Arama Sonuçları - Daraltılmış: English - 2009 - Computer networks -- Security measures.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092009$0025092009$0026qf$003dSUBJECT$002509Konu$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300?2024-06-21T16:58:52ZUnauthorised access physical penetration testing for IT security teamsent://SD_ILS/0/SD_ILS:9587762024-06-21T16:58:52Z2024-06-21T16:58:52Zby Allsopp, Wil.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=470412">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:9556372024-06-21T16:58:52Z2024-06-21T16:58:52Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=453166">Click to View</a><br/>Format: Elektronik Kaynak<br/>SSL and TLS theory and practiceent://SD_ILS/0/SD_ILS:9965712024-06-21T16:58:52Z2024-06-21T16:58:52Zby Oppliger, Rolf.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=946557">Click to View</a><br/>Format: Elektronik Kaynak<br/>Next generation SSH2 implementation : securing data in motionent://SD_ILS/0/SD_ILS:11917632024-06-21T16:58:52Z2024-06-21T16:58:52Zby Liu, Dale.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492836">https://www.sciencedirect.com/science/book/9781597492836</a><br/>Format: Elektronik Kaynak<br/>GFI network security and PCI compliance power toolsent://SD_ILS/0/SD_ILS:11918272024-06-21T16:58:52Z2024-06-21T16:58:52Zby Posey, Brien.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492850">https://www.sciencedirect.com/science/book/9781597492850</a><br/>Format: Elektronik Kaynak<br/>Disappearing cryptography : information hiding : steganography & watermarkingent://SD_ILS/0/SD_ILS:11920502024-06-21T16:58:52Z2024-06-21T16:58:52Zby Wayner, Peter, 1964-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123744791">https://www.sciencedirect.com/science/book/9780123744791</a><br/>Format: Elektronik Kaynak<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:11925942024-06-21T16:58:52Z2024-06-21T16:58:52Zby Vacca, John R.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123743541">https://www.sciencedirect.com/science/book/9780123743541</a><br/>Format: Elektronik Kaynak<br/>Cisco router and switch forensics : investigating and analyzing malicious network activityent://SD_ILS/0/SD_ILS:11928002024-06-21T16:58:52Z2024-06-21T16:58:52Zby Liu, Dale.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494182">https://www.sciencedirect.com/science/book/9781597494182</a><br/>Format: Elektronik Kaynak<br/>