315">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Wars of disruption and resilience cybered conflict, power, and national security ent://SD_ILS/0/SD_ILS:1063343 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Demchak, Chris C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3039013">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Use of risk analysis in computer-aided persuasion ent://SD_ILS/0/SD_ILS:988362 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Duman, Ekrem.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=836226">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IBM WebSphere application server V7.0 security secure your WebSphere applications with Java EE and JAAS security standards ent://SD_ILS/0/SD_ILS:996260 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Siliceo, Omar.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=943983">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Moodle security learn how to install and configure Moodle in the most secure way possible ent://SD_ILS/0/SD_ILS:996265 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Mileti&#263;, Darko.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=943988">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> WordPress 3 ultimate security protect your WordPress site and its network ent://SD_ILS/0/SD_ILS:996789 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Connelly, Olly.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948509">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Oracle Identity and Access Manager 11g for administrators administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasks ent://SD_ILS/0/SD_ILS:996835 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Kumar, Atul.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948559">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Microsoft Forefront UAG 2010 administrator's handbook take full command of Microsoft Forefront Unified Access Gateway to secure your business applications and provide dynamic remote access with DirectAccess ent://SD_ILS/0/SD_ILS:996844 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Ben-Ari, Erez.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948568">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> BackTrack 4 assuring security by penetration testing : master the art of penetration testing with BackTrack ent://SD_ILS/0/SD_ILS:996968 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Ali, Shakeel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=950518">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security risk management building an information security risk management program from the ground up ent://SD_ILS/0/SD_ILS:976804 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Wheeler, Evan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=685406">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing the cloud cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:977055 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Winkler, J. R. (Joachim R.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=686827">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> CMS security handbook the comprehensive guide for WordPress, Joomla!, Drupal, and Plone ent://SD_ILS/0/SD_ILS:979005 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Canavan, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706893">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Implementing SSL/TLS using cryptography and PKI ent://SD_ILS/0/SD_ILS:979007 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Davies, Joshua Dennis.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706899">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> PCI DSS : a practical guide to implementing and maintaining compliance ent://SD_ILS/0/SD_ILS:978724 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Wright, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=699178">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Web commerce security design and development ent://SD_ILS/0/SD_ILS:978975 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Nahari, Hadi.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706729">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Intrusion detection a machine learning approach ent://SD_ILS/0/SD_ILS:981161 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Tsai, Jeffrey J.-P.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=737642">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Identity management concepts, technologies, and systems ent://SD_ILS/0/SD_ILS:972507 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Bertino, Elisa.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=634511">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security for service oriented systems ent://SD_ILS/0/SD_ILS:972345 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Thuraisingham, Bhavani M.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=631696">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer Forensics jumpstart ent://SD_ILS/0/SD_ILS:973680 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Solomon, Michael R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=661659">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Client-Honeypots : exploring malicious websites ent://SD_ILS/0/SD_ILS:1017776 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;G&ouml;bel, Jan Gerrit, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1348689">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IT audit, control, and security ent://SD_ILS/0/SD_ILS:972135 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Moeller, Robert R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=624573">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Mac security bible ent://SD_ILS/0/SD_ILS:960377 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Kissell, Joe.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=477803">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Adaptive security management architecture ent://SD_ILS/0/SD_ILS:972238 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=625004">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security in ad hoc and sensor networks ent://SD_ILS/0/SD_ILS:1030254 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Beyah, Raheem (Raheem A.), 1976-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1679353">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Managing information security ent://SD_ILS/0/SD_ILS:1018342 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1357643">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> SSL and TLS theory and practice ent://SD_ILS/0/SD_ILS:996571 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Oppliger, Rolf.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=946557">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:955637 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=453166">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Unauthorised access physical penetration testing for IT security teams ent://SD_ILS/0/SD_ILS:958776 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Allsopp, Wil.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=470412">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Joomla! web security secure your Joomla! website from common security threats with this easy-to-use guide ent://SD_ILS/0/SD_ILS:998781 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Canavan, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=978105">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking the art of exploitation ent://SD_ILS/0/SD_ILS:1009955 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137538">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing information and communications systems principles, technologies, and applications ent://SD_ILS/0/SD_ILS:956326 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Furnell, Steven, 1970-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456881">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Fuzzing for software security testing and quality assurance ent://SD_ILS/0/SD_ILS:956329 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Takanen, Ari.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456884">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Practical embedded security building secure resource-constrained systems ent://SD_ILS/0/SD_ILS:942507 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Stapko, Timothy John.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=312846">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information assurance dependability and security in networked systems ent://SD_ILS/0/SD_ILS:944016 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Qian, Yi, 1962-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328312">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IT compliance and controls best practices for implementation ent://SD_ILS/0/SD_ILS:945051 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;DeLuccia, James J., 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=335724">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Secure computer and network systems modeling, analysis and design ent://SD_ILS/0/SD_ILS:946385 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Ye, Nong.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=351427">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Implementing 802.1X security solutions for wired and wireless networks ent://SD_ILS/0/SD_ILS:946579 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Geier, James T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=353449">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Implementing NAP and NAC security technologies the complete guide to network access control ent://SD_ILS/0/SD_ILS:946583 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Hoffman, Daniel (Daniel V.), 1972-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=353459">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Aspects of network and information security ent://SD_ILS/0/SD_ILS:947147 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;NATO Advanced Study Institute on Network Security and Intrusion Detection (2005 : Yerevan, Armenia)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=363205">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Trust and security in collaborative computing ent://SD_ILS/0/SD_ILS:1030255 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Zou, Xukai, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1679354">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Toward a safer and more secure cyberspace ent://SD_ILS/0/SD_ILS:1085452 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Goodman, Seymour E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3378311">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The misuse of information systems the impact of security countermeasures ent://SD_ILS/0/SD_ILS:1058044 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;D'Arcy, John P., 1975-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3016826">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security data visualization graphical techniques for network analysis ent://SD_ILS/0/SD_ILS:1058454 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Conti, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3017625">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security assessment from vulnerability to patch ent://SD_ILS/0/SD_ILS:937038 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Manzuik, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=280219">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Integrated security systems design concepts, specifications, and implementation ent://SD_ILS/0/SD_ILS:938298 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Norman, Thomas L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=287955">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Developer's guide to web application security ent://SD_ILS/0/SD_ILS:938521 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Cross, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=289735">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows forensic analysis DVD toolkit, ent://SD_ILS/0/SD_ILS:944076 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Carvey, Harlan A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328624">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Techno security's guide to e-discovery and digital forensics ent://SD_ILS/0/SD_ILS:948015 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Wiles, Jack.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=405426">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security in distributed and networking systems ent://SD_ILS/0/SD_ILS:1013897 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Pan, Yi, 1960-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1193126">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasures ent://SD_ILS/0/SD_ILS:939483 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Contos, Brian T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294116">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Designing and building enterprise DMZs ent://SD_ILS/0/SD_ILS:943348 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Flynn, Hal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=319198">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at designing security for a Windows Server 2003 network ent://SD_ILS/0/SD_ILS:933856 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Amini, Rob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254832">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security log management identifying patterns in the chaos ent://SD_ILS/0/SD_ILS:933857 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Babbin, Jacob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254833">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:933858 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Long, Johnny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254834">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing IM and P2P applications for the enterprise ent://SD_ILS/0/SD_ILS:933871 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Piccard, Paul L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254847">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Insider threat protecting the enterprise from sabotage, spying, and theft ent://SD_ILS/0/SD_ILS:933873 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Cole, Eric.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254849">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Configuring SonicWALL firewalls ent://SD_ILS/0/SD_ILS:934073 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Lathem, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=256369">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at managing information security ent://SD_ILS/0/SD_ILS:934742 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Osborne, Mark.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=266207">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Firewall policies and VPN configurations ent://SD_ILS/0/SD_ILS:935986 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Cantrell, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=272100">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security for mobile networks and platforms ent://SD_ILS/0/SD_ILS:945204 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Aissi, Selim.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338731">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> WebSphere application server for z/OS V5 and J2EE 1.3 security handbook ent://SD_ILS/0/SD_ILS:1075077 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Allison, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306382">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> z/OS 1.6 security services update ent://SD_ILS/0/SD_ILS:1075148 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Kappeler, Patrick.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306453">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Secure production deployment of B2B solutions using WebSphere business integration connect ent://SD_ILS/0/SD_ILS:1075151 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Putte, Geert van de.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306456">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Identity and access management solutions using WebSphere Portal V5.1, Tivoli Identity Manager V4.5.1, and Tivoli Access Manager V5.1 ent://SD_ILS/0/SD_ILS:1075241 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Ganci, John.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306546">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IBM system z9 109 technical introduction ent://SD_ILS/0/SD_ILS:1075277 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Ogden, Bill.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306582">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Distributed security and high availability with Tivoli Access Manager and WebSphere Application Server for z/OS ent://SD_ILS/0/SD_ILS:1075297 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Davies, Saida.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306602">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> z/OS diagnostic data collection and analysis ent://SD_ILS/0/SD_ILS:1075465 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Rogers, Paul.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306770">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Buffer overflow attacks detect, exploit, prevent ent://SD_ILS/0/SD_ILS:930207 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Foster, James C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=222803">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Intrusion prevention and active response deploying network and host IPS ent://SD_ILS/0/SD_ILS:930714 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Henmi, Anne.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=226578">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Host integrity monitoring using Osiris and Samhain ent://SD_ILS/0/SD_ILS:931606 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Wotring, Brian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=233599">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Silence on the wire a field guide to passive reconnaissance and indirect attacks ent://SD_ILS/0/SD_ILS:936579 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273504">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Configuring NetScreen Firewalls ent://SD_ILS/0/SD_ILS:939461 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Cameron, Rob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294055">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Dr. Tom Shinder's configuring ISA Server 2004 ent://SD_ILS/0/SD_ILS:939479 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294094">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cisco Pix firewalls configure, manage and troubleshoot ent://SD_ILS/0/SD_ILS:933859 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Behrens, Thorsten.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254835">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Nessus, Snort, &amp; Ethereal power tools customizing open source security applications ent://SD_ILS/0/SD_ILS:933863 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Archibald, Neil.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254839">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security evaluation using the NSA IEM ent://SD_ILS/0/SD_ILS:933866 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Fuller, Ed.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254842">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Implementing PKI Services on z/OS ent://SD_ILS/0/SD_ILS:1075572 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306877">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Internet applications the emerging global computer. ent://SD_ILS/0/SD_ILS:1092046 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411450">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Virtual private networking a construction, operation and utilization guide ent://SD_ILS/0/SD_ILS:958798 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Held, Gilbert, 1943-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=470565">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Innocent code a security wake-up call for Web programmers ent://SD_ILS/0/SD_ILS:929474 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Huseby, Sverre H.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=210558">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Implementing SSH strategies for optimizing the Secure Shell ent://SD_ILS/0/SD_ILS:929721 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Dwivedi, Himanshu.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=215119">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Defense and detection strategies against Internet worms ent://SD_ILS/0/SD_ILS:931019 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Nazario, Jose.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227660">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network and security issues for internet mobile entertainment ent://SD_ILS/0/SD_ILS:938596 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=289848">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber adversary characterization auditing the hacker mind ent://SD_ILS/0/SD_ILS:939469 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Parker, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294071">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Ethereal packet sniffing ent://SD_ILS/0/SD_ILS:939485 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Orebaugh, Angela.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294122">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking the code ASP. NET web application security ent://SD_ILS/0/SD_ILS:939506 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Burnett, Mark (Mark M.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294160">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> MCSE designing security for a Windows Server 2003 network : exam 70-298 study guide &amp; DVD training system ent://SD_ILS/0/SD_ILS:939533 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Khnaser, Elias N.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294253">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Nessus network auditing ent://SD_ILS/0/SD_ILS:939540 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Beale, Jay.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294281">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security sage's guide to hardening the network infrastructure ent://SD_ILS/0/SD_ILS:939571 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Andr&eacute;s, Steven.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294359">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at Configuring ISA Server 2004 ent://SD_ILS/0/SD_ILS:933877 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Shinder, Dr. Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254853">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security foundations ent://SD_ILS/0/SD_ILS:935040 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Strebe, Matthew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=267332">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The Internet under crisis conditions learning from September 11 ent://SD_ILS/0/SD_ILS:1082772 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3375369">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Z/OS WebSphere and J2EE security handbook ent://SD_ILS/0/SD_ILS:1075315 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Wunderlich, Holger.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306620">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security configuration in a TCP/IP Sysplex environment ent://SD_ILS/0/SD_ILS:1075356 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306661">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Enterprise business portals II with IBM tivoli access manager ent://SD_ILS/0/SD_ILS:1075452 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;B&uuml;cker, Axel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306757">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> ExamWise for CIW security professional exam 1D0-470 ent://SD_ILS/0/SD_ILS:1091942 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Bayer, Chad M.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3410580">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security secrets, intruders and ID tags. ent://SD_ILS/0/SD_ILS:1092043 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411447">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking the art of exploitation ent://SD_ILS/0/SD_ILS:936567 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273488">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Building DMZs for Enterprise networks ent://SD_ILS/0/SD_ILS:939444 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Shimonski, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294015">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cisco security professional's guide to secure intrusion detection systems ent://SD_ILS/0/SD_ILS:939451 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294035">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Configuring Symantec Antivirus, Corporate Edition ent://SD_ILS/0/SD_ILS:939462 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Hunter, Laura E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294056">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Best damn firewall book period ent://SD_ILS/0/SD_ILS:939585 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294396">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Snort 2.0 intrusion detection ent://SD_ILS/0/SD_ILS:939575 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Beale, Jay.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294371">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Special ops host and Network security for Microsoft, UNIX, and Oracle ent://SD_ILS/0/SD_ILS:939577 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Birkholz, Erik Pace.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294373">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security a practical guide ent://SD_ILS/0/SD_ILS:940334 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Poole, Owen.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=298471">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity operations handbook ent://SD_ILS/0/SD_ILS:942613 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Rittinghouse, John W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=313612">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity today and tomorrow pay now or pay later ent://SD_ILS/0/SD_ILS:1082583 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3375180">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Introduction to communication electronic warfare systems ent://SD_ILS/0/SD_ILS:930979 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Poisel, Richard.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227618">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security jumpstart ent://SD_ILS/0/SD_ILS:936008 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Strebe, Matthew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=272216">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cisco security specialist's guide to PIX Firewall ent://SD_ILS/0/SD_ILS:939452 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Osipov, Vitaly.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294036">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing ColdFusion ent://SD_ILS/0/SD_ILS:939498 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Meyer, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294151">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing your network ent://SD_ILS/0/SD_ILS:939504 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Ahmad, David R. Mirza.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294158">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Managing Cisco network security ent://SD_ILS/0/SD_ILS:939524 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Danielyan, Edgar.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294234">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Nokia Network security solutions handbook ent://SD_ILS/0/SD_ILS:939542 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Maxwell, Douglas D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294289">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Configuring ISA server 2000 building firewalls for windows 2000 ent://SD_ILS/0/SD_ILS:939460 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294054">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing Windows 2000 ent://SD_ILS/0/SD_ILS:939501 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Todd, Chad.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294154">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing your wireless network ent://SD_ILS/0/SD_ILS:939507 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Owens, Les.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294161">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Trust in cyberspace ent://SD_ILS/0/SD_ILS:1085960 2024-05-24T15:02:49Z 2024-05-24T15:02:49Z by&#160;Schneider, Fred B.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3378820">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/>