Arama Sonu&ccedil;lar&#305; - Daralt&#305;lm&#305;&#351;: English - Internet -- Security measures. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dSUBJECT$002509Konu$002509Internet$002b--$002bSecurity$002bmeasures.$002509Internet$002b--$002bSecurity$002bmeasures.$0026ps$003d300?dt=list 2024-09-27T02:51:09Z Building an effective cybersecurity program ent://SD_ILS/0/SD_ILS:1148673 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Schreider, Tari, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5965808">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Secure connected objects ent://SD_ILS/0/SD_ILS:1127018 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Paret, Dominique, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4875042">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network forensics ent://SD_ILS/0/SD_ILS:1128247 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Messier, Ric, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4917496">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Wireless communications security : solutions for the internet of things ent://SD_ILS/0/SD_ILS:1118219 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Penttinen, Jyrki T. J., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4690021">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing the internet of things ent://SD_ILS/0/SD_ILS:1122371 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Li, Shancang, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4786871">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IoT security issues ent://SD_ILS/0/SD_ILS:1123519 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Gilchrist, Alasdair, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4810138">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The business blockchain : promise, practice, and application of the next Internet technology ent://SD_ILS/0/SD_ILS:1110989 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Mougayar, William, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4516142">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber guerilla ent://SD_ILS/0/SD_ILS:1113262 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Haaster, Jelle van, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4557157">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The smart girl's guide to privacy : practical tips for staying safe online ent://SD_ILS/0/SD_ILS:1110428 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Blue, Violet, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4503160">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> How to attack and defend your website ent://SD_ILS/0/SD_ILS:1042567 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1888757">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The cloud security ecosystem : technical, legal, business and management issues ent://SD_ILS/0/SD_ILS:1050303 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Ko, Ryan, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2060804">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computational network science : an algorithmic approach ent://SD_ILS/0/SD_ILS:1038184 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Hexmoor, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1798312">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Managing online risk : apps, mobile, and social media security ent://SD_ILS/0/SD_ILS:1038176 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Gonzalez, Deborah, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1798304">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber reconnaissance, surveillance, and defense ent://SD_ILS/0/SD_ILS:1040010 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Shimonski, Robert, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1820202">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 ent://SD_ILS/0/SD_ILS:1029162 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Carvey, Harlan A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1659012">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Chinese cybersecurity and defense ent://SD_ILS/0/SD_ILS:1035841 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Ventre, Daniel, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1765106">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Procuring penetration testing services. ent://SD_ILS/0/SD_ILS:1037085 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z <a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778766">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity : managing systems, conducting testing, and investigating intrusions ent://SD_ILS/0/SD_ILS:1021516 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Mowbray, Thomas J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1481185">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Organized chaos : reimagining the internet ent://SD_ILS/0/SD_ILS:1120075 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Raymond, Mark, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4730794">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network intrusion analysis methodologies, tools, and techniques for incident analysis and response ent://SD_ILS/0/SD_ILS:1003376 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Fichera, Joe, 1966-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1058152">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Advanced persistent threat understanding the danger and how to protect your organization ent://SD_ILS/0/SD_ILS:1003921 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Cole, Eric.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073020">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice ent://SD_ILS/0/SD_ILS:1003926 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Winterfeld, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073026">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Digital enlightenment yearbook 2013 : the value of personal data ent://SD_ILS/0/SD_ILS:1021263 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Hildebrandt, M.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1477323">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> What should go on the internet? : privacy, freedom, and security online ent://SD_ILS/0/SD_ILS:1111834 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Engel, Mary, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4533280">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Essentials of computer networks, internet and database technologies ent://SD_ILS/0/SD_ILS:1136133 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Dixit, V. S., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5311542">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Advances in cyber security : technology, operations, and experiences ent://SD_ILS/0/SD_ILS:1123247 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Hsu, D. Frank (Derbiau Frank), 1948- editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4803841">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Digital enlightenment yearbook 2012 ent://SD_ILS/0/SD_ILS:996751 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Bus, Jacques.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948340">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber conflict competing national perspectives ent://SD_ILS/0/SD_ILS:1008510 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Ventre, Daniel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1124641">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The death of the Internet ent://SD_ILS/0/SD_ILS:989807 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Jakobsson, Markus.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=848529">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows forensic analysis toolkit advanced analysis techniques for Windows 7 ent://SD_ILS/0/SD_ILS:989925 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Carvey, Harlan A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=850700">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Web commerce security design and development ent://SD_ILS/0/SD_ILS:978975 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Nahari, Hadi.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706729">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The web application hacker's handbook finding and exploiting security flaws ent://SD_ILS/0/SD_ILS:986773 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Stuttard, Dafydd.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=819008">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Proceedings of a workshop on deterring cyberattacks informing strategies and developing options for U.S. policy ent://SD_ILS/0/SD_ILS:1085810 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;National Research Council (U.S.). Committee on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3378670">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Towards the future internet emerging trends from European research ent://SD_ILS/0/SD_ILS:966626 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Tselentis, Georgios.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=557041">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber risks for business professionals a management guide ent://SD_ILS/0/SD_ILS:973058 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Kendrick, Rupert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=647937">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> SSL and TLS theory and practice ent://SD_ILS/0/SD_ILS:996571 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Oppliger, Rolf.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=946557">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Distributed systems security issues, processes, and solutions ent://SD_ILS/0/SD_ILS:954183 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Belapurkar, Abhijit.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=437429">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The future of the Internet and how to stop it ent://SD_ILS/0/SD_ILS:1095546 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Zittrain, Jonathan (Jonathan L.), 1969-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3420427">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyberwar, cyberterror, cybercrime a guide to the role of standards in an environment of change and danger ent://SD_ILS/0/SD_ILS:960767 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Mehan, Julie E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=480406">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Google hacking for penetration testers. Volume 2 ent://SD_ILS/0/SD_ILS:1189102 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491761">https://www.sciencedirect.com/science/book/9781597491761</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows forensic analysis DVD toolkit, ent://SD_ILS/0/SD_ILS:944076 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Carvey, Harlan A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328624">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Online information review. Volume 31, Number 5, Issues in online security ent://SD_ILS/0/SD_ILS:944144 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Gorman, G. E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328763">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows forensic analysis : DVD toolkit ent://SD_ILS/0/SD_ILS:1186455 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Carvey, Harlan A.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491563">http://www.sciencedirect.com/science/book/9781597491563</a><br/>Format:&#160;Elektronik Kaynak<br/> Part-themed issue on internet security ent://SD_ILS/0/SD_ILS:937989 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Yague, Mariemma.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=285507">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Privacy and anonymity in the digital era ent://SD_ILS/0/SD_ILS:935077 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Gritzalis, Stefanos.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=267420">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Designing and building enterprise DMZs ent://SD_ILS/0/SD_ILS:943348 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Flynn, Hal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=319198">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Essential computer security everyone's guide to e-mail, internet, and wireless security ent://SD_ILS/0/SD_ILS:943350 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Bradley, Tony.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=319200">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at configuring ISA server 2004 ent://SD_ILS/0/SD_ILS:1188261 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Shinder, Thomas W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490573">http://www.sciencedirect.com/science/book/9781597490573</a><br/>Format:&#160;Elektronik Kaynak<br/> Essential computer security : everyone's guide to e-mail, internet, and wireless security ent://SD_ILS/0/SD_ILS:1186419 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Bradley, Tony, 1969-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491143">https://www.sciencedirect.com/science/book/9781597491143</a><br/>Format:&#160;Elektronik Kaynak<br/> Aggressive network self-defense ent://SD_ILS/0/SD_ILS:930656 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Wyler, Neil R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=225321">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Google Hacking for Penetration Testers ent://SD_ILS/0/SD_ILS:939497 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Long, Johnny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294147">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking a terror network : the silent threat of covert channels ent://SD_ILS/0/SD_ILS:1188363 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Rogers, Russ.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994985">https://www.sciencedirect.com/science/book/9781928994985</a><br/>Format:&#160;Elektronik Kaynak<br/> Dr. Tom Shinder's configuring ISA Server 2004 ent://SD_ILS/0/SD_ILS:1188371 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Shinder, Thomas W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836197">http://www.sciencedirect.com/science/book/9781931836197</a><br/>Format:&#160;Elektronik Kaynak<br/> Aggressive network self-defense ent://SD_ILS/0/SD_ILS:1188490 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Wyler, Neil R.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">http://www.sciencedirect.com/science/book/9781931836203</a><br/>Format:&#160;Elektronik Kaynak<br/> Network and security issues for internet mobile entertainment ent://SD_ILS/0/SD_ILS:938596 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=289848">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Implementing homeland security for enterprise IT ent://SD_ILS/0/SD_ILS:1188099 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Erbschloe, Michael.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">http://www.sciencedirect.com/science/book/9781555583125</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security ent://SD_ILS/0/SD_ILS:1185399 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Zelkowitz, Marvin V., 1945-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780120121601">https://www.sciencedirect.com/science/book/9780120121601</a> ScienceDirect <a href="https://www.sciencedirect.com/science/bookseries/00652458/60">https://www.sciencedirect.com/science/bookseries/00652458/60</a> ScienceDirect <a href="https://www.sciencedirect.com/science/publication?issn=00652458&volume=60">https://www.sciencedirect.com/science/publication?issn=00652458&volume=60</a><br/>Format:&#160;Elektronik Kaynak<br/> Z/OS WebSphere and J2EE security handbook ent://SD_ILS/0/SD_ILS:1075315 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Wunderlich, Holger.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306620">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security secrets, intruders and ID tags. ent://SD_ILS/0/SD_ILS:1092043 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411447">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Internet security : a jumpstart for systems administrators and IT managers ent://SD_ILS/0/SD_ILS:1188090 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Speed, Tim.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582982">http://www.sciencedirect.com/science/book/9781555582982</a><br/>Format:&#160;Elektronik Kaynak<br/> Youth, pornography and the Internet ent://SD_ILS/0/SD_ILS:1082637 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Thornburgh, Dick.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3375234">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Special issue on internet security ent://SD_ILS/0/SD_ILS:931530 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Dhillon, Gurpreet.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=232281">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing your e-commerce site the only way to stop a hacker is to think like one ent://SD_ILS/0/SD_ILS:939503 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Russell, Ryan, 1969-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294156">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing your e-commerce site : the only way to stop a hacker is to think like one]. ent://SD_ILS/0/SD_ILS:1188342 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Russell, Ryan.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994275">http://www.sciencedirect.com/science/book/9781928994275</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing your Web applications ent://SD_ILS/0/SD_ILS:1188343 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Traxler, Julie.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994312">https://www.sciencedirect.com/science/book/9781928994312</a><br/>Format:&#160;Elektronik Kaynak<br/> Trust in cyberspace ent://SD_ILS/0/SD_ILS:1085960 2024-09-27T02:51:09Z 2024-09-27T02:51:09Z by&#160;Schneider, Fred B.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3378820">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/>