Arama Sonuçları - Daraltılmış: Başkent Kütüphanesi - 2015 - Computer networks -- Security measures.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLIBRARY$002509Library$0025091$00253ABASKENT$002509Ba$0025C5$00259Fkent$002bK$0025C3$0025BCt$0025C3$0025BCphanesi$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092015$0025092015$0026qf$003dSUBJECT$002509Konu$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300?2024-06-18T01:24:19ZIntroduction to network security : theory and practiceent://SD_ILS/0/SD_ILS:11031222024-06-18T01:24:19Z2024-06-18T01:24:19Zby Wang, Jie, 1961- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040040">Click to View</a><br/>Format: Elektronik Kaynak<br/>The network security test lab : a step-by-step guideent://SD_ILS/0/SD_ILS:11031432024-06-18T01:24:19Z2024-06-18T01:24:19Zby Gregg, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040350">Click to View</a><br/>Format: Elektronik Kaynak<br/>Building an intelligence-led security programent://SD_ILS/0/SD_ILS:10425612024-06-18T01:24:19Z2024-06-18T01:24:19Zby Liska, Allan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1888751">Click to View</a><br/>Format: Elektronik Kaynak<br/>How to define and build an effective cyber threat intelligence capabilityent://SD_ILS/0/SD_ILS:10425652024-06-18T01:24:19Z2024-06-18T01:24:19Zby Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1888755">Click to View</a><br/>Format: Elektronik Kaynak<br/>How to defeat advanced malware : new tools for protection and forensicsent://SD_ILS/0/SD_ILS:10425662024-06-18T01:24:19Z2024-06-18T01:24:19Zby Dalziel, Max, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1888756">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security intelligence : a practitioner's guide to solving enterprise security challengesent://SD_ILS/0/SD_ILS:10427352024-06-18T01:24:19Z2024-06-18T01:24:19Zby Li, Qing, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1895130">Click to View</a><br/>Format: Elektronik Kaynak<br/>Beyond cybersecurity : protecting your digital businessent://SD_ILS/0/SD_ILS:10427752024-06-18T01:24:19Z2024-06-18T01:24:19Zby Kaplan, James M., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1895275">Click to View</a><br/>Format: Elektronik Kaynak<br/>Understanding bitcoin : cryptography, engineering and economics.ent://SD_ILS/0/SD_ILS:10401802024-06-18T01:24:19Z2024-06-18T01:24:19Zby Franco, Pedro, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1823060">Click to View</a><br/>Format: Elektronik Kaynak<br/>PCI compliance : understand and implement effective PCI data security standard complianceent://SD_ILS/0/SD_ILS:10405702024-06-18T01:24:19Z2024-06-18T01:24:19Zby Williams, Branden R., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1832710">Click to View</a><br/>Format: Elektronik Kaynak<br/>Dissecting the hack : the V3rb0ten networkent://SD_ILS/0/SD_ILS:10530002024-06-18T01:24:19Z2024-06-18T01:24:19Zby Street, Jayson E., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2098440">Click to View</a><br/>Format: Elektronik Kaynak<br/>Web application security is a stack : how to CYA (Cover Your Apps) completelyent://SD_ILS/0/SD_ILS:10538362024-06-18T01:24:19Z2024-06-18T01:24:19Zby Vittie, Lori Mac, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192126">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computational network science : an algorithmic approachent://SD_ILS/0/SD_ILS:10381842024-06-18T01:24:19Z2024-06-18T01:24:19Zby Hexmoor, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1798312">Click to View</a><br/>Format: Elektronik Kaynak<br/>Managing online risk : apps, mobile, and social media securityent://SD_ILS/0/SD_ILS:10381762024-06-18T01:24:19Z2024-06-18T01:24:19Zby Gonzalez, Deborah, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1798304">Click to View</a><br/>Format: Elektronik Kaynak<br/>Two-factor authenticationent://SD_ILS/0/SD_ILS:10495352024-06-18T01:24:19Z2024-06-18T01:24:19Zby Stanislav, Mark, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2048577">Click to View</a><br/>Format: Elektronik Kaynak<br/>Python passive network mapping : P2NMAPent://SD_ILS/0/SD_ILS:10505042024-06-18T01:24:19Z2024-06-18T01:24:19Zby Hosmer, Chet, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2068785">Click to View</a><br/>Format: Elektronik Kaynak<br/>The defendeŕs dilemma : charting a course toward cybersecurityent://SD_ILS/0/SD_ILS:10508522024-06-18T01:24:19Z2024-06-18T01:24:19Zby Libicki, Martin C., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2075897">Click to View</a><br/>Format: Elektronik Kaynak<br/>Zabbix network monitoring essentials : your one-stop solution to efficient network monitoring with zabbixent://SD_ILS/0/SD_ILS:10460482024-06-18T01:24:19Z2024-06-18T01:24:19Zby Vacche, Andrea Dalle, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1973849">Click to View</a><br/>Format: Elektronik Kaynak<br/>Learning iOS security : enhance the security of your iOS platform and applications using iOS-centric security techniquesent://SD_ILS/0/SD_ILS:10460592024-06-18T01:24:19Z2024-06-18T01:24:19Zby Banks, Allister, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1973863">Click to View</a><br/>Format: Elektronik Kaynak<br/>Digital identity managementent://SD_ILS/0/SD_ILS:10473362024-06-18T01:24:19Z2024-06-18T01:24:19Zby Laurent, Maryline, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2007485">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security technology convergence insightsent://SD_ILS/0/SD_ILS:10475052024-06-18T01:24:19Z2024-06-18T01:24:19Zby Bernard, Ray, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2008287">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking web intelligence : open source intelligence and web reconnaissance concepts and techniquesent://SD_ILS/0/SD_ILS:10478512024-06-18T01:24:19Z2024-06-18T01:24:19Zby Chauhan, Sudhanshu, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2025500">Click to View</a><br/>Format: Elektronik Kaynak<br/>