Arama Sonuçları - Daraltılmış: English - Computer networks -- Security measures.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dSUBJECT$002509Konu$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ic$003dtrue$0026ps$003d300?dt=list2024-09-26T01:31:18ZCyber and you : the impact of technology on our livesent://SD_ILS/0/SD_ILS:11471552024-09-26T01:31:18Z2024-09-26T01:31:18Zby Kendal, Maureen, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5811334">Click to View</a><br/>Format: Elektronik Kaynak<br/>Smart cities cybersecurity and privacyent://SD_ILS/0/SD_ILS:11438492024-09-26T01:31:18Z2024-09-26T01:31:18Zby Kayhan Zrar Ghafoor, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5609779">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber smart : five habits to protect your family, money, and identity from cyber criminalsent://SD_ILS/0/SD_ILS:11439062024-09-26T01:31:18Z2024-09-26T01:31:18Zby McDonough, Bart, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5612908">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber security in parallel and distributed computing : concepts, techniques, applications and case studiesent://SD_ILS/0/SD_ILS:11456862024-09-26T01:31:18Z2024-09-26T01:31:18Zby Le, Dac-Nhuong, 1983- editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5741215">Click to View</a><br/>Format: Elektronik Kaynak<br/>Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviorsent://SD_ILS/0/SD_ILS:11462142024-09-26T01:31:18Z2024-09-26T01:31:18Zby Carpenter, Perry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5763515">Click to View</a><br/>Format: Elektronik Kaynak<br/>The business of cybersecurity : foundations and ideologiesent://SD_ILS/0/SD_ILS:11463812024-09-26T01:31:18Z2024-09-26T01:31:18Zby Sathnur, Ashwini, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5770273">Click to View</a><br/>Format: Elektronik Kaynak<br/>Understanding security issuesent://SD_ILS/0/SD_ILS:11325292024-09-26T01:31:18Z2024-09-26T01:31:18Zby Donaldson, Scott E., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5157542">Click to View</a><br/>Format: Elektronik Kaynak<br/>Fuzzing for software security testing and quality assuranceent://SD_ILS/0/SD_ILS:11392372024-09-26T01:31:18Z2024-09-26T01:31:18Zby Takanen, Ari, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5430720">Click to View</a><br/>Format: Elektronik Kaynak<br/>Learn ethical hacking from scratch : your stepping stone to penetration testingent://SD_ILS/0/SD_ILS:11411112024-09-26T01:31:18Z2024-09-26T01:31:18Zby Sabih, Zaid, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5485020">Click to View</a><br/>Format: Elektronik Kaynak<br/>Practical industrial internet of things security : a practitioner's guide to securing connected industriesent://SD_ILS/0/SD_ILS:11414742024-09-26T01:31:18Z2024-09-26T01:31:18Zby Bhattacharjee, Sravani, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5495617">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network vulnerability assessment : identify security loopholes in your network's infrastructureent://SD_ILS/0/SD_ILS:11417442024-09-26T01:31:18Z2024-09-26T01:31:18Zby Rahalkar, Sagar, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5507753">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network security with pfSense : architect, deploy, and operate enterprise-grade firewallsent://SD_ILS/0/SD_ILS:11421282024-09-26T01:31:18Z2024-09-26T01:31:18Zby Aggarwal, Manuj, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5520881">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hands-on security in DevOps : ensure continuous security, deployment, and delivery with DevSecOpsent://SD_ILS/0/SD_ILS:11421322024-09-26T01:31:18Z2024-09-26T01:31:18Zby Hsu, Tony, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5520885">Click to View</a><br/>Format: Elektronik Kaynak<br/>Empirical research for software security : foundations and experienceent://SD_ILS/0/SD_ILS:11329732024-09-26T01:31:18Z2024-09-26T01:31:18Zby ben Othmane, Lotfi, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5164090">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team tacticsent://SD_ILS/0/SD_ILS:11347222024-09-26T01:31:18Z2024-09-26T01:31:18Zby Diogenes, Yuri, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5259454">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cloud security automation : get to grips with automating your cloud security on AWS and OpenStackent://SD_ILS/0/SD_ILS:11366912024-09-26T01:31:18Z2024-09-26T01:31:18Zby Priyam, Prashant, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5332125">Click to View</a><br/>Format: Elektronik Kaynak<br/>Practical cyber intelligence : how action-based intelligence can be an effective response to incidentsent://SD_ILS/0/SD_ILS:11366932024-09-26T01:31:18Z2024-09-26T01:31:18Zby Bautista, Wilson, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5332127">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity program development for business : the essential planning guideent://SD_ILS/0/SD_ILS:11371192024-09-26T01:31:18Z2024-09-26T01:31:18Zby Moschovitis, Christos J. P., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5342325">Click to View</a><br/>Format: Elektronik Kaynak<br/>Learn social engineering : learn the art of human hacking with an internationally renowned expertent://SD_ILS/0/SD_ILS:11375602024-09-26T01:31:18Z2024-09-26T01:31:18Zby Ozkaya, Erdal, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5379705">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network security and cryptography : a self-teaching introductionent://SD_ILS/0/SD_ILS:11378042024-09-26T01:31:18Z2024-09-26T01:31:18Zby Musa, Sarhan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5389089">Click to View</a><br/>Format: Elektronik Kaynak<br/>.NET Standard 2.0 Cookbook : develop high quality, fast and portable applications by leveraging the power of .NET Standard Libraryent://SD_ILS/0/SD_ILS:11381412024-09-26T01:31:18Z2024-09-26T01:31:18Zby Ismail, Fiqri, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5400395">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security and privacy in cyber-physical systems : foundations, principles, and applicationsent://SD_ILS/0/SD_ILS:11290492024-09-26T01:31:18Z2024-09-26T01:31:18Zby Song, Houbing, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4987646">Click to View</a><br/>Format: Elektronik Kaynak<br/>The five technological forces disrupting security : how social, mobile, cloud and iot are fundamentally changing the practice of physical securityent://SD_ILS/0/SD_ILS:11288832024-09-26T01:31:18Z2024-09-26T01:31:18Zby Van Till, Steve, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4981408">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security and resilience in intelligent data-centric systems and communication networksent://SD_ILS/0/SD_ILS:11301612024-09-26T01:31:18Z2024-09-26T01:31:18Zby Ficco, Massimo, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5090270">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information security handbook : develop a threat model and incident response strategy to build a strong information security frameworkent://SD_ILS/0/SD_ILS:11333812024-09-26T01:31:18Z2024-09-26T01:31:18Zby Death, Darren, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5183382">Click to View</a><br/>Format: Elektronik Kaynak<br/>Kali linux wireless penetration testing cookbook : identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless securityent://SD_ILS/0/SD_ILS:11334342024-09-26T01:31:18Z2024-09-26T01:31:18Zby Oriyano, Sean-Philip, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5188228">Click to View</a><br/>Format: Elektronik Kaynak<br/>Digital forensics with Kali Linux : perform data acquisition, digital investigation, and threat analysis using Kali Linux toolsent://SD_ILS/0/SD_ILS:11336512024-09-26T01:31:18Z2024-09-26T01:31:18Zby Parasram, Shiva V. N., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5207202">Click to View</a><br/>Format: Elektronik Kaynak<br/>ISO 37001 : an introduction to anti-bribery management systems : doing the right thingsent://SD_ILS/0/SD_ILS:11337112024-09-26T01:31:18Z2024-09-26T01:31:18Zby Field, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5211339">Click to View</a><br/>Format: Elektronik Kaynak<br/>Enterprise cloud security and governance : efficiently set data protection and privacy principlesent://SD_ILS/0/SD_ILS:11338402024-09-26T01:31:18Z2024-09-26T01:31:18Zby Vora, Zeal, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5216128">Click to View</a><br/>Format: Elektronik Kaynak<br/>Safety of web applications : risks, encryption and handling vulnerabilities with PHPent://SD_ILS/0/SD_ILS:11253102024-09-26T01:31:18Z2024-09-26T01:31:18Zby Quinton, Eric, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4840953">Click to View</a><br/>Format: Elektronik Kaynak<br/>Kali Linux intrusion and exploitation cookbook : over 70 recipes for system administrator or DevOps to master Kali Linux 2 and perform effective security assessmentent://SD_ILS/0/SD_ILS:11255492024-09-26T01:31:18Z2024-09-26T01:31:18Zby Shah, Dhruv, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4845574">Click to View</a><br/>Format: Elektronik Kaynak<br/>Applied network security : master the art of detecting and averting advanced network security attacks and techniquesent://SD_ILS/0/SD_ILS:11258302024-09-26T01:31:18Z2024-09-26T01:31:18Zby Salmon, Arthur, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4853051">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:11262122024-09-26T01:31:18Z2024-09-26T01:31:18Zby Vacca, John R., editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4858374">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security operations center guidebook : a practical guide for a successful SOCent://SD_ILS/0/SD_ILS:11264572024-09-26T01:31:18Z2024-09-26T01:31:18Zby Jarpey, Gregory , author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4862661">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybercrime and business : strategies for global corporate securityent://SD_ILS/0/SD_ILS:11265202024-09-26T01:31:18Z2024-09-26T01:31:18Zby Moskowitz, Sanford, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4863624">Click to View</a><br/>Format: Elektronik Kaynak<br/>Mastering Kali Linux for web penetration testing : test and evaluate all aspects of the design and implentationent://SD_ILS/0/SD_ILS:11277352024-09-26T01:31:18Z2024-09-26T01:31:18Zby McPhee, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4891263">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network forensicsent://SD_ILS/0/SD_ILS:11282472024-09-26T01:31:18Z2024-09-26T01:31:18Zby Messier, Ric, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4917496">Click to View</a><br/>Format: Elektronik Kaynak<br/>Mobile security and privacy : advances, challenges and future research directionsent://SD_ILS/0/SD_ILS:11182072024-09-26T01:31:18Z2024-09-26T01:31:18Zby Au, Man-Ho, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4689767">Click to View</a><br/>Format: Elektronik Kaynak<br/>Wireless communications security : solutions for the internet of thingsent://SD_ILS/0/SD_ILS:11182192024-09-26T01:31:18Z2024-09-26T01:31:18Zby Penttinen, Jyrki T. J., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4690021">Click to View</a><br/>Format: Elektronik Kaynak<br/>Advanced persistent threat : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategiesent://SD_ILS/0/SD_ILS:11200822024-09-26T01:31:18Z2024-09-26T01:31:18Zby Winkler, Ira, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4730826">Click to View</a><br/>Format: Elektronik Kaynak<br/>Loseless information : hiding in imagesent://SD_ILS/0/SD_ILS:11206462024-09-26T01:31:18Z2024-09-26T01:31:18Zby Lu, Zhe-Ming, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4743573">Click to View</a><br/>Format: Elektronik Kaynak<br/>IoT security issuesent://SD_ILS/0/SD_ILS:11235192024-09-26T01:31:18Z2024-09-26T01:31:18Zby Gilchrist, Alasdair, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4810138">Click to View</a><br/>Format: Elektronik Kaynak<br/>Advanced penetration testing : hacking the world's most secure networksent://SD_ILS/0/SD_ILS:11237222024-09-26T01:31:18Z2024-09-26T01:31:18Zby Allsopp, Wil, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4813145">Click to View</a><br/>Format: Elektronik Kaynak<br/>Windows forensics cookbook : 61 recipes to help you analyze windows systemsent://SD_ILS/0/SD_ILS:11286402024-09-26T01:31:18Z2024-09-26T01:31:18Zby Skulkin, Oleg, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4940232">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security in network functions virtualizationent://SD_ILS/0/SD_ILS:11319052024-09-26T01:31:18Z2024-09-26T01:31:18Zby Zhang, Zonghua, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5152998">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information hiding in communication networks : fundamentals, mechanisms, applications, and countermeasuresent://SD_ILS/0/SD_ILS:11076542024-09-26T01:31:18Z2024-09-26T01:31:18Zby Mazurczyk, Wojciech, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4405578">Click to View</a><br/>Format: Elektronik Kaynak<br/>Essential skills for hackersent://SD_ILS/0/SD_ILS:11045682024-09-26T01:31:18Z2024-09-26T01:31:18Zby Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4189281">Click to View</a><br/>Format: Elektronik Kaynak<br/>Building a corporate culture of security : strategies for strengthening organizational resiliencyent://SD_ILS/0/SD_ILS:11083492024-09-26T01:31:18Z2024-09-26T01:31:18Zby Sullivant, John, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4425984">Click to View</a><br/>Format: Elektronik Kaynak<br/>Malware diffusion models for modern complex networks : theory and applicationsent://SD_ILS/0/SD_ILS:11086842024-09-26T01:31:18Z2024-09-26T01:31:18Zby Karyotis, Vasileios, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4438752">Click to View</a><br/>Format: Elektronik Kaynak<br/>Windows registry forensics : advanced digital forensic analysis of the windows registryent://SD_ILS/0/SD_ILS:11086862024-09-26T01:31:18Z2024-09-26T01:31:18Zby Carvey, Harlan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4438754">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hiding behind the keyboard : uncovering covert communication methods with forensic analysisent://SD_ILS/0/SD_ILS:11090622024-09-26T01:31:18Z2024-09-26T01:31:18Zby Shavers, Brett, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4452264">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network performance and security : testing and analyzing using open source and low-cost toolsent://SD_ILS/0/SD_ILS:11090632024-09-26T01:31:18Z2024-09-26T01:31:18Zby Chapman, Chris, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4452265">Click to View</a><br/>Format: Elektronik Kaynak<br/>You : for sale protecting your personal data and privacy onlineent://SD_ILS/0/SD_ILS:10537572024-09-26T01:31:18Z2024-09-26T01:31:18Zby Sumner, Stuart, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2187472">Click to View</a><br/>Format: Elektronik Kaynak<br/>Advanced penetration testing for highly-secured environments.ent://SD_ILS/0/SD_ILS:11112142024-09-26T01:31:18Z2024-09-26T01:31:18Zby Allen, Lee, 1946- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4520648">Click to View</a><br/>Format: Elektronik Kaynak<br/>Dns security : defending the domain name systement://SD_ILS/0/SD_ILS:11132152024-09-26T01:31:18Z2024-09-26T01:31:18Zby Liska, Allan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4556898">Click to View</a><br/>Format: Elektronik Kaynak<br/>Data breach preparation and response : breaches are certain, impact is notent://SD_ILS/0/SD_ILS:11132162024-09-26T01:31:18Z2024-09-26T01:31:18Zby Fowler, Kevvie, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4556899">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber guerillaent://SD_ILS/0/SD_ILS:11132622024-09-26T01:31:18Z2024-09-26T01:31:18Zby Haaster, Jelle van, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4557157">Click to View</a><br/>Format: Elektronik Kaynak<br/>SSL and TLS : theory and practiceent://SD_ILS/0/SD_ILS:11243182024-09-26T01:31:18Z2024-09-26T01:31:18Zby Oppliger, Rolf, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4821279">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security and privacy in the digital era. Volume 1ent://SD_ILS/0/SD_ILS:11152702024-09-26T01:31:18Z2024-09-26T01:31:18Zby Guerrier, Claudine, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4648717">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security in fixed and wireless networksent://SD_ILS/0/SD_ILS:11155852024-09-26T01:31:18Z2024-09-26T01:31:18Zby Schäfer, Günter, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4658592">Click to View</a><br/>Format: Elektronik Kaynak<br/>Introduction to network security : theory and practiceent://SD_ILS/0/SD_ILS:11031222024-09-26T01:31:18Z2024-09-26T01:31:18Zby Wang, Jie, 1961- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040040">Click to View</a><br/>Format: Elektronik Kaynak<br/>The network security test lab : a step-by-step guideent://SD_ILS/0/SD_ILS:11031432024-09-26T01:31:18Z2024-09-26T01:31:18Zby Gregg, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040350">Click to View</a><br/>Format: Elektronik Kaynak<br/>Building an intelligence-led security programent://SD_ILS/0/SD_ILS:10425612024-09-26T01:31:18Z2024-09-26T01:31:18Zby Liska, Allan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1888751">Click to View</a><br/>Format: Elektronik Kaynak<br/>How to define and build an effective cyber threat intelligence capabilityent://SD_ILS/0/SD_ILS:10425652024-09-26T01:31:18Z2024-09-26T01:31:18Zby Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1888755">Click to View</a><br/>Format: Elektronik Kaynak<br/>How to defeat advanced malware : new tools for protection and forensicsent://SD_ILS/0/SD_ILS:10425662024-09-26T01:31:18Z2024-09-26T01:31:18Zby Dalziel, Max, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1888756">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security intelligence : a practitioner's guide to solving enterprise security challengesent://SD_ILS/0/SD_ILS:10427352024-09-26T01:31:18Z2024-09-26T01:31:18Zby Li, Qing, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1895130">Click to View</a><br/>Format: Elektronik Kaynak<br/>Beyond cybersecurity : protecting your digital businessent://SD_ILS/0/SD_ILS:10427752024-09-26T01:31:18Z2024-09-26T01:31:18Zby Kaplan, James M., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1895275">Click to View</a><br/>Format: Elektronik Kaynak<br/>Dissecting the hack : the V3rb0ten networkent://SD_ILS/0/SD_ILS:10530002024-09-26T01:31:18Z2024-09-26T01:31:18Zby Street, Jayson E., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2098440">Click to View</a><br/>Format: Elektronik Kaynak<br/>Web application security is a stack : how to CYA (Cover Your Apps) completelyent://SD_ILS/0/SD_ILS:10538362024-09-26T01:31:18Z2024-09-26T01:31:18Zby Vittie, Lori Mac, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192126">Click to View</a><br/>Format: Elektronik Kaynak<br/>Two-factor authenticationent://SD_ILS/0/SD_ILS:10495352024-09-26T01:31:18Z2024-09-26T01:31:18Zby Stanislav, Mark, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2048577">Click to View</a><br/>Format: Elektronik Kaynak<br/>Python passive network mapping : P2NMAPent://SD_ILS/0/SD_ILS:10505042024-09-26T01:31:18Z2024-09-26T01:31:18Zby Hosmer, Chet, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2068785">Click to View</a><br/>Format: Elektronik Kaynak<br/>The defendeŕs dilemma : charting a course toward cybersecurityent://SD_ILS/0/SD_ILS:10508522024-09-26T01:31:18Z2024-09-26T01:31:18Zby Libicki, Martin C., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2075897">Click to View</a><br/>Format: Elektronik Kaynak<br/>Zabbix network monitoring essentials : your one-stop solution to efficient network monitoring with zabbixent://SD_ILS/0/SD_ILS:10460482024-09-26T01:31:18Z2024-09-26T01:31:18Zby Vacche, Andrea Dalle, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1973849">Click to View</a><br/>Format: Elektronik Kaynak<br/>Learning iOS security : enhance the security of your iOS platform and applications using iOS-centric security techniquesent://SD_ILS/0/SD_ILS:10460592024-09-26T01:31:18Z2024-09-26T01:31:18Zby Banks, Allister, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1973863">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security technology convergence insightsent://SD_ILS/0/SD_ILS:10475052024-09-26T01:31:18Z2024-09-26T01:31:18Zby Bernard, Ray, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2008287">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking web intelligence : open source intelligence and web reconnaissance concepts and techniquesent://SD_ILS/0/SD_ILS:10478512024-09-26T01:31:18Z2024-09-26T01:31:18Zby Chauhan, Sudhanshu, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2025500">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computational network science : an algorithmic approachent://SD_ILS/0/SD_ILS:10381842024-09-26T01:31:18Z2024-09-26T01:31:18Zby Hexmoor, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1798312">Click to View</a><br/>Format: Elektronik Kaynak<br/>Managing online risk : apps, mobile, and social media securityent://SD_ILS/0/SD_ILS:10381762024-09-26T01:31:18Z2024-09-26T01:31:18Zby Gonzalez, Deborah, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1798304">Click to View</a><br/>Format: Elektronik Kaynak<br/>Understanding bitcoin : cryptography, engineering and economics.ent://SD_ILS/0/SD_ILS:10401802024-09-26T01:31:18Z2024-09-26T01:31:18Zby Franco, Pedro, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1823060">Click to View</a><br/>Format: Elektronik Kaynak<br/>PCI compliance : understand and implement effective PCI data security standard complianceent://SD_ILS/0/SD_ILS:10405702024-09-26T01:31:18Z2024-09-26T01:31:18Zby Williams, Branden R., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1832710">Click to View</a><br/>Format: Elektronik Kaynak<br/>Assessing information security : strategies, tactics, logic and frameworkent://SD_ILS/0/SD_ILS:10538342024-09-26T01:31:18Z2024-09-26T01:31:18Zby Vladimirov, A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192124">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking with Kali : practical penetration testing techniquesent://SD_ILS/0/SD_ILS:10076192024-09-26T01:31:18Z2024-09-26T01:31:18Zby Broad, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115177">Click to View</a><br/>Format: Elektronik Kaynak<br/>Business continuity and disaster recovery planning for IT professionalsent://SD_ILS/0/SD_ILS:10076202024-09-26T01:31:18Z2024-09-26T01:31:18Zby Snedaker, Susan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115178">Click to View</a><br/>Format: Elektronik Kaynak<br/>Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linuxent://SD_ILS/0/SD_ILS:10317372024-09-26T01:31:18Z2024-09-26T01:31:18Zby Buchanan, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1688607">Click to View</a><br/>Format: Elektronik Kaynak<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:10322662024-09-26T01:31:18Z2024-09-26T01:31:18Zby Andress, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1699255">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity for executives : a practical guideent://SD_ILS/0/SD_ILS:10325942024-09-26T01:31:18Z2024-09-26T01:31:18Zby Touhill, Gregory J., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1707094">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security architect : careers in information securityent://SD_ILS/0/SD_ILS:10330652024-09-26T01:31:18Z2024-09-26T01:31:18Zby Collins, Jon, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1713960">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber threat! : how to manage the growing risk of cyber attacksent://SD_ILS/0/SD_ILS:10342962024-09-26T01:31:18Z2024-09-26T01:31:18Zby Ulsch, N. MacDonnell, 1951- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1742833">Click to View</a><br/>Format: Elektronik Kaynak<br/>Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtuallyent://SD_ILS/0/SD_ILS:10281452024-09-26T01:31:18Z2024-09-26T01:31:18Zby Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1644005">Click to View</a><br/>Format: Elektronik Kaynak<br/>Learning pentesting for Android devices : a practical guide to learning penetration testing for Android devices and applicationsent://SD_ILS/0/SD_ILS:10281522024-09-26T01:31:18Z2024-09-26T01:31:18Zby Gupta, Aditya, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1644013">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer forensics with FTK : enhance your computer forensics knowledge through illustrations, tips, tricks, and practical real-world scenariosent://SD_ILS/0/SD_ILS:10291072024-09-26T01:31:18Z2024-09-26T01:31:18Zby Carbone, Fernando, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1657797">Click to View</a><br/>Format: Elektronik Kaynak<br/>Windows forensic analysis toolkit : advanced analysis techniques for Windows 8ent://SD_ILS/0/SD_ILS:10291622024-09-26T01:31:18Z2024-09-26T01:31:18Zby Carvey, Harlan A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1659012">Click to View</a><br/>Format: Elektronik Kaynak<br/>Targeted cyber attacks : multi-staged attacks driven by exploits and malwareent://SD_ILS/0/SD_ILS:10297842024-09-26T01:31:18Z2024-09-26T01:31:18Zby Sood, Aditya K., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1673591">Click to View</a><br/>Format: Elektronik Kaynak<br/>Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013ent://SD_ILS/0/SD_ILS:10350102024-09-26T01:31:18Z2024-09-26T01:31:18Zby Ginodman, Veniamin, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1752831">Click to View</a><br/>Format: Elektronik Kaynak<br/>Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanningent://SD_ILS/0/SD_ILS:10361782024-09-26T01:31:18Z2024-09-26T01:31:18Zby Hutchens, Justin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1771381">Click to View</a><br/>Format: Elektronik Kaynak<br/>Online security for the business travelerent://SD_ILS/0/SD_ILS:10362512024-09-26T01:31:18Z2024-09-26T01:31:18Zby Gonzalez, Deborah, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1772301">Click to View</a><br/>Format: Elektronik Kaynak<br/>Procuring penetration testing services.ent://SD_ILS/0/SD_ILS:10370852024-09-26T01:31:18Z2024-09-26T01:31:18Z<a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778766">Click to View</a><br/>Format: Elektronik Kaynak<br/>Integrated security systems design : a complete reference for building enterprise-wide digital security systemsent://SD_ILS/0/SD_ILS:10373432024-09-26T01:31:18Z2024-09-26T01:31:18Zby Norman, Thomas, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1781681">Click to View</a><br/>Format: Elektronik Kaynak<br/>Mastering metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approachent://SD_ILS/0/SD_ILS:10253642024-09-26T01:31:18Z2024-09-26T01:31:18Zby Jaswal, Nipun, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1593853">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security careers : skills, compensation, and career pathsent://SD_ILS/0/SD_ILS:10257032024-09-26T01:31:18Z2024-09-26T01:31:18Zby Walker, Stephen W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1598238">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber securityent://SD_ILS/0/SD_ILS:10257192024-09-26T01:31:18Z2024-09-26T01:31:18Zby Voeller, John G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1598809">Click to View</a><br/>Format: Elektronik Kaynak<br/>Communications and information infrastructure securityent://SD_ILS/0/SD_ILS:10257202024-09-26T01:31:18Z2024-09-26T01:31:18Zby Voeller, John G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1598810">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking point of sale : payment application secrets, threats, and solutionsent://SD_ILS/0/SD_ILS:10270462024-09-26T01:31:18Z2024-09-26T01:31:18Zby Gomzin, Slava.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629175">Click to View</a><br/>Format: Elektronik Kaynak<br/>Threat modeling : designing for securityent://SD_ILS/0/SD_ILS:10270482024-09-26T01:31:18Z2024-09-26T01:31:18Zby Shostack, Adam.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629177">Click to View</a><br/>Format: Elektronik Kaynak<br/>Critical infrastructure protectionent://SD_ILS/0/SD_ILS:10276372024-09-26T01:31:18Z2024-09-26T01:31:18Zby Edwards, Matthew, editor of compilation.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1637644">Click to View</a><br/>Format: Elektronik Kaynak<br/>Best practices in computer network defense : incident detection and responseent://SD_ILS/0/SD_ILS:10276412024-09-26T01:31:18Z2024-09-26T01:31:18Zby Hathaway, Melissa E., editor of compilation.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1637648">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network securityent://SD_ILS/0/SD_ILS:10385512024-09-26T01:31:18Z2024-09-26T01:31:18Zby Perez, Andre, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1800888">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber security and resiliency policy frameworkent://SD_ILS/0/SD_ILS:10398772024-09-26T01:31:18Z2024-09-26T01:31:18Zby Vaseashta, A. (Ashok), editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1818046">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity : managing systems, conducting testing, and investigating intrusionsent://SD_ILS/0/SD_ILS:10215162024-09-26T01:31:18Z2024-09-26T01:31:18Zby Mowbray, Thomas J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1481185">Click to View</a><br/>Format: Elektronik Kaynak<br/>The basics of IT audit : purposes, processes, and practical informationent://SD_ILS/0/SD_ILS:10227292024-09-26T01:31:18Z2024-09-26T01:31:18Zby Gantz, Stephen D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1550527">Click to View</a><br/>Format: Elektronik Kaynak<br/>The basics of digital privacy : simple tools to protect your personal information and your identity onlineent://SD_ILS/0/SD_ILS:10235692024-09-26T01:31:18Z2024-09-26T01:31:18Zby Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1573362">Click to View</a><br/>Format: Elektronik Kaynak<br/>Applied network security monitoring : collection, detection, and analysisent://SD_ILS/0/SD_ILS:10236592024-09-26T01:31:18Z2024-09-26T01:31:18Zby Sanders, Chris, 1986-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1574451">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network and system securityent://SD_ILS/0/SD_ILS:10185012024-09-26T01:31:18Z2024-09-26T01:31:18Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1364061">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber security and IT infrastructure protectionent://SD_ILS/0/SD_ILS:10189412024-09-26T01:31:18Z2024-09-26T01:31:18Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1377640">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cryptography for security and privacy in cloud computingent://SD_ILS/0/SD_ILS:10209882024-09-26T01:31:18Z2024-09-26T01:31:18Zby Rass, Stefan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1463547">Click to View</a><br/>Format: Elektronik Kaynak<br/>Biohackers the politics of open scienceent://SD_ILS/0/SD_ILS:10882072024-09-26T01:31:18Z2024-09-26T01:31:18Zby Delfanti, Alessandro.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3386719">Click to View</a><br/>Format: Elektronik Kaynak<br/>Mobile access safety beyond BYODent://SD_ILS/0/SD_ILS:10084142024-09-26T01:31:18Z2024-09-26T01:31:18Zby Assing, Dominique.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1124007">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network intrusion analysis methodologies, tools, and techniques for incident analysis and responseent://SD_ILS/0/SD_ILS:10033762024-09-26T01:31:18Z2024-09-26T01:31:18Zby Fichera, Joe, 1966-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1058152">Click to View</a><br/>Format: Elektronik Kaynak<br/>UTM security with Fortinet Mastering FortiOSent://SD_ILS/0/SD_ILS:10034962024-09-26T01:31:18Z2024-09-26T01:31:18Zby Tam, Kenneth.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1068442">Click to View</a><br/>Format: Elektronik Kaynak<br/>Advanced persistent threat understanding the danger and how to protect your organizationent://SD_ILS/0/SD_ILS:10039212024-09-26T01:31:18Z2024-09-26T01:31:18Zby Cole, Eric.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073020">Click to View</a><br/>Format: Elektronik Kaynak<br/>The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practiceent://SD_ILS/0/SD_ILS:10039262024-09-26T01:31:18Z2024-09-26T01:31:18Zby Winterfeld, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073026">Click to View</a><br/>Format: Elektronik Kaynak<br/>Federated identity primerent://SD_ILS/0/SD_ILS:10046722024-09-26T01:31:18Z2024-09-26T01:31:18Zby Rountree, Derrick.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1081145">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking for dummiesent://SD_ILS/0/SD_ILS:10062512024-09-26T01:31:18Z2024-09-26T01:31:18Zby Beaver, Kevin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1106542">Click to View</a><br/>Format: Elektronik Kaynak<br/>Web application defender's cookbook battling hackers and protecting usersent://SD_ILS/0/SD_ILS:10066272024-09-26T01:31:18Z2024-09-26T01:31:18Zby Barnett, Ryan C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108733">Click to View</a><br/>Format: Elektronik Kaynak<br/>Windows 2012 server network security securing your windows network systems and infrastructureent://SD_ILS/0/SD_ILS:10076102024-09-26T01:31:18Z2024-09-26T01:31:18Zby Rountree, Derrick.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115160">Click to View</a><br/>Format: Elektronik Kaynak<br/>Practical anonymity hiding in plain sight onlineent://SD_ILS/0/SD_ILS:10076142024-09-26T01:31:18Z2024-09-26T01:31:18Zby Loshin, Peter.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115167">Click to View</a><br/>Format: Elektronik Kaynak<br/>Professional penetration testing creating and learning in a hacking labent://SD_ILS/0/SD_ILS:10076162024-09-26T01:31:18Z2024-09-26T01:31:18Zby Wilhelm, Thomas.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115172">Click to View</a><br/>Format: Elektronik Kaynak<br/>Applied cyber security and the smart grid implementing security controls into the modern power infrastructureent://SD_ILS/0/SD_ILS:10076262024-09-26T01:31:18Z2024-09-26T01:31:18Zby Knapp, Eric D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115187">Click to View</a><br/>Format: Elektronik Kaynak<br/>Iris biometric model for secured network accessent://SD_ILS/0/SD_ILS:10124792024-09-26T01:31:18Z2024-09-26T01:31:18Zby Khoury, Franjieh El.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1177222">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:10141912024-09-26T01:31:18Z2024-09-26T01:31:18Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1195617">Click to View</a><br/>Format: Elektronik Kaynak<br/>The benefits and security risks of web-based applications for business trend reportent://SD_ILS/0/SD_ILS:10147332024-09-26T01:31:18Z2024-09-26T01:31:18Zby Kotwica, Kathleen.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1210948">Click to View</a><br/>Format: Elektronik Kaynak<br/>Digital whoness identity, privacy and freedom in the cyberworldent://SD_ILS/0/SD_ILS:10150682024-09-26T01:31:18Z2024-09-26T01:31:18Zby Capurro, Rafael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1215540">Click to View</a><br/>Format: Elektronik Kaynak<br/>Automatic defense against zero-day polymorphic worms in communication networksent://SD_ILS/0/SD_ILS:10152612024-09-26T01:31:18Z2024-09-26T01:31:18Zby Mohammed, Mohssen, 1982- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1220106">Click to View</a><br/>Format: Elektronik Kaynak<br/>The basics of web hacking tools and techniques to attack the Webent://SD_ILS/0/SD_ILS:10155452024-09-26T01:31:18Z2024-09-26T01:31:18Zby Pauli, Joshua J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1222592">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security patterns in practice : designing secure architectures using software patternsent://SD_ILS/0/SD_ILS:10158112024-09-26T01:31:18Z2024-09-26T01:31:18Zby Fernandez, Eduardo B., 1936- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1245159">Click to View</a><br/>Format: Elektronik Kaynak<br/>Instant Spring Security starter learn the fundamentals of web authentication and authorization using Spring Securityent://SD_ILS/0/SD_ILS:10162682024-09-26T01:31:18Z2024-09-26T01:31:18Zby Jagielski, Piotr.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1274894">Click to View</a><br/>Format: Elektronik Kaynak<br/>SolarWinds Server & Application Monitor : deployment and administration : an intuitive guide to implementing and calibrating SolarWinds Server & Application Monitor with minimum hassleent://SD_ILS/0/SD_ILS:10246212024-09-26T01:31:18Z2024-09-26T01:31:18Zby Brant, Justin M.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1582950">Click to View</a><br/>Format: Elektronik Kaynak<br/>Spring Security 3.x cookbookent://SD_ILS/0/SD_ILS:10223042024-09-26T01:31:18Z2024-09-26T01:31:18Zby Mankale, Anjana.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1532014">Click to View</a><br/>Format: Elektronik Kaynak<br/>The practice of network security monitoring : understanding incident detection and responseent://SD_ILS/0/SD_ILS:10234572024-09-26T01:31:18Z2024-09-26T01:31:18Zby Bejtlich, Richard.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572876">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security risks in social media technologies : safe practices in public service applicationsent://SD_ILS/0/SD_ILS:10237762024-09-26T01:31:18Z2024-09-26T01:31:18Zby Oxley, Alan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1574994">Click to View</a><br/>Format: Elektronik Kaynak<br/>Data visualization. Part 2ent://SD_ILS/0/SD_ILS:10242062024-09-26T01:31:18Z2024-09-26T01:31:18Zby Assam, Tarek.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1579356">Click to View</a><br/>Format: Elektronik Kaynak<br/>American exceptionalism, the French exception, and digital media lawent://SD_ILS/0/SD_ILS:10183522024-09-26T01:31:18Z2024-09-26T01:31:18Zby Eko, Lyombe.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1358660">Click to View</a><br/>Format: Elektronik Kaynak<br/>Microsoft DirectAccess best practices and troubleshootingent://SD_ILS/0/SD_ILS:10192612024-09-26T01:31:18Z2024-09-26T01:31:18Zby Krause, Jordan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1389355">Click to View</a><br/>Format: Elektronik Kaynak<br/>IBM mainframe security beyond the basics : a practical guide from a z/OS and RACF perspectiveent://SD_ILS/0/SD_ILS:10198782024-09-26T01:31:18Z2024-09-26T01:31:18Zby Dattani, Dinesh D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1411689">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information protection playbookent://SD_ILS/0/SD_ILS:10199902024-09-26T01:31:18Z2024-09-26T01:31:18Zby Kane, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1418381">Click to View</a><br/>Format: Elektronik Kaynak<br/>Web penetration testing with Kali Linux : a practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linuxent://SD_ILS/0/SD_ILS:10200472024-09-26T01:31:18Z2024-09-26T01:31:18Zby Muniz, Joseph.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1420531">Click to View</a><br/>Format: Elektronik Kaynak<br/>What should go on the internet? : privacy, freedom, and security onlineent://SD_ILS/0/SD_ILS:11118342024-09-26T01:31:18Z2024-09-26T01:31:18Zby Engel, Mary, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4533280">Click to View</a><br/>Format: Elektronik Kaynak<br/>Advances in cyber security : technology, operations, and experiencesent://SD_ILS/0/SD_ILS:11232472024-09-26T01:31:18Z2024-09-26T01:31:18Zby Hsu, D. Frank (Derbiau Frank), 1948- editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4803841">Click to View</a><br/>Format: Elektronik Kaynak<br/>Wiki at war conflict in a socially networked worldent://SD_ILS/0/SD_ILS:10630162024-09-26T01:31:18Z2024-09-26T01:31:18Zby Carafano, James Jay, 1955-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3038033">Click to View</a><br/>Format: Elektronik Kaynak<br/>PCI compliance understand and implement effective PCI data security standard complianceent://SD_ILS/0/SD_ILS:9996312024-09-26T01:31:18Z2024-09-26T01:31:18Zby Williams, Branden R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=989201">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking web apps detecting and preventing web application security problemsent://SD_ILS/0/SD_ILS:10003712024-09-26T01:31:18Z2024-09-26T01:31:18Zby Shema, Mike.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1012529">Click to View</a><br/>Format: Elektronik Kaynak<br/>SQL injection attacks and defenseent://SD_ILS/0/SD_ILS:9972872024-09-26T01:31:18Z2024-09-26T01:31:18Zby Clarke, Justin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=953188">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber conflict competing national perspectivesent://SD_ILS/0/SD_ILS:10085102024-09-26T01:31:18Z2024-09-26T01:31:18Zby Ventre, Daniel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1124641">Click to View</a><br/>Format: Elektronik Kaynak<br/>The tangled Web a guide to securing modern Web applicationsent://SD_ILS/0/SD_ILS:10099762024-09-26T01:31:18Z2024-09-26T01:31:18Zby Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137574">Click to View</a><br/>Format: Elektronik Kaynak<br/>Client-side attacks and defenseent://SD_ILS/0/SD_ILS:10019052024-09-26T01:31:18Z2024-09-26T01:31:18Zby Shimonski, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1036349">Click to View</a><br/>Format: Elektronik Kaynak<br/>Mastering windows network forensics and investigationent://SD_ILS/0/SD_ILS:9865492024-09-26T01:31:18Z2024-09-26T01:31:18Zby Anson, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=818114">Click to View</a><br/>Format: Elektronik Kaynak<br/>Asset protection through security awarenessent://SD_ILS/0/SD_ILS:9874512024-09-26T01:31:18Z2024-09-26T01:31:18Zby Speed, Tyler Justin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826927">Click to View</a><br/>Format: Elektronik Kaynak<br/>Data mining tools for malware detectionent://SD_ILS/0/SD_ILS:9874612024-09-26T01:31:18Z2024-09-26T01:31:18Zby Masud, Mehedy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826949">Click to View</a><br/>Format: Elektronik Kaynak<br/>Windows forensic analysis toolkit advanced analysis techniques for Windows 7ent://SD_ILS/0/SD_ILS:9899252024-09-26T01:31:18Z2024-09-26T01:31:18Zby Carvey, Harlan A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=850700">Click to View</a><br/>Format: Elektronik Kaynak<br/>A multidisciplinary introduction to information securityent://SD_ILS/0/SD_ILS:10284162024-09-26T01:31:18Z2024-09-26T01:31:18Zby Mjølsnes, Stig F., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1648315">Click to View</a><br/>Format: Elektronik Kaynak<br/>Wars of disruption and resilience cybered conflict, power, and national securityent://SD_ILS/0/SD_ILS:10633432024-09-26T01:31:18Z2024-09-26T01:31:18Zby Demchak, Chris C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3039013">Click to View</a><br/>Format: Elektronik Kaynak<br/>IBM WebSphere application server V7.0 security secure your WebSphere applications with Java EE and JAAS security standardsent://SD_ILS/0/SD_ILS:9962602024-09-26T01:31:18Z2024-09-26T01:31:18Zby Siliceo, Omar.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=943983">Click to View</a><br/>Format: Elektronik Kaynak<br/>Moodle security learn how to install and configure Moodle in the most secure way possibleent://SD_ILS/0/SD_ILS:9962652024-09-26T01:31:18Z2024-09-26T01:31:18Zby Miletić, Darko.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=943988">Click to View</a><br/>Format: Elektronik Kaynak<br/>WordPress 3 ultimate security protect your WordPress site and its networkent://SD_ILS/0/SD_ILS:9967892024-09-26T01:31:18Z2024-09-26T01:31:18Zby Connelly, Olly.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948509">Click to View</a><br/>Format: Elektronik Kaynak<br/>Oracle Identity and Access Manager 11g for administrators administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasksent://SD_ILS/0/SD_ILS:9968352024-09-26T01:31:18Z2024-09-26T01:31:18Zby Kumar, Atul.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948559">Click to View</a><br/>Format: Elektronik Kaynak<br/>Microsoft Forefront UAG 2010 administrator's handbook take full command of Microsoft Forefront Unified Access Gateway to secure your business applications and provide dynamic remote access with DirectAccessent://SD_ILS/0/SD_ILS:9968442024-09-26T01:31:18Z2024-09-26T01:31:18Zby Ben-Ari, Erez.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948568">Click to View</a><br/>Format: Elektronik Kaynak<br/>BackTrack 4 assuring security by penetration testing : master the art of penetration testing with BackTrackent://SD_ILS/0/SD_ILS:9969682024-09-26T01:31:18Z2024-09-26T01:31:18Zby Ali, Shakeel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=950518">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security risk management building an information security risk management program from the ground upent://SD_ILS/0/SD_ILS:9768042024-09-26T01:31:18Z2024-09-26T01:31:18Zby Wheeler, Evan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=685406">Click to View</a><br/>Format: Elektronik Kaynak<br/>Securing the cloud cloud computer security techniques and tacticsent://SD_ILS/0/SD_ILS:9770552024-09-26T01:31:18Z2024-09-26T01:31:18Zby Winkler, J. R. (Joachim R.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=686827">Click to View</a><br/>Format: Elektronik Kaynak<br/>PCI DSS : a practical guide to implementing and maintaining complianceent://SD_ILS/0/SD_ILS:9787242024-09-26T01:31:18Z2024-09-26T01:31:18Zby Wright, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=699178">Click to View</a><br/>Format: Elektronik Kaynak<br/>CMS security handbook the comprehensive guide for WordPress, Joomla!, Drupal, and Ploneent://SD_ILS/0/SD_ILS:9790052024-09-26T01:31:18Z2024-09-26T01:31:18Zby Canavan, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706893">Click to View</a><br/>Format: Elektronik Kaynak<br/>Implementing SSL/TLS using cryptography and PKIent://SD_ILS/0/SD_ILS:9790072024-09-26T01:31:18Z2024-09-26T01:31:18Zby Davies, Joshua Dennis.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706899">Click to View</a><br/>Format: Elektronik Kaynak<br/>Web commerce security design and developmentent://SD_ILS/0/SD_ILS:9789752024-09-26T01:31:18Z2024-09-26T01:31:18Zby Nahari, Hadi.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706729">Click to View</a><br/>Format: Elektronik Kaynak<br/>Intrusion detection a machine learning approachent://SD_ILS/0/SD_ILS:9811612024-09-26T01:31:18Z2024-09-26T01:31:18Zby Tsai, Jeffrey J.-P.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=737642">Click to View</a><br/>Format: Elektronik Kaynak<br/>Use of risk analysis in computer-aided persuasionent://SD_ILS/0/SD_ILS:9883622024-09-26T01:31:18Z2024-09-26T01:31:18Zby Duman, Ekrem.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=836226">Click to View</a><br/>Format: Elektronik Kaynak<br/>Client-Honeypots : exploring malicious websitesent://SD_ILS/0/SD_ILS:10177762024-09-26T01:31:18Z2024-09-26T01:31:18Zby Göbel, Jan Gerrit, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1348689">Click to View</a><br/>Format: Elektronik Kaynak<br/>Securing the cloud cloud computer security techniques and tacticsent://SD_ILS/0/SD_ILS:1372012024-09-26T01:31:18Z2024-09-26T01:31:18Zby Winkler, J. R. (Joachim R.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format: Elektronik Kaynak<br/>The basics of information security understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:1335922024-09-26T01:31:18Z2024-09-26T01:31:18Zby Andress, Jason.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Elektronik Kaynak<br/>Security for service oriented systemsent://SD_ILS/0/SD_ILS:9723452024-09-26T01:31:18Z2024-09-26T01:31:18Zby Thuraisingham, Bhavani M.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=631696">Click to View</a><br/>Format: Elektronik Kaynak<br/>Identity management concepts, technologies, and systemsent://SD_ILS/0/SD_ILS:9725072024-09-26T01:31:18Z2024-09-26T01:31:18Zby Bertino, Elisa.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=634511">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer Forensics jumpstartent://SD_ILS/0/SD_ILS:9736802024-09-26T01:31:18Z2024-09-26T01:31:18Zby Solomon, Michael R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=661659">Click to View</a><br/>Format: Elektronik Kaynak<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:11838152024-09-26T01:31:18Z2024-09-26T01:31:18Zby Andress, Jason.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496537">https://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Elektronik Kaynak<br/>Cyber warfare : techniques, tactics and tools for security practitionersent://SD_ILS/0/SD_ILS:11838162024-09-26T01:31:18Z2024-09-26T01:31:18Zby Andress, Jason.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496377">http://www.sciencedirect.com/science/book/9781597496377</a><br/>Format: Elektronik Kaynak<br/>Windows Registry Forensics : Advanced Digital Forensic Analysis of the Windows Registry.ent://SD_ILS/0/SD_ILS:11835262024-09-26T01:31:18Z2024-09-26T01:31:18Zby Carvey, Harlan.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495806">https://www.sciencedirect.com/science/book/9781597495806</a><br/>Format: Elektronik Kaynak<br/>Securing the cloud : cloud computer security techniques and tacticsent://SD_ILS/0/SD_ILS:11837432024-09-26T01:31:18Z2024-09-26T01:31:18Zby Winkler, J. R. (Joachim R.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format: Elektronik Kaynak<br/>Security in ad hoc and sensor networksent://SD_ILS/0/SD_ILS:10302542024-09-26T01:31:18Z2024-09-26T01:31:18Zby Beyah, Raheem (Raheem A.), 1976-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1679353">Click to View</a><br/>Format: Elektronik Kaynak<br/>Managing information securityent://SD_ILS/0/SD_ILS:10183422024-09-26T01:31:18Z2024-09-26T01:31:18Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1357643">Click to View</a><br/>Format: Elektronik Kaynak<br/>IT audit, control, and securityent://SD_ILS/0/SD_ILS:9721352024-09-26T01:31:18Z2024-09-26T01:31:18Zby Moeller, Robert R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=624573">Click to View</a><br/>Format: Elektronik Kaynak<br/>Adaptive security management architectureent://SD_ILS/0/SD_ILS:9722382024-09-26T01:31:18Z2024-09-26T01:31:18Zby Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=625004">Click to View</a><br/>Format: Elektronik Kaynak<br/>Mac security bibleent://SD_ILS/0/SD_ILS:9603772024-09-26T01:31:18Z2024-09-26T01:31:18Zby Kissell, Joe.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=477803">Click to View</a><br/>Format: Elektronik Kaynak<br/>PCI compliance : understand and implement effective PCI data security standard compliance.ent://SD_ILS/0/SD_ILS:11774802024-09-26T01:31:18Z2024-09-26T01:31:18Zby Chuvakin, Anton.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494991">http://www.sciencedirect.com/science/book/9781597494991</a><br/>Format: Elektronik Kaynak<br/>Seven deadliest web application attacksent://SD_ILS/0/SD_ILS:11775022024-09-26T01:31:18Z2024-09-26T01:31:18Zby Shema, Mike.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495431">http://www.sciencedirect.com/science/book/9781597495431</a><br/>Format: Elektronik Kaynak<br/>Seven deadliest wireless technologies attacksent://SD_ILS/0/SD_ILS:11780192024-09-26T01:31:18Z2024-09-26T01:31:18Zby Haines, Brad.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495417">https://www.sciencedirect.com/science/book/9781597495417</a><br/>Format: Elektronik Kaynak<br/>Seven deadliest USB attacksent://SD_ILS/0/SD_ILS:11780202024-09-26T01:31:18Z2024-09-26T01:31:18Zby Anderson, Brian (Brian James)<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495530">https://www.sciencedirect.com/science/book/9781597495530</a><br/>Format: Elektronik Kaynak<br/>Seven deadliest social network attacksent://SD_ILS/0/SD_ILS:11780312024-09-26T01:31:18Z2024-09-26T01:31:18Zby Timm, Carl.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495455">https://www.sciencedirect.com/science/book/9781597495455</a><br/>Format: Elektronik Kaynak<br/>Seven deadliest network attacksent://SD_ILS/0/SD_ILS:11780322024-09-26T01:31:18Z2024-09-26T01:31:18Zby Prowell, Stacy J.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495493">https://www.sciencedirect.com/science/book/9781597495493</a><br/>Format: Elektronik Kaynak<br/>Dissecting the hack : the forb1dd3n networkent://SD_ILS/0/SD_ILS:11813792024-09-26T01:31:18Z2024-09-26T01:31:18Zby Street, Jayson E.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495684">https://www.sciencedirect.com/science/book/9781597495684</a><br/>Format: Elektronik Kaynak<br/>Advances in computers. Volume 79ent://SD_ILS/0/SD_ILS:11756682024-09-26T01:31:18Z2024-09-26T01:31:18Zby Zelkowitz, Marvin V., 1945-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123810274">https://www.sciencedirect.com/science/book/9780123810274</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/bookseries/00652458/79">https://www.sciencedirect.com/science/bookseries/00652458/79</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/issue/25777-2010-999209999-1783761">https://www.sciencedirect.com/science/issue/25777-2010-999209999-1783761</a><br/>Format: Elektronik Kaynak<br/>Professional penetration testing : creating and operating a formal hacking labent://SD_ILS/0/SD_ILS:11930162024-09-26T01:31:18Z2024-09-26T01:31:18Zby Wilhelm, Thomas.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494250">https://www.sciencedirect.com/science/book/9781597494250</a><br/>Format: Elektronik Kaynak<br/>SSL and TLS theory and practiceent://SD_ILS/0/SD_ILS:9965712024-09-26T01:31:18Z2024-09-26T01:31:18Zby Oppliger, Rolf.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=946557">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:9556372024-09-26T01:31:18Z2024-09-26T01:31:18Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=453166">Click to View</a><br/>Format: Elektronik Kaynak<br/>Unauthorised access physical penetration testing for IT security teamsent://SD_ILS/0/SD_ILS:9587762024-09-26T01:31:18Z2024-09-26T01:31:18Zby Allsopp, Wil.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=470412">Click to View</a><br/>Format: Elektronik Kaynak<br/>Next generation SSH2 implementation : securing data in motionent://SD_ILS/0/SD_ILS:11917632024-09-26T01:31:18Z2024-09-26T01:31:18Zby Liu, Dale.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492836">https://www.sciencedirect.com/science/book/9781597492836</a><br/>Format: Elektronik Kaynak<br/>GFI network security and PCI compliance power toolsent://SD_ILS/0/SD_ILS:11918272024-09-26T01:31:18Z2024-09-26T01:31:18Zby Posey, Brien.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492850">https://www.sciencedirect.com/science/book/9781597492850</a><br/>Format: Elektronik Kaynak<br/>Disappearing cryptography : information hiding : steganography & watermarkingent://SD_ILS/0/SD_ILS:11920502024-09-26T01:31:18Z2024-09-26T01:31:18Zby Wayner, Peter, 1964-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123744791">https://www.sciencedirect.com/science/book/9780123744791</a><br/>Format: Elektronik Kaynak<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:11925942024-09-26T01:31:18Z2024-09-26T01:31:18Zby Vacca, John R.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123743541">https://www.sciencedirect.com/science/book/9780123743541</a><br/>Format: Elektronik Kaynak<br/>Cisco router and switch forensics : investigating and analyzing malicious network activityent://SD_ILS/0/SD_ILS:11928002024-09-26T01:31:18Z2024-09-26T01:31:18Zby Liu, Dale.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494182">https://www.sciencedirect.com/science/book/9781597494182</a><br/>Format: Elektronik Kaynak<br/>Joomla! web security secure your Joomla! website from common security threats with this easy-to-use guideent://SD_ILS/0/SD_ILS:9987812024-09-26T01:31:18Z2024-09-26T01:31:18Zby Canavan, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=978105">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking the art of exploitationent://SD_ILS/0/SD_ILS:10099552024-09-26T01:31:18Z2024-09-26T01:31:18Zby Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137538">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information assurance dependability and security in networked systemsent://SD_ILS/0/SD_ILS:9440162024-09-26T01:31:18Z2024-09-26T01:31:18Zby Qian, Yi, 1962-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328312">Click to View</a><br/>Format: Elektronik Kaynak<br/>IT compliance and controls best practices for implementationent://SD_ILS/0/SD_ILS:9450512024-09-26T01:31:18Z2024-09-26T01:31:18Zby DeLuccia, James J., 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=335724">Click to View</a><br/>Format: Elektronik Kaynak<br/>Secure computer and network systems modeling, analysis and designent://SD_ILS/0/SD_ILS:9463852024-09-26T01:31:18Z2024-09-26T01:31:18Zby Ye, Nong.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=351427">Click to View</a><br/>Format: Elektronik Kaynak<br/>Implementing 802.1X security solutions for wired and wireless networksent://SD_ILS/0/SD_ILS:9465792024-09-26T01:31:18Z2024-09-26T01:31:18Zby Geier, James T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=353449">Click to View</a><br/>Format: Elektronik Kaynak<br/>Implementing NAP and NAC security technologies the complete guide to network access controlent://SD_ILS/0/SD_ILS:9465832024-09-26T01:31:18Z2024-09-26T01:31:18Zby Hoffman, Daniel (Daniel V.), 1972-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=353459">Click to View</a><br/>Format: Elektronik Kaynak<br/>Practical embedded security building secure resource-constrained systemsent://SD_ILS/0/SD_ILS:9425072024-09-26T01:31:18Z2024-09-26T01:31:18Zby Stapko, Timothy John.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=312846">Click to View</a><br/>Format: Elektronik Kaynak<br/>Trust and security in collaborative computingent://SD_ILS/0/SD_ILS:10302552024-09-26T01:31:18Z2024-09-26T01:31:18Zby Zou, Xukai, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1679354">Click to View</a><br/>Format: Elektronik Kaynak<br/>Securing information and communications systems principles, technologies, and applicationsent://SD_ILS/0/SD_ILS:9563262024-09-26T01:31:18Z2024-09-26T01:31:18Zby Furnell, Steven, 1970-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456881">Click to View</a><br/>Format: Elektronik Kaynak<br/>Fuzzing for software security testing and quality assuranceent://SD_ILS/0/SD_ILS:9563292024-09-26T01:31:18Z2024-09-26T01:31:18Zby Takanen, Ari.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456884">Click to View</a><br/>Format: Elektronik Kaynak<br/>Aspects of network and information securityent://SD_ILS/0/SD_ILS:9471472024-09-26T01:31:18Z2024-09-26T01:31:18Zby NATO Advanced Study Institute on Network Security and Intrusion Detection (2005 : Yerevan, Armenia)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=363205">Click to View</a><br/>Format: Elektronik Kaynak<br/>Google hacking for penetration testers. Volume 2ent://SD_ILS/0/SD_ILS:11891022024-09-26T01:31:18Z2024-09-26T01:31:18Zby Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491761">https://www.sciencedirect.com/science/book/9781597491761</a><br/>Format: Elektronik Kaynak<br/>How to cheat at securing Linuxent://SD_ILS/0/SD_ILS:11891062024-09-26T01:31:18Z2024-09-26T01:31:18Zby Krishnamurthy Madwachar, Mohan.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492072">https://www.sciencedirect.com/science/book/9781597492072</a><br/>Format: Elektronik Kaynak<br/>Microsoft forefront security administration guideent://SD_ILS/0/SD_ILS:11891202024-09-26T01:31:18Z2024-09-26T01:31:18Zby Varsalone, Jesse.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492447">https://www.sciencedirect.com/science/book/9781597492447</a><br/>Format: Elektronik Kaynak<br/>Practical embedded security : building secure resource-constrained systemsent://SD_ILS/0/SD_ILS:11891682024-09-26T01:31:18Z2024-09-26T01:31:18Zby Stapko, Timothy John.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780750682152">https://www.sciencedirect.com/science/book/9780750682152</a><br/>Format: Elektronik Kaynak<br/>Information assurance : dependability and security in networked systemsent://SD_ILS/0/SD_ILS:11891952024-09-26T01:31:18Z2024-09-26T01:31:18Zby Qian, Yi, 1962-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123735669">https://www.sciencedirect.com/science/book/9780123735669</a><br/>Format: Elektronik Kaynak<br/>Network security : know it allent://SD_ILS/0/SD_ILS:11892572024-09-26T01:31:18Z2024-09-26T01:31:18Zby Joshi, James B. D.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123744630">http://www.sciencedirect.com/science/book/9780123744630</a><br/>Format: Elektronik Kaynak<br/>OSSEC host-based intrusion detection guideent://SD_ILS/0/SD_ILS:11896202024-09-26T01:31:18Z2024-09-26T01:31:18Zby Hay, Andrew.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492409">http://www.sciencedirect.com/science/book/9781597492409</a><br/>Format: Elektronik Kaynak<br/>Integrating ISA Server 2006 with Microsoft Exchange 2007ent://SD_ILS/0/SD_ILS:11896502024-09-26T01:31:18Z2024-09-26T01:31:18Zby Strachan, Fergus.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492751">http://www.sciencedirect.com/science/book/9781597492751</a><br/>Format: Elektronik Kaynak<br/>Kismet hackingent://SD_ILS/0/SD_ILS:11896512024-09-26T01:31:18Z2024-09-26T01:31:18Zby Haines, Brad.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491174">http://www.sciencedirect.com/science/book/9781597491174</a><br/>Format: Elektronik Kaynak<br/>Scene of the cybercrime.ent://SD_ILS/0/SD_ILS:11896652024-09-26T01:31:18Z2024-09-26T01:31:18Zby Cross, Michael, 1965-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492768">https://www.sciencedirect.com/science/book/9781597492768</a><br/>Format: Elektronik Kaynak<br/>Netcat power toolsent://SD_ILS/0/SD_ILS:11897042024-09-26T01:31:18Z2024-09-26T01:31:18Zby Kanclirz, Jan.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492577">https://www.sciencedirect.com/science/book/9781597492577</a><br/>Format: Elektronik Kaynak<br/>Toward a safer and more secure cyberspaceent://SD_ILS/0/SD_ILS:10854522024-09-26T01:31:18Z2024-09-26T01:31:18Zby Goodman, Seymour E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3378311">Click to View</a><br/>Format: Elektronik Kaynak<br/>The misuse of information systems the impact of security countermeasuresent://SD_ILS/0/SD_ILS:10580442024-09-26T01:31:18Z2024-09-26T01:31:18Zby D'Arcy, John P., 1975-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3016826">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security data visualization graphical techniques for network analysisent://SD_ILS/0/SD_ILS:10584542024-09-26T01:31:18Z2024-09-26T01:31:18Zby Conti, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3017625">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network security assessment from vulnerability to patchent://SD_ILS/0/SD_ILS:9370382024-09-26T01:31:18Z2024-09-26T01:31:18Zby Manzuik, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=280219">Click to View</a><br/>Format: Elektronik Kaynak<br/>Integrated security systems design concepts, specifications, and implementationent://SD_ILS/0/SD_ILS:9382982024-09-26T01:31:18Z2024-09-26T01:31:18Zby Norman, Thomas L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=287955">Click to View</a><br/>Format: Elektronik Kaynak<br/>Developer's guide to web application securityent://SD_ILS/0/SD_ILS:9385212024-09-26T01:31:18Z2024-09-26T01:31:18Zby Cross, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=289735">Click to View</a><br/>Format: Elektronik Kaynak<br/>Windows forensic analysis DVD toolkit,ent://SD_ILS/0/SD_ILS:9440762024-09-26T01:31:18Z2024-09-26T01:31:18Zby Carvey, Harlan A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328624">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security in distributed and networking systemsent://SD_ILS/0/SD_ILS:10138972024-09-26T01:31:18Z2024-09-26T01:31:18Zby Pan, Yi, 1960-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1193126">Click to View</a><br/>Format: Elektronik Kaynak<br/>Techno security's guide to e-discovery and digital forensicsent://SD_ILS/0/SD_ILS:9480152024-09-26T01:31:18Z2024-09-26T01:31:18Zby Wiles, Jack.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=405426">Click to View</a><br/>Format: Elektronik Kaynak<br/>Asterisk hacking.ent://SD_ILS/0/SD_ILS:11885822024-09-26T01:31:18Z2024-09-26T01:31:18Zby Brashars, Joshua.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491518">http://www.sciencedirect.com/science/book/9781597491518</a><br/>Format: Elektronik Kaynak<br/>Snort : IDS and IPS toolkitent://SD_ILS/0/SD_ILS:11882712024-09-26T01:31:18Z2024-09-26T01:31:18Zby Beale, Jay.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490993">https://www.sciencedirect.com/science/book/9781597490993</a><br/>Format: Elektronik Kaynak<br/>Network security assessment : from vulnerability to patchent://SD_ILS/0/SD_ILS:11882732024-09-26T01:31:18Z2024-09-26T01:31:18Zby Manzuik, Steve.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491013">http://www.sciencedirect.com/science/book/9781597491013</a><br/>Format: Elektronik Kaynak<br/>Techno Security's guide to managing risks : for IT managers, auditors, and investigatorsent://SD_ILS/0/SD_ILS:11882802024-09-26T01:31:18Z2024-09-26T01:31:18Zby Wiles, Jack.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">http://www.sciencedirect.com/science/book/9781597491389</a><br/>Format: Elektronik Kaynak<br/>AVIEN malware defense guide for the Enterpriseent://SD_ILS/0/SD_ILS:11891042024-09-26T01:31:18Z2024-09-26T01:31:18Zby Harley, David.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491648">https://www.sciencedirect.com/science/book/9781597491648</a><br/>Format: Elektronik Kaynak<br/>Techno security's guide to e-discovery and digital forensicsent://SD_ILS/0/SD_ILS:11891132024-09-26T01:31:18Z2024-09-26T01:31:18Zby Wiles, Jack.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492232">http://www.sciencedirect.com/science/book/9781597492232</a><br/>Format: Elektronik Kaynak<br/>How to cheat at securing your networkent://SD_ILS/0/SD_ILS:11899832024-09-26T01:31:18Z2024-09-26T01:31:18Zby Dubrawsky, Ido.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492317">https://www.sciencedirect.com/science/book/9781597492317</a><br/>Format: Elektronik Kaynak<br/>Integrated security systems design : concepts, specifications, and implementationent://SD_ILS/0/SD_ILS:11879972024-09-26T01:31:18Z2024-09-26T01:31:18Zby Norman, Thomas L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679091">http://www.sciencedirect.com/science/book/9780750679091</a><br/>Format: Elektronik Kaynak<br/>Developer's guide to web application securityent://SD_ILS/0/SD_ILS:11863712024-09-26T01:31:18Z2024-09-26T01:31:18Zby Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format: Elektronik Kaynak<br/>Configuring Juniper Networks NetScreen & SSG firewallsent://SD_ILS/0/SD_ILS:11864282024-09-26T01:31:18Z2024-09-26T01:31:18Zby Cameron, Rob.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491181">http://www.sciencedirect.com/science/book/9781597491181</a><br/>Format: Elektronik Kaynak<br/>Botnets : the killer web appent://SD_ILS/0/SD_ILS:11864442024-09-26T01:31:18Z2024-09-26T01:31:18Zby Schiller, Craig A.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491358">https://www.sciencedirect.com/science/book/9781597491358</a><br/>Format: Elektronik Kaynak<br/>Windows forensic analysis : DVD toolkitent://SD_ILS/0/SD_ILS:11864552024-09-26T01:31:18Z2024-09-26T01:31:18Zby Carvey, Harlan A.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491563">http://www.sciencedirect.com/science/book/9781597491563</a><br/>Format: Elektronik Kaynak<br/>Security+ study guide & DVD training systement://SD_ILS/0/SD_ILS:11864622024-09-26T01:31:18Z2024-09-26T01:31:18Zby Cross, Michael, 1965-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491532">https://www.sciencedirect.com/science/book/9781597491532</a><br/>Format: Elektronik Kaynak<br/>How to cheat at VoIP securityent://SD_ILS/0/SD_ILS:11864632024-09-26T01:31:18Z2024-09-26T01:31:18Zby Porter, Thomas, PhD.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491693">http://www.sciencedirect.com/science/book/9781597491693</a><br/>Format: Elektronik Kaynak<br/>How to cheat at configuring Open Source security toolsent://SD_ILS/0/SD_ILS:11864652024-09-26T01:31:18Z2024-09-26T01:31:18Zby Alder, Raven.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491709">http://www.sciencedirect.com/science/book/9781597491709</a><br/>Format: Elektronik Kaynak<br/>PCI compliance : implementing effective PCI data security standardsent://SD_ILS/0/SD_ILS:11864662024-09-26T01:31:18Z2024-09-26T01:31:18Zby Bradley, Tony, 1969-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491655">http://www.sciencedirect.com/science/book/9781597491655</a><br/>Format: Elektronik Kaynak<br/>Firewall policies and VPN configurationsent://SD_ILS/0/SD_ILS:9359862024-09-26T01:31:18Z2024-09-26T01:31:18Zby Cantrell, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=272100">Click to View</a><br/>Format: Elektronik Kaynak<br/>How to cheat at designing security for a Windows Server 2003 networkent://SD_ILS/0/SD_ILS:9338562024-09-26T01:31:18Z2024-09-26T01:31:18Zby Amini, Rob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254832">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security log management identifying patterns in the chaosent://SD_ILS/0/SD_ILS:9338572024-09-26T01:31:18Z2024-09-26T01:31:18Zby Babbin, Jacob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254833">Click to View</a><br/>Format: Elektronik Kaynak<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:9338582024-09-26T01:31:18Z2024-09-26T01:31:18Zby Long, Johnny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254834">Click to View</a><br/>Format: Elektronik Kaynak<br/>Securing IM and P2P applications for the enterpriseent://SD_ILS/0/SD_ILS:9338712024-09-26T01:31:18Z2024-09-26T01:31:18Zby Piccard, Paul L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254847">Click to View</a><br/>Format: Elektronik Kaynak<br/>Insider threat protecting the enterprise from sabotage, spying, and theftent://SD_ILS/0/SD_ILS:9338732024-09-26T01:31:18Z2024-09-26T01:31:18Zby Cole, Eric.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254849">Click to View</a><br/>Format: Elektronik Kaynak<br/>Configuring SonicWALL firewallsent://SD_ILS/0/SD_ILS:9340732024-09-26T01:31:18Z2024-09-26T01:31:18Zby Lathem, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=256369">Click to View</a><br/>Format: Elektronik Kaynak<br/>How to cheat at managing information securityent://SD_ILS/0/SD_ILS:9347422024-09-26T01:31:18Z2024-09-26T01:31:18Zby Osborne, Mark.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=266207">Click to View</a><br/>Format: Elektronik Kaynak<br/>Designing and building enterprise DMZsent://SD_ILS/0/SD_ILS:9433482024-09-26T01:31:18Z2024-09-26T01:31:18Zby Flynn, Hal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=319198">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security for mobile networks and platformsent://SD_ILS/0/SD_ILS:9452042024-09-26T01:31:18Z2024-09-26T01:31:18Zby Aissi, Selim.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338731">Click to View</a><br/>Format: Elektronik Kaynak<br/>Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasuresent://SD_ILS/0/SD_ILS:9394832024-09-26T01:31:18Z2024-09-26T01:31:18Zby Contos, Brian T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294116">Click to View</a><br/>Format: Elektronik Kaynak<br/>Insider threat : protecting the enterprise from sabotage, spying, and theftent://SD_ILS/0/SD_ILS:11882592024-09-26T01:31:18Z2024-09-26T01:31:18Zby Cole, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format: Elektronik Kaynak<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:11882482024-09-26T01:31:18Z2024-09-26T01:31:18Zby Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490214">https://www.sciencedirect.com/science/book/9781597490214</a><br/>Format: Elektronik Kaynak<br/>How to cheat at configuring ISA server 2004ent://SD_ILS/0/SD_ILS:11882612024-09-26T01:31:18Z2024-09-26T01:31:18Zby Shinder, Thomas W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490573">http://www.sciencedirect.com/science/book/9781597490573</a><br/>Format: Elektronik Kaynak<br/>Practical VoIP securityent://SD_ILS/0/SD_ILS:11882632024-09-26T01:31:18Z2024-09-26T01:31:18Zby Porter, Thomas.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490603">https://www.sciencedirect.com/science/book/9781597490603</a><br/>Format: Elektronik Kaynak<br/>Syngress IT security project management handbookent://SD_ILS/0/SD_ILS:11882652024-09-26T01:31:18Z2024-09-26T01:31:18Zby Snedaker, Susan.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490764">http://www.sciencedirect.com/science/book/9781597490764</a><br/>Format: Elektronik Kaynak<br/>Firewall policies and VPN configurationsent://SD_ILS/0/SD_ILS:11882702024-09-26T01:31:18Z2024-09-26T01:31:18Zby Henmi, Anne.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490887">https://www.sciencedirect.com/science/book/9781597490887</a><br/>Format: Elektronik Kaynak<br/>Designing and building enterprise DMZsent://SD_ILS/0/SD_ILS:11882722024-09-26T01:31:18Z2024-09-26T01:31:18Zby Dubrawsky, Ido.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491006">http://www.sciencedirect.com/science/book/9781597491006</a><br/>Format: Elektronik Kaynak<br/>Secure your network for free : using NMAP, wireshark, snort, nessus, and MRTGent://SD_ILS/0/SD_ILS:11882782024-09-26T01:31:18Z2024-09-26T01:31:18Zby Seagren, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491235">http://www.sciencedirect.com/science/book/9781597491235</a><br/>Format: Elektronik Kaynak<br/>How to cheat at designing security for a Windows Server 2003 networkent://SD_ILS/0/SD_ILS:11882812024-09-26T01:31:18Z2024-09-26T01:31:18Zby Amini, Rob.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492430">https://www.sciencedirect.com/science/book/9781597492430</a><br/>Format: Elektronik Kaynak<br/>Configuring SonicWALL firewallsent://SD_ILS/0/SD_ILS:11882822024-09-26T01:31:18Z2024-09-26T01:31:18Zby Bendell, Dan.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492508">http://www.sciencedirect.com/science/book/9781597492508</a><br/>Format: Elektronik Kaynak<br/>Security log management : identifying patterns in the chaosent://SD_ILS/0/SD_ILS:11882572024-09-26T01:31:18Z2024-09-26T01:31:18Zby Babbin, Jacob.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490429">http://www.sciencedirect.com/science/book/9781597490429</a><br/>Format: Elektronik Kaynak<br/>Syngress force emerging threat analysis : from mischief to maliciousent://SD_ILS/0/SD_ILS:11863392024-09-26T01:31:18Z2024-09-26T01:31:18Zby Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">http://www.sciencedirect.com/science/book/9781597490566</a><br/>Format: Elektronik Kaynak<br/>How to cheat at Windows system administration using command line scriptsent://SD_ILS/0/SD_ILS:11864252024-09-26T01:31:18Z2024-09-26T01:31:18Zby Bhardwaj, Pawan K.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491051">http://www.sciencedirect.com/science/book/9781597491051</a><br/>Format: Elektronik Kaynak<br/>Hack the stack : using snort and ethereal to master the 8 layers of an insecure networkent://SD_ILS/0/SD_ILS:11864272024-09-26T01:31:18Z2024-09-26T01:31:18Zby Gregg, Michael (Michael C.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">http://www.sciencedirect.com/science/book/9781597491099</a><br/>Format: Elektronik Kaynak<br/>Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasuresent://SD_ILS/0/SD_ILS:11864392024-09-26T01:31:18Z2024-09-26T01:31:18Zby Contos, Brian T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491297">https://www.sciencedirect.com/science/book/9781597491297</a><br/>Format: Elektronik Kaynak<br/>WebSphere application server for z/OS V5 and J2EE 1.3 security handbookent://SD_ILS/0/SD_ILS:10750772024-09-26T01:31:18Z2024-09-26T01:31:18Zby Allison, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306382">Click to View</a><br/>Format: Elektronik Kaynak<br/>z/OS 1.6 security services updateent://SD_ILS/0/SD_ILS:10751482024-09-26T01:31:18Z2024-09-26T01:31:18Zby Kappeler, Patrick.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306453">Click to View</a><br/>Format: Elektronik Kaynak<br/>Secure production deployment of B2B solutions using WebSphere business integration connectent://SD_ILS/0/SD_ILS:10751512024-09-26T01:31:18Z2024-09-26T01:31:18Zby Putte, Geert van de.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306456">Click to View</a><br/>Format: Elektronik Kaynak<br/>Identity and access management solutions using WebSphere Portal V5.1, Tivoli Identity Manager V4.5.1, and Tivoli Access Manager V5.1ent://SD_ILS/0/SD_ILS:10752412024-09-26T01:31:18Z2024-09-26T01:31:18Zby Ganci, John.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306546">Click to View</a><br/>Format: Elektronik Kaynak<br/>IBM system z9 109 technical introductionent://SD_ILS/0/SD_ILS:10752772024-09-26T01:31:18Z2024-09-26T01:31:18Zby Ogden, Bill.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306582">Click to View</a><br/>Format: Elektronik Kaynak<br/>Distributed security and high availability with Tivoli Access Manager and WebSphere Application Server for z/OSent://SD_ILS/0/SD_ILS:10752972024-09-26T01:31:18Z2024-09-26T01:31:18Zby Davies, Saida.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306602">Click to View</a><br/>Format: Elektronik Kaynak<br/>z/OS diagnostic data collection and analysisent://SD_ILS/0/SD_ILS:10754652024-09-26T01:31:18Z2024-09-26T01:31:18Zby Rogers, Paul.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306770">Click to View</a><br/>Format: Elektronik Kaynak<br/>Buffer overflow attacks detect, exploit, preventent://SD_ILS/0/SD_ILS:9302072024-09-26T01:31:18Z2024-09-26T01:31:18Zby Foster, James C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=222803">Click to View</a><br/>Format: Elektronik Kaynak<br/>Intrusion prevention and active response deploying network and host IPSent://SD_ILS/0/SD_ILS:9307142024-09-26T01:31:18Z2024-09-26T01:31:18Zby Henmi, Anne.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=226578">Click to View</a><br/>Format: Elektronik Kaynak<br/>Host integrity monitoring using Osiris and Samhainent://SD_ILS/0/SD_ILS:9316062024-09-26T01:31:18Z2024-09-26T01:31:18Zby Wotring, Brian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=233599">Click to View</a><br/>Format: Elektronik Kaynak<br/>Silence on the wire a field guide to passive reconnaissance and indirect attacksent://SD_ILS/0/SD_ILS:9365792024-09-26T01:31:18Z2024-09-26T01:31:18Zby Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273504">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cisco Pix firewalls configure, manage and troubleshootent://SD_ILS/0/SD_ILS:9338592024-09-26T01:31:18Z2024-09-26T01:31:18Zby Behrens, Thorsten.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254835">Click to View</a><br/>Format: Elektronik Kaynak<br/>Nessus, Snort, & Ethereal power tools customizing open source security applicationsent://SD_ILS/0/SD_ILS:9338632024-09-26T01:31:18Z2024-09-26T01:31:18Zby Archibald, Neil.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254839">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network security evaluation using the NSA IEMent://SD_ILS/0/SD_ILS:9338662024-09-26T01:31:18Z2024-09-26T01:31:18Zby Fuller, Ed.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254842">Click to View</a><br/>Format: Elektronik Kaynak<br/>Configuring NetScreen Firewallsent://SD_ILS/0/SD_ILS:9394612024-09-26T01:31:18Z2024-09-26T01:31:18Zby Cameron, Rob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294055">Click to View</a><br/>Format: Elektronik Kaynak<br/>Dr. Tom Shinder's configuring ISA Server 2004ent://SD_ILS/0/SD_ILS:9394792024-09-26T01:31:18Z2024-09-26T01:31:18Zby Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294094">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking a terror network : the silent threat of covert channelsent://SD_ILS/0/SD_ILS:11883632024-09-26T01:31:18Z2024-09-26T01:31:18Zby Rogers, Russ.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994985">https://www.sciencedirect.com/science/book/9781928994985</a><br/>Format: Elektronik Kaynak<br/>Host integrity monitoring : using Osiris and Samhainent://SD_ILS/0/SD_ILS:11882452024-09-26T01:31:18Z2024-09-26T01:31:18Zby Wotring, Brian.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490184">http://www.sciencedirect.com/science/book/9781597490184</a><br/>Format: Elektronik Kaynak<br/>Nessus, Snort, & Ethereal power tools : customizing open source security applicationsent://SD_ILS/0/SD_ILS:11882472024-09-26T01:31:18Z2024-09-26T01:31:18Zby Archibald, Neil.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490207">http://www.sciencedirect.com/science/book/9781597490207</a><br/>Format: Elektronik Kaynak<br/>