Arama Sonu&ccedil;lar&#305; - Daralt&#305;lm&#305;&#351;: English - Computer networks -- Security measures. - Computer security. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dSUBJECT$002509Konu$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300;jsessionid=AB60268B5719CDD8F9C644FC24D9AFD6? 2024-06-17T13:47:38Z Understanding security issues ent://SD_ILS/0/SD_ILS:1132529 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Donaldson, Scott E., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5157542">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Empirical research for software security : foundations and experience ent://SD_ILS/0/SD_ILS:1132973 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;ben Othmane, Lotfi, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5164090">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The five technological forces disrupting security : how social, mobile, cloud and iot are fundamentally changing the practice of physical security ent://SD_ILS/0/SD_ILS:1128883 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Van Till, Steve, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4981408">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security and resilience in intelligent data-centric systems and communication networks ent://SD_ILS/0/SD_ILS:1130161 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Ficco, Massimo, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5090270">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybercrime and business : strategies for global corporate security ent://SD_ILS/0/SD_ILS:1126520 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Moskowitz, Sanford, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4863624">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Essential skills for hackers ent://SD_ILS/0/SD_ILS:1104568 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4189281">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> You : for sale protecting your personal data and privacy online ent://SD_ILS/0/SD_ILS:1053757 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Sumner, Stuart, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2187472">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security and privacy in the digital era. Volume 1 ent://SD_ILS/0/SD_ILS:1115270 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Guerrier, Claudine, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4648717">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security in fixed and wireless networks ent://SD_ILS/0/SD_ILS:1115585 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Sch&auml;fer, G&uuml;nter, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4658592">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Dns security : defending the domain name system ent://SD_ILS/0/SD_ILS:1113215 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Liska, Allan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4556898">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Data breach preparation and response : breaches are certain, impact is not ent://SD_ILS/0/SD_ILS:1113216 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Fowler, Kevvie, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4556899">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Building a corporate culture of security : strategies for strengthening organizational resiliency ent://SD_ILS/0/SD_ILS:1108349 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Sullivant, John, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4425984">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows registry forensics : advanced digital forensic analysis of the windows registry ent://SD_ILS/0/SD_ILS:1108686 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Carvey, Harlan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4438754">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hiding behind the keyboard : uncovering covert communication methods with forensic analysis ent://SD_ILS/0/SD_ILS:1109062 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Shavers, Brett, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4452264">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network performance and security : testing and analyzing using open source and low-cost tools ent://SD_ILS/0/SD_ILS:1109063 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Chapman, Chris, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4452265">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security intelligence : a practitioner's guide to solving enterprise security challenges ent://SD_ILS/0/SD_ILS:1042735 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Li, Qing, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1895130">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Understanding bitcoin : cryptography, engineering and economics. ent://SD_ILS/0/SD_ILS:1040180 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Franco, Pedro, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1823060">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Dissecting the hack : the V3rb0ten network ent://SD_ILS/0/SD_ILS:1053000 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Street, Jayson E., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2098440">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Web application security is a stack : how to CYA (Cover Your Apps) completely ent://SD_ILS/0/SD_ILS:1053836 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Vittie, Lori Mac, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192126">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computational network science : an algorithmic approach ent://SD_ILS/0/SD_ILS:1038184 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Hexmoor, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1798312">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The defende&#341;s dilemma : charting a course toward cybersecurity ent://SD_ILS/0/SD_ILS:1050852 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Libicki, Martin C., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2075897">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Zabbix network monitoring essentials : your one-stop solution to efficient network monitoring with zabbix ent://SD_ILS/0/SD_ILS:1046048 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Vacche, Andrea Dalle, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1973849">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of IT audit : purposes, processes, and practical information ent://SD_ILS/0/SD_ILS:1022729 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Gantz, Stephen D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1550527">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of digital privacy : simple tools to protect your personal information and your identity online ent://SD_ILS/0/SD_ILS:1023569 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1573362">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Applied network security monitoring : collection, detection, and analysis ent://SD_ILS/0/SD_ILS:1023659 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Sanders, Chris, 1986-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1574451">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Assessing information security : strategies, tactics, logic and framework ent://SD_ILS/0/SD_ILS:1053834 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Vladimirov, A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192124">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013 ent://SD_ILS/0/SD_ILS:1035010 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Ginodman, Veniamin, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1752831">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning ent://SD_ILS/0/SD_ILS:1036178 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Hutchens, Justin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1771381">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer forensics with FTK : enhance your computer forensics knowledge through illustrations, tips, tricks, and practical real-world scenarios ent://SD_ILS/0/SD_ILS:1029107 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Carbone, Fernando, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1657797">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 ent://SD_ILS/0/SD_ILS:1029162 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Carvey, Harlan A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1659012">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking point of sale : payment application secrets, threats, and solutions ent://SD_ILS/0/SD_ILS:1027046 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Gomzin, Slava.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629175">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Threat modeling : designing for security ent://SD_ILS/0/SD_ILS:1027048 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Shostack, Adam.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629177">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Best practices in computer network defense : incident detection and response ent://SD_ILS/0/SD_ILS:1027641 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Hathaway, Melissa E., editor of compilation.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1637648">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux ent://SD_ILS/0/SD_ILS:1031737 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Buchanan, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1688607">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:1032266 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Andress, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1699255">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber threat! : how to manage the growing risk of cyber attacks ent://SD_ILS/0/SD_ILS:1034296 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Ulsch, N. MacDonnell, 1951- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1742833">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber security and IT infrastructure protection ent://SD_ILS/0/SD_ILS:1018941 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1377640">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Biohackers the politics of open science ent://SD_ILS/0/SD_ILS:1088207 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Delfanti, Alessandro.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3386719">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Data visualization. Part 2 ent://SD_ILS/0/SD_ILS:1024206 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Assam, Tarek.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1579356">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network intrusion analysis methodologies, tools, and techniques for incident analysis and response ent://SD_ILS/0/SD_ILS:1003376 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Fichera, Joe, 1966-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1058152">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking for dummies ent://SD_ILS/0/SD_ILS:1006251 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Beaver, Kevin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1106542">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Web application defender's cookbook battling hackers and protecting users ent://SD_ILS/0/SD_ILS:1006627 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Barnett, Ryan C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108733">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Practical anonymity hiding in plain sight online ent://SD_ILS/0/SD_ILS:1007614 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Loshin, Peter.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115167">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IBM mainframe security beyond the basics : a practical guide from a z/OS and RACF perspective ent://SD_ILS/0/SD_ILS:1019878 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Dattani, Dinesh D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1411689">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information protection playbook ent://SD_ILS/0/SD_ILS:1019990 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Kane, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1418381">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Data mining tools for malware detection ent://SD_ILS/0/SD_ILS:987461 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Masud, Mehedy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826949">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows forensic analysis toolkit advanced analysis techniques for Windows 7 ent://SD_ILS/0/SD_ILS:989925 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Carvey, Harlan A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=850700">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking web apps detecting and preventing web application security problems ent://SD_ILS/0/SD_ILS:1000371 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Shema, Mike.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1012529">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> SQL injection attacks and defense ent://SD_ILS/0/SD_ILS:997287 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Clarke, Justin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=953188">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> A multidisciplinary introduction to information security ent://SD_ILS/0/SD_ILS:1028416 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Mj&oslash;lsnes, Stig F., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1648315">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The tangled Web a guide to securing modern Web applications ent://SD_ILS/0/SD_ILS:1009976 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137574">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of information security understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:133592 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Andress, Jason.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing the cloud cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:137201 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Winkler, J. R. (Joachim R.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format:&#160;Elektronik Kaynak<br/> Identity management concepts, technologies, and systems ent://SD_ILS/0/SD_ILS:972507 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Bertino, Elisa.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=634511">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer Forensics jumpstart ent://SD_ILS/0/SD_ILS:973680 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Solomon, Michael R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=661659">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security risk management building an information security risk management program from the ground up ent://SD_ILS/0/SD_ILS:976804 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Wheeler, Evan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=685406">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing the cloud cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:977055 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Winkler, J. R. (Joachim R.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=686827">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Oracle Identity and Access Manager 11g for administrators administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasks ent://SD_ILS/0/SD_ILS:996835 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Kumar, Atul.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948559">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Microsoft Forefront UAG 2010 administrator's handbook take full command of Microsoft Forefront Unified Access Gateway to secure your business applications and provide dynamic remote access with DirectAccess ent://SD_ILS/0/SD_ILS:996844 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Ben-Ari, Erez.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948568">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Web commerce security design and development ent://SD_ILS/0/SD_ILS:978975 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Nahari, Hadi.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706729">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows Registry Forensics : Advanced Digital Forensic Analysis of the Windows Registry. ent://SD_ILS/0/SD_ILS:1183526 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Carvey, Harlan.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495806">https://www.sciencedirect.com/science/book/9781597495806</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing the cloud : cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:1183743 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Winkler, J. R. (Joachim R.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:1183815 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Andress, Jason.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496537">https://www.sciencedirect.com/science/book/9781597496537</a><br/>Format:&#160;Elektronik Kaynak<br/> Mac security bible ent://SD_ILS/0/SD_ILS:960377 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Kissell, Joe.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=477803">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IT audit, control, and security ent://SD_ILS/0/SD_ILS:972135 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Moeller, Robert R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=624573">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Adaptive security management architecture ent://SD_ILS/0/SD_ILS:972238 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=625004">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Seven deadliest wireless technologies attacks ent://SD_ILS/0/SD_ILS:1178019 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Haines, Brad.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495417">https://www.sciencedirect.com/science/book/9781597495417</a><br/>Format:&#160;Elektronik Kaynak<br/> Seven deadliest USB attacks ent://SD_ILS/0/SD_ILS:1178020 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Anderson, Brian (Brian James)<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495530">https://www.sciencedirect.com/science/book/9781597495530</a><br/>Format:&#160;Elektronik Kaynak<br/> Seven deadliest social network attacks ent://SD_ILS/0/SD_ILS:1178031 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Timm, Carl.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495455">https://www.sciencedirect.com/science/book/9781597495455</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:955637 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=453166">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Next generation SSH2 implementation : securing data in motion ent://SD_ILS/0/SD_ILS:1191763 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Liu, Dale.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492836">https://www.sciencedirect.com/science/book/9781597492836</a><br/>Format:&#160;Elektronik Kaynak<br/> Practical embedded security building secure resource-constrained systems ent://SD_ILS/0/SD_ILS:942507 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Stapko, Timothy John.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=312846">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing information and communications systems principles, technologies, and applications ent://SD_ILS/0/SD_ILS:956326 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Furnell, Steven, 1970-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456881">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Fuzzing for software security testing and quality assurance ent://SD_ILS/0/SD_ILS:956329 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Takanen, Ari.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456884">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information assurance dependability and security in networked systems ent://SD_ILS/0/SD_ILS:944016 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Qian, Yi, 1962-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328312">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Secure computer and network systems modeling, analysis and design ent://SD_ILS/0/SD_ILS:946385 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Ye, Nong.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=351427">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Trust and security in collaborative computing ent://SD_ILS/0/SD_ILS:1030255 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Zou, Xukai, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1679354">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking the art of exploitation ent://SD_ILS/0/SD_ILS:1009955 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137538">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Practical embedded security : building secure resource-constrained systems ent://SD_ILS/0/SD_ILS:1189168 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Stapko, Timothy John.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780750682152">https://www.sciencedirect.com/science/book/9780750682152</a><br/>Format:&#160;Elektronik Kaynak<br/> Google hacking for penetration testers. Volume 2 ent://SD_ILS/0/SD_ILS:1189102 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491761">https://www.sciencedirect.com/science/book/9781597491761</a><br/>Format:&#160;Elektronik Kaynak<br/> Information assurance : dependability and security in networked systems ent://SD_ILS/0/SD_ILS:1189195 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Qian, Yi, 1962-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123735669">https://www.sciencedirect.com/science/book/9780123735669</a><br/>Format:&#160;Elektronik Kaynak<br/> Microsoft forefront security administration guide ent://SD_ILS/0/SD_ILS:1189120 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Varsalone, Jesse.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492447">https://www.sciencedirect.com/science/book/9781597492447</a><br/>Format:&#160;Elektronik Kaynak<br/> OSSEC host-based intrusion detection guide ent://SD_ILS/0/SD_ILS:1189620 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Hay, Andrew.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492409">http://www.sciencedirect.com/science/book/9781597492409</a><br/>Format:&#160;Elektronik Kaynak<br/> Scene of the cybercrime. ent://SD_ILS/0/SD_ILS:1189665 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Cross, Michael, 1965-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492768">https://www.sciencedirect.com/science/book/9781597492768</a><br/>Format:&#160;Elektronik Kaynak<br/> Techno security's guide to e-discovery and digital forensics ent://SD_ILS/0/SD_ILS:948015 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Wiles, Jack.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=405426">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows forensic analysis DVD toolkit, ent://SD_ILS/0/SD_ILS:944076 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Carvey, Harlan A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328624">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Developer's guide to web application security ent://SD_ILS/0/SD_ILS:938521 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Cross, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=289735">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The misuse of information systems the impact of security countermeasures ent://SD_ILS/0/SD_ILS:1058044 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;D'Arcy, John P., 1975-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3016826">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security data visualization graphical techniques for network analysis ent://SD_ILS/0/SD_ILS:1058454 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Conti, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3017625">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Toward a safer and more secure cyberspace ent://SD_ILS/0/SD_ILS:1085452 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Goodman, Seymour E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3378311">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Developer's guide to web application security ent://SD_ILS/0/SD_ILS:1186371 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows forensic analysis : DVD toolkit ent://SD_ILS/0/SD_ILS:1186455 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Carvey, Harlan A.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491563">http://www.sciencedirect.com/science/book/9781597491563</a><br/>Format:&#160;Elektronik Kaynak<br/> Botnets : the killer web app ent://SD_ILS/0/SD_ILS:1186444 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Schiller, Craig A.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491358">https://www.sciencedirect.com/science/book/9781597491358</a><br/>Format:&#160;Elektronik Kaynak<br/> Techno security's guide to e-discovery and digital forensics ent://SD_ILS/0/SD_ILS:1189113 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Wiles, Jack.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492232">http://www.sciencedirect.com/science/book/9781597492232</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at securing your network ent://SD_ILS/0/SD_ILS:1189983 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Dubrawsky, Ido.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492317">https://www.sciencedirect.com/science/book/9781597492317</a><br/>Format:&#160;Elektronik Kaynak<br/> Snort : IDS and IPS toolkit ent://SD_ILS/0/SD_ILS:1188271 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Beale, Jay.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490993">https://www.sciencedirect.com/science/book/9781597490993</a><br/>Format:&#160;Elektronik Kaynak<br/> Techno Security's guide to managing risks : for IT managers, auditors, and investigators ent://SD_ILS/0/SD_ILS:1188280 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Wiles, Jack.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">http://www.sciencedirect.com/science/book/9781597491389</a><br/>Format:&#160;Elektronik Kaynak<br/> Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasures ent://SD_ILS/0/SD_ILS:939483 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Contos, Brian T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294116">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at designing security for a Windows Server 2003 network ent://SD_ILS/0/SD_ILS:933856 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Amini, Rob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254832">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:933858 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Long, Johnny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254834">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing IM and P2P applications for the enterprise ent://SD_ILS/0/SD_ILS:933871 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Piccard, Paul L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254847">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Insider threat protecting the enterprise from sabotage, spying, and theft ent://SD_ILS/0/SD_ILS:933873 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Cole, Eric.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254849">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Syngress force emerging threat analysis : from mischief to malicious ent://SD_ILS/0/SD_ILS:1186339 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">http://www.sciencedirect.com/science/book/9781597490566</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at Windows system administration using command line scripts ent://SD_ILS/0/SD_ILS:1186425 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Bhardwaj, Pawan K.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491051">http://www.sciencedirect.com/science/book/9781597491051</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack the stack : using snort and ethereal to master the 8 layers of an insecure network ent://SD_ILS/0/SD_ILS:1186427 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Gregg, Michael (Michael C.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">http://www.sciencedirect.com/science/book/9781597491099</a><br/>Format:&#160;Elektronik Kaynak<br/> Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures ent://SD_ILS/0/SD_ILS:1186439 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Contos, Brian T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491297">https://www.sciencedirect.com/science/book/9781597491297</a><br/>Format:&#160;Elektronik Kaynak<br/> Insider threat : protecting the enterprise from sabotage, spying, and theft ent://SD_ILS/0/SD_ILS:1188259 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Cole, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at designing security for a Windows Server 2003 network ent://SD_ILS/0/SD_ILS:1188281 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Amini, Rob.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492430">https://www.sciencedirect.com/science/book/9781597492430</a><br/>Format:&#160;Elektronik Kaynak<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:1188248 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490214">https://www.sciencedirect.com/science/book/9781597490214</a><br/>Format:&#160;Elektronik Kaynak<br/> Buffer overflow attacks detect, exploit, prevent ent://SD_ILS/0/SD_ILS:930207 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Foster, James C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=222803">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Dr. Tom Shinder's configuring ISA Server 2004 ent://SD_ILS/0/SD_ILS:939479 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294094">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Intrusion prevention and active response deploying network and host IPS ent://SD_ILS/0/SD_ILS:930714 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Henmi, Anne.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=226578">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Host integrity monitoring using Osiris and Samhain ent://SD_ILS/0/SD_ILS:931606 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Wotring, Brian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=233599">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Nessus, Snort, &amp; Ethereal power tools customizing open source security applications ent://SD_ILS/0/SD_ILS:933863 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Archibald, Neil.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254839">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security evaluation using the NSA IEM ent://SD_ILS/0/SD_ILS:933866 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Fuller, Ed.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254842">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Silence on the wire a field guide to passive reconnaissance and indirect attacks ent://SD_ILS/0/SD_ILS:936579 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273504">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Host integrity monitoring : using Osiris and Samhain ent://SD_ILS/0/SD_ILS:1188245 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Wotring, Brian.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490184">http://www.sciencedirect.com/science/book/9781597490184</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking a terror network : the silent threat of covert channels ent://SD_ILS/0/SD_ILS:1188363 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Rogers, Russ.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994985">https://www.sciencedirect.com/science/book/9781928994985</a><br/>Format:&#160;Elektronik Kaynak<br/> Intrusion prevention and active response : deploying network and host IPS ent://SD_ILS/0/SD_ILS:1188400 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Rash, Michael.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266474">http://www.sciencedirect.com/science/book/9781932266474</a><br/>Format:&#160;Elektronik Kaynak<br/> Innocent code a security wake-up call for Web programmers ent://SD_ILS/0/SD_ILS:929474 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Huseby, Sverre H.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=210558">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Ethereal packet sniffing ent://SD_ILS/0/SD_ILS:939485 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Orebaugh, Angela.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294122">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking the code ASP. NET web application security ent://SD_ILS/0/SD_ILS:939506 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Burnett, Mark (Mark M.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294160">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> MCSE designing security for a Windows Server 2003 network : exam 70-298 study guide &amp; DVD training system ent://SD_ILS/0/SD_ILS:939533 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Khnaser, Elias N.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294253">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber adversary characterization auditing the hacker mind ent://SD_ILS/0/SD_ILS:939469 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Parker, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294071">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security sage's guide to hardening the network infrastructure ent://SD_ILS/0/SD_ILS:939571 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Andr&eacute;s, Steven.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294359">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Defense and detection strategies against Internet worms ent://SD_ILS/0/SD_ILS:931019 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Nazario, Jose.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227660">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at Configuring ISA Server 2004 ent://SD_ILS/0/SD_ILS:933877 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Shinder, Dr. Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254853">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security foundations ent://SD_ILS/0/SD_ILS:935040 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Strebe, Matthew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=267332">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Implementing homeland security for enterprise IT ent://SD_ILS/0/SD_ILS:1188099 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Erbschloe, Michael.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">http://www.sciencedirect.com/science/book/9781555583125</a><br/>Format:&#160;Elektronik Kaynak<br/> Wireless operational security ent://SD_ILS/0/SD_ILS:1188104 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583170">http://www.sciencedirect.com/science/book/9781555583170</a> ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583170">https://www.sciencedirect.com/science/book/9781555583170</a><br/>Format:&#160;Elektronik Kaynak<br/> Snort 2.1 intrusion detection ent://SD_ILS/0/SD_ILS:1188366 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Beale, Jay.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836043">https://www.sciencedirect.com/science/book/9781931836043</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber adversary characterization : auditing the hacker mind ent://SD_ILS/0/SD_ILS:1188369 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Parker, Tom.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836111">http://www.sciencedirect.com/science/book/9781931836111</a><br/>Format:&#160;Elektronik Kaynak<br/> Zero day exploit : countdown to darkness ent://SD_ILS/0/SD_ILS:1188489 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Shein, Rob.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836098">http://www.sciencedirect.com/science/book/9781931836098</a><br/>Format:&#160;Elektronik Kaynak<br/> Configuring Symantec Antivirus, Corporate Edition ent://SD_ILS/0/SD_ILS:939462 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Hunter, Laura E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294056">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Snort 2.0 intrusion detection ent://SD_ILS/0/SD_ILS:939575 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Beale, Jay.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294371">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security a practical guide ent://SD_ILS/0/SD_ILS:940334 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Poole, Owen.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=298471">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity operations handbook ent://SD_ILS/0/SD_ILS:942613 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Rittinghouse, John W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=313612">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking the art of exploitation ent://SD_ILS/0/SD_ILS:936567 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273488">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security secrets, intruders and ID tags. ent://SD_ILS/0/SD_ILS:1092043 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411447">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Internet security : a jumpstart for systems administrators and IT managers ent://SD_ILS/0/SD_ILS:1188090 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Speed, Tim.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582982">http://www.sciencedirect.com/science/book/9781555582982</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity operations handbook ent://SD_ILS/0/SD_ILS:1188095 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Rittinghouse, John W.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583064">https://www.sciencedirect.com/science/book/9781555583064</a><br/>Format:&#160;Elektronik Kaynak<br/> Snort 2.0 intrusion detection ent://SD_ILS/0/SD_ILS:1188387 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Beale, Jay.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836746">http://www.sciencedirect.com/science/book/9781931836746</a><br/>Format:&#160;Elektronik Kaynak<br/> Configuring Symantec Antivirus, Corporate Edition ent://SD_ILS/0/SD_ILS:1188389 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Hunter, Laura E.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836814">http://www.sciencedirect.com/science/book/9781931836814</a><br/>Format:&#160;Elektronik Kaynak<br/> Cisco security professional's guide to secure intrusion detection systems ent://SD_ILS/0/SD_ILS:1188408 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Burton, James.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266696">http://www.sciencedirect.com/science/book/9781932266696</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing ColdFusion ent://SD_ILS/0/SD_ILS:939498 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Meyer, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294151">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity today and tomorrow pay now or pay later ent://SD_ILS/0/SD_ILS:1082583 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3375180">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security best practices : 205 basic rules ent://SD_ILS/0/SD_ILS:1188318 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Stefanek, George L.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781878707963">https://www.sciencedirect.com/science/book/9781878707963</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing your network ent://SD_ILS/0/SD_ILS:1188357 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Ahmad, David R. Mirza.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994701">https://www.sciencedirect.com/science/book/9781928994701</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing ColdFusion ent://SD_ILS/0/SD_ILS:1188358 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Meyer, Greg.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994770">http://www.sciencedirect.com/science/book/9781928994770</a><br/>Format:&#160;Elektronik Kaynak<br/> Scene of the cybercrime : computer forensics handbook ent://SD_ILS/0/SD_ILS:1188494 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Shinder, Debra Littlejohn, author.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836654">https://www.sciencedirect.com/science/book/9781931836654</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing Windows 2000 ent://SD_ILS/0/SD_ILS:939501 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Todd, Chad.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294154">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Configuring ISA server 2000 building firewalls for windows 2000 ent://SD_ILS/0/SD_ILS:939460 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294054">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing your Web applications ent://SD_ILS/0/SD_ILS:1188343 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Traxler, Julie.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994312">https://www.sciencedirect.com/science/book/9781928994312</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing Windows 2000 ent://SD_ILS/0/SD_ILS:1188381 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Todd, Chad.<br/><a href="http://www.sciencedirect.com/science/book/9781931836494">Available from ScienceDirect. Online version available for university members only. This requires an institutional login off-campus</a> ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836494">https://www.sciencedirect.com/science/book/9781931836494</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing Sun Solaris 8 ent://SD_ILS/0/SD_ILS:1188485 2024-06-17T13:47:38Z 2024-06-17T13:47:38Z by&#160;Miles, Wyman.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994442">http://www.sciencedirect.com/science/book/9781928994442</a><br/>Format:&#160;Elektronik Kaynak<br/>