Arama Sonu&ccedil;lar&#305; - Daralt&#305;lm&#305;&#351;: Ba&#351;kent K&uuml;t&uuml;phanesi - 2016 - Computer networks -- Security measures. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLIBRARY$002509Library$0025091$00253ABASKENT$002509Ba$0025C5$00259Fkent$002bK$0025C3$0025BCt$0025C3$0025BCphanesi$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092016$0025092016$0026qf$003dSUBJECT$002509Konu$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300;jsessionid=53AB2B4395EE3D6CBA2113F11CBC023F? 2024-06-19T01:13:50Z Information hiding in communication networks : fundamentals, mechanisms, applications, and countermeasures ent://SD_ILS/0/SD_ILS:1107654 2024-06-19T01:13:50Z 2024-06-19T01:13:50Z by&#160;Mazurczyk, Wojciech, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4405578">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Essential skills for hackers ent://SD_ILS/0/SD_ILS:1104568 2024-06-19T01:13:50Z 2024-06-19T01:13:50Z by&#160;Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4189281">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> You : for sale protecting your personal data and privacy online ent://SD_ILS/0/SD_ILS:1053757 2024-06-19T01:13:50Z 2024-06-19T01:13:50Z by&#160;Sumner, Stuart, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2187472">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security and privacy in the digital era. Volume 1 ent://SD_ILS/0/SD_ILS:1115270 2024-06-19T01:13:50Z 2024-06-19T01:13:50Z by&#160;Guerrier, Claudine, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4648717">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security in fixed and wireless networks ent://SD_ILS/0/SD_ILS:1115585 2024-06-19T01:13:50Z 2024-06-19T01:13:50Z by&#160;Sch&auml;fer, G&uuml;nter, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4658592">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Advanced penetration testing for highly-secured environments. ent://SD_ILS/0/SD_ILS:1111214 2024-06-19T01:13:50Z 2024-06-19T01:13:50Z by&#160;Allen, Lee, 1946- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4520648">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Dns security : defending the domain name system ent://SD_ILS/0/SD_ILS:1113215 2024-06-19T01:13:50Z 2024-06-19T01:13:50Z by&#160;Liska, Allan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4556898">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Data breach preparation and response : breaches are certain, impact is not ent://SD_ILS/0/SD_ILS:1113216 2024-06-19T01:13:50Z 2024-06-19T01:13:50Z by&#160;Fowler, Kevvie, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4556899">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber guerilla ent://SD_ILS/0/SD_ILS:1113262 2024-06-19T01:13:50Z 2024-06-19T01:13:50Z by&#160;Haaster, Jelle van, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4557157">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> SSL and TLS : theory and practice ent://SD_ILS/0/SD_ILS:1124318 2024-06-19T01:13:50Z 2024-06-19T01:13:50Z by&#160;Oppliger, Rolf, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4821279">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Building a corporate culture of security : strategies for strengthening organizational resiliency ent://SD_ILS/0/SD_ILS:1108349 2024-06-19T01:13:50Z 2024-06-19T01:13:50Z by&#160;Sullivant, John, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4425984">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Malware diffusion models for modern complex networks : theory and applications ent://SD_ILS/0/SD_ILS:1108684 2024-06-19T01:13:50Z 2024-06-19T01:13:50Z by&#160;Karyotis, Vasileios, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4438752">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows registry forensics : advanced digital forensic analysis of the windows registry ent://SD_ILS/0/SD_ILS:1108686 2024-06-19T01:13:50Z 2024-06-19T01:13:50Z by&#160;Carvey, Harlan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4438754">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hiding behind the keyboard : uncovering covert communication methods with forensic analysis ent://SD_ILS/0/SD_ILS:1109062 2024-06-19T01:13:50Z 2024-06-19T01:13:50Z by&#160;Shavers, Brett, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4452264">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network performance and security : testing and analyzing using open source and low-cost tools ent://SD_ILS/0/SD_ILS:1109063 2024-06-19T01:13:50Z 2024-06-19T01:13:50Z by&#160;Chapman, Chris, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4452265">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/>