Arama Sonu&ccedil;lar&#305; - Daralt&#305;lm&#305;&#351;: English - 2007 - Computer security. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092007$0025092007$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300? 2024-05-27T18:54:56Z Developer's guide to web application security ent://SD_ILS/0/SD_ILS:938521 2024-05-27T18:54:56Z 2024-05-27T18:54:56Z by&#160;Cross, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=289735">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Papers from the first European workshop on technological &amp; security issues in digital rights management (EuDiRights) ent://SD_ILS/0/SD_ILS:939160 2024-05-27T18:54:56Z 2024-05-27T18:54:56Z by&#160;Yag&uuml;e, Mariemma.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=291585">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Microsoft windows security fundamentals ent://SD_ILS/0/SD_ILS:939647 2024-05-27T18:54:56Z 2024-05-27T18:54:56Z by&#160;Clercq, Jan de, 1968-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294637">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security convergence managing enterprise security risk ent://SD_ILS/0/SD_ILS:940434 2024-05-27T18:54:56Z 2024-05-27T18:54:56Z by&#160;Tyson, Dave.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=299507">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Techno security's guide to e-discovery and digital forensics ent://SD_ILS/0/SD_ILS:948015 2024-05-27T18:54:56Z 2024-05-27T18:54:56Z by&#160;Wiles, Jack.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=405426">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> A process for developing a common vocabulary in the information security area ent://SD_ILS/0/SD_ILS:943478 2024-05-27T18:54:56Z 2024-05-27T18:54:56Z by&#160;NATO Advanced Research Workshop on a Process for Developing a Common Vocabulary in the Information Security Area (2006 : Moscow, Russia)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=320313">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Microsoft Vista for IT security professionals ent://SD_ILS/0/SD_ILS:944075 2024-05-27T18:54:56Z 2024-05-27T18:54:56Z by&#160;Piltzecker, Tony, 1975-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328623">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows forensic analysis DVD toolkit, ent://SD_ILS/0/SD_ILS:944076 2024-05-27T18:54:56Z 2024-05-27T18:54:56Z by&#160;Carvey, Harlan A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328624">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information management &amp; computer security. Volume 15, Number 5, Papers from the HAISA 2007 Symposium ent://SD_ILS/0/SD_ILS:944119 2024-05-27T18:54:56Z 2024-05-27T18:54:56Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328737">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Zen and the art of information security ent://SD_ILS/0/SD_ILS:944282 2024-05-27T18:54:56Z 2024-05-27T18:54:56Z by&#160;Winkler, Ira.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=330200">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Best damn firewall book period ent://SD_ILS/0/SD_ILS:944260 2024-05-27T18:54:56Z 2024-05-27T18:54:56Z by&#160;Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=330100">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Role-based access control ent://SD_ILS/0/SD_ILS:945221 2024-05-27T18:54:56Z 2024-05-27T18:54:56Z by&#160;Ferraiolo, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338751">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The misuse of information systems the impact of security countermeasures ent://SD_ILS/0/SD_ILS:1058044 2024-05-27T18:54:56Z 2024-05-27T18:54:56Z by&#160;D'Arcy, John P., 1975-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3016826">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security data visualization graphical techniques for network analysis ent://SD_ILS/0/SD_ILS:1058454 2024-05-27T18:54:56Z 2024-05-27T18:54:56Z by&#160;Conti, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3017625">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Toward a safer and more secure cyberspace ent://SD_ILS/0/SD_ILS:1085452 2024-05-27T18:54:56Z 2024-05-27T18:54:56Z by&#160;Goodman, Seymour E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3378311">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Stealing the network : how to own a shadow: the chase for Knuth ent://SD_ILS/0/SD_ILS:1188268 2024-05-27T18:54:56Z 2024-05-27T18:54:56Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490818">http://www.sciencedirect.com/science/book/9781597490818</a><br/>Format:&#160;Elektronik Kaynak<br/> Snort : IDS and IPS toolkit ent://SD_ILS/0/SD_ILS:1188271 2024-05-27T18:54:56Z 2024-05-27T18:54:56Z by&#160;Beale, Jay.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490993">https://www.sciencedirect.com/science/book/9781597490993</a><br/>Format:&#160;Elektronik Kaynak<br/> WarDriving &amp; wireless penetration testing ent://SD_ILS/0/SD_ILS:1188275 2024-05-27T18:54:56Z 2024-05-27T18:54:56Z by&#160;Hurley, Chris.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491112">http://www.sciencedirect.com/science/book/9781597491112</a><br/>Format:&#160;Elektronik Kaynak<br/> FISMA certification &amp; accreditation handbook ent://SD_ILS/0/SD_ILS:1188277 2024-05-27T18:54:56Z 2024-05-27T18:54:56Z by&#160;Taylor, Laura.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">http://www.sciencedirect.com/science/book/9781597491167</a><br/>Format:&#160;Elektronik Kaynak<br/> Techno Security's guide to managing risks : for IT managers, auditors, and investigators ent://SD_ILS/0/SD_ILS:1188280 2024-05-27T18:54:56Z 2024-05-27T18:54:56Z by&#160;Wiles, Jack.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">http://www.sciencedirect.com/science/book/9781597491389</a><br/>Format:&#160;Elektronik Kaynak<br/> Physical and logical security convergence powered by enterprise security management ent://SD_ILS/0/SD_ILS:1189088 2024-05-27T18:54:56Z 2024-05-27T18:54:56Z by&#160;Contos, Brian T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491228">https://www.sciencedirect.com/science/book/9781597491228</a><br/>Format:&#160;Elektronik Kaynak<br/> Web application vulnerabilities : detect, exploit, prevent ent://SD_ILS/0/SD_ILS:1189105 2024-05-27T18:54:56Z 2024-05-27T18:54:56Z by&#160;Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492096">http://www.sciencedirect.com/science/book/9781597492096</a><br/>Format:&#160;Elektronik Kaynak<br/> Techno security's guide to e-discovery and digital forensics ent://SD_ILS/0/SD_ILS:1189113 2024-05-27T18:54:56Z 2024-05-27T18:54:56Z by&#160;Wiles, Jack.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492232">http://www.sciencedirect.com/science/book/9781597492232</a><br/>Format:&#160;Elektronik Kaynak<br/> Microsoft Vista for IT security professionals ent://SD_ILS/0/SD_ILS:1186453 2024-05-27T18:54:56Z 2024-05-27T18:54:56Z by&#160;Piltzecker, Tony, 1975-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491396">http://www.sciencedirect.com/science/book/9781597491396</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows forensic analysis : DVD toolkit ent://SD_ILS/0/SD_ILS:1186455 2024-05-27T18:54:56Z 2024-05-27T18:54:56Z by&#160;Carvey, Harlan A.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491563">http://www.sciencedirect.com/science/book/9781597491563</a><br/>Format:&#160;Elektronik Kaynak<br/> Zen and the art of information security ent://SD_ILS/0/SD_ILS:1186460 2024-05-27T18:54:56Z 2024-05-27T18:54:56Z by&#160;Winkler, Ira.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491686">https://www.sciencedirect.com/science/book/9781597491686</a><br/>Format:&#160;Elektronik Kaynak<br/> Open source fuzzing tools. ent://SD_ILS/0/SD_ILS:1186474 2024-05-27T18:54:56Z 2024-05-27T18:54:56Z by&#160;Rathaus, Noam.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491952">http://www.sciencedirect.com/science/book/9781597491952</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at securing SQL server 2005. ent://SD_ILS/0/SD_ILS:1186475 2024-05-27T18:54:56Z 2024-05-27T18:54:56Z ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491969">http://www.sciencedirect.com/science/book/9781597491969</a><br/>Format:&#160;Elektronik Kaynak<br/> Developer's guide to web application security ent://SD_ILS/0/SD_ILS:1186371 2024-05-27T18:54:56Z 2024-05-27T18:54:56Z by&#160;Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format:&#160;Elektronik Kaynak<br/> Metasploit toolkit for penetration testing, exploit development, and vulnerability research ent://SD_ILS/0/SD_ILS:1186373 2024-05-27T18:54:56Z 2024-05-27T18:54:56Z by&#160;Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">http://www.sciencedirect.com/science/book/9781597490740</a><br/>Format:&#160;Elektronik Kaynak<br/> The history of information security : a comprehensive handbook ent://SD_ILS/0/SD_ILS:1186523 2024-05-27T18:54:56Z 2024-05-27T18:54:56Z by&#160;Leeuw, Karl de.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444516084">http://www.sciencedirect.com/science/book/9780444516084</a><br/>Format:&#160;Elektronik Kaynak<br/> Botnets : the killer web app ent://SD_ILS/0/SD_ILS:1186444 2024-05-27T18:54:56Z 2024-05-27T18:54:56Z by&#160;Schiller, Craig A.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491358">https://www.sciencedirect.com/science/book/9781597491358</a><br/>Format:&#160;Elektronik Kaynak<br/> Security convergence : managing enterprise security risk ent://SD_ILS/0/SD_ILS:1186446 2024-05-27T18:54:56Z 2024-05-27T18:54:56Z by&#160;Tyson, Dave.<br/><a href="http://www.sciencedirect.com/science/book/9780750684255">Available from ScienceDirect. Online version available for university members only. This requires an institutional login off-campus</a> ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780750684255">https://www.sciencedirect.com/science/book/9780750684255</a><br/>Format:&#160;Elektronik Kaynak<br/> Microsoft windows security fundamentals ent://SD_ILS/0/SD_ILS:1185703 2024-05-27T18:54:56Z 2024-05-27T18:54:56Z by&#160;Clercq, Jan de, 1968-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583408">https://www.sciencedirect.com/science/book/9781555583408</a><br/>Format:&#160;Elektronik Kaynak<br/>