Arama Sonu&ccedil;lar&#305; - Daralt&#305;lm&#305;&#351;: English - 2015 - Computer networks -- Security measures. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092015$0025092015$0026qf$003dSUBJECT$002509Konu$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300;jsessionid=5BA57E2579BF1C65169D9E4B1389D450? 2024-06-16T22:57:58Z Introduction to network security : theory and practice ent://SD_ILS/0/SD_ILS:1103122 2024-06-16T22:57:58Z 2024-06-16T22:57:58Z by&#160;Wang, Jie, 1961- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040040">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The network security test lab : a step-by-step guide ent://SD_ILS/0/SD_ILS:1103143 2024-06-16T22:57:58Z 2024-06-16T22:57:58Z by&#160;Gregg, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040350">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Building an intelligence-led security program ent://SD_ILS/0/SD_ILS:1042561 2024-06-16T22:57:58Z 2024-06-16T22:57:58Z by&#160;Liska, Allan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1888751">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> How to define and build an effective cyber threat intelligence capability ent://SD_ILS/0/SD_ILS:1042565 2024-06-16T22:57:58Z 2024-06-16T22:57:58Z by&#160;Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1888755">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> How to defeat advanced malware : new tools for protection and forensics ent://SD_ILS/0/SD_ILS:1042566 2024-06-16T22:57:58Z 2024-06-16T22:57:58Z by&#160;Dalziel, Max, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1888756">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security intelligence : a practitioner's guide to solving enterprise security challenges ent://SD_ILS/0/SD_ILS:1042735 2024-06-16T22:57:58Z 2024-06-16T22:57:58Z by&#160;Li, Qing, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1895130">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Beyond cybersecurity : protecting your digital business ent://SD_ILS/0/SD_ILS:1042775 2024-06-16T22:57:58Z 2024-06-16T22:57:58Z by&#160;Kaplan, James M., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1895275">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Understanding bitcoin : cryptography, engineering and economics. ent://SD_ILS/0/SD_ILS:1040180 2024-06-16T22:57:58Z 2024-06-16T22:57:58Z by&#160;Franco, Pedro, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1823060">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> PCI compliance : understand and implement effective PCI data security standard compliance ent://SD_ILS/0/SD_ILS:1040570 2024-06-16T22:57:58Z 2024-06-16T22:57:58Z by&#160;Williams, Branden R., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1832710">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Dissecting the hack : the V3rb0ten network ent://SD_ILS/0/SD_ILS:1053000 2024-06-16T22:57:58Z 2024-06-16T22:57:58Z by&#160;Street, Jayson E., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2098440">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Web application security is a stack : how to CYA (Cover Your Apps) completely ent://SD_ILS/0/SD_ILS:1053836 2024-06-16T22:57:58Z 2024-06-16T22:57:58Z by&#160;Vittie, Lori Mac, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192126">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computational network science : an algorithmic approach ent://SD_ILS/0/SD_ILS:1038184 2024-06-16T22:57:58Z 2024-06-16T22:57:58Z by&#160;Hexmoor, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1798312">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Managing online risk : apps, mobile, and social media security ent://SD_ILS/0/SD_ILS:1038176 2024-06-16T22:57:58Z 2024-06-16T22:57:58Z by&#160;Gonzalez, Deborah, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1798304">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Two-factor authentication ent://SD_ILS/0/SD_ILS:1049535 2024-06-16T22:57:58Z 2024-06-16T22:57:58Z by&#160;Stanislav, Mark, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2048577">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Python passive network mapping : P2NMAP ent://SD_ILS/0/SD_ILS:1050504 2024-06-16T22:57:58Z 2024-06-16T22:57:58Z by&#160;Hosmer, Chet, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2068785">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The defende&#341;s dilemma : charting a course toward cybersecurity ent://SD_ILS/0/SD_ILS:1050852 2024-06-16T22:57:58Z 2024-06-16T22:57:58Z by&#160;Libicki, Martin C., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2075897">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Zabbix network monitoring essentials : your one-stop solution to efficient network monitoring with zabbix ent://SD_ILS/0/SD_ILS:1046048 2024-06-16T22:57:58Z 2024-06-16T22:57:58Z by&#160;Vacche, Andrea Dalle, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1973849">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Learning iOS security : enhance the security of your iOS platform and applications using iOS-centric security techniques ent://SD_ILS/0/SD_ILS:1046059 2024-06-16T22:57:58Z 2024-06-16T22:57:58Z by&#160;Banks, Allister, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1973863">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security technology convergence insights ent://SD_ILS/0/SD_ILS:1047505 2024-06-16T22:57:58Z 2024-06-16T22:57:58Z by&#160;Bernard, Ray, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2008287">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking web intelligence : open source intelligence and web reconnaissance concepts and techniques ent://SD_ILS/0/SD_ILS:1047851 2024-06-16T22:57:58Z 2024-06-16T22:57:58Z by&#160;Chauhan, Sudhanshu, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2025500">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/>