Arama Sonu&ccedil;lar&#305; - Daralt&#305;lm&#305;&#351;: Ba&#351;kent K&uuml;t&uuml;phanesi - Computer networks -- Security measures. - ProQuest (Firm) SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLIBRARY$002509Library$0025091$00253ABASKENT$002509Ba$0025C5$00259Fkent$002bK$0025C3$0025BCt$0025C3$0025BCphanesi$0026qf$003dSUBJECT$002509Konu$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dAUTHOR$002509Yazar$002509ProQuest$002b$002528Firm$002529$002509ProQuest$002b$002528Firm$002529$0026ps$003d300;jsessionid=543B9576364BAECDA2DACB9CEBD93350? 2024-06-15T10:02:48Z Network and system security ent://SD_ILS/0/SD_ILS:1018501 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1364061">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Biohackers the politics of open science ent://SD_ILS/0/SD_ILS:1088207 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Delfanti, Alessandro.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3386719">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Iris biometric model for secured network access ent://SD_ILS/0/SD_ILS:1012479 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Khoury, Franjieh El.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1177222">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:1014191 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1195617">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The benefits and security risks of web-based applications for business trend report ent://SD_ILS/0/SD_ILS:1014733 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Kotwica, Kathleen.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1210948">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Mobile access safety beyond BYOD ent://SD_ILS/0/SD_ILS:1008414 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Assing, Dominique.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1124007">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network intrusion analysis methodologies, tools, and techniques for incident analysis and response ent://SD_ILS/0/SD_ILS:1003376 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Fichera, Joe, 1966-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1058152">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> UTM security with Fortinet Mastering FortiOS ent://SD_ILS/0/SD_ILS:1003496 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Tam, Kenneth.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1068442">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Advanced persistent threat understanding the danger and how to protect your organization ent://SD_ILS/0/SD_ILS:1003921 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Cole, Eric.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073020">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice ent://SD_ILS/0/SD_ILS:1003926 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Winterfeld, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073026">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Federated identity primer ent://SD_ILS/0/SD_ILS:1004672 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Rountree, Derrick.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1081145">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking for dummies ent://SD_ILS/0/SD_ILS:1006251 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Beaver, Kevin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1106542">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Web application defender's cookbook battling hackers and protecting users ent://SD_ILS/0/SD_ILS:1006627 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Barnett, Ryan C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108733">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows 2012 server network security securing your windows network systems and infrastructure ent://SD_ILS/0/SD_ILS:1007610 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Rountree, Derrick.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115160">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Practical anonymity hiding in plain sight online ent://SD_ILS/0/SD_ILS:1007614 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Loshin, Peter.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115167">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Professional penetration testing creating and learning in a hacking lab ent://SD_ILS/0/SD_ILS:1007616 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Wilhelm, Thomas.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115172">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Applied cyber security and the smart grid implementing security controls into the modern power infrastructure ent://SD_ILS/0/SD_ILS:1007626 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Knapp, Eric D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115187">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Digital whoness identity, privacy and freedom in the cyberworld ent://SD_ILS/0/SD_ILS:1015068 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Capurro, Rafael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1215540">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of web hacking tools and techniques to attack the Web ent://SD_ILS/0/SD_ILS:1015545 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Pauli, Joshua J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1222592">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Instant Spring Security starter learn the fundamentals of web authentication and authorization using Spring Security ent://SD_ILS/0/SD_ILS:1016268 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Jagielski, Piotr.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1274894">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> American exceptionalism, the French exception, and digital media law ent://SD_ILS/0/SD_ILS:1018352 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Eko, Lyombe.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1358660">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Mastering windows network forensics and investigation ent://SD_ILS/0/SD_ILS:986549 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Anson, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=818114">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Asset protection through security awareness ent://SD_ILS/0/SD_ILS:987451 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Speed, Tyler Justin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826927">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Data mining tools for malware detection ent://SD_ILS/0/SD_ILS:987461 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Masud, Mehedy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826949">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows forensic analysis toolkit advanced analysis techniques for Windows 7 ent://SD_ILS/0/SD_ILS:989925 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Carvey, Harlan A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=850700">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> PCI compliance understand and implement effective PCI data security standard compliance ent://SD_ILS/0/SD_ILS:999631 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Williams, Branden R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=989201">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking web apps detecting and preventing web application security problems ent://SD_ILS/0/SD_ILS:1000371 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Shema, Mike.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1012529">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> SQL injection attacks and defense ent://SD_ILS/0/SD_ILS:997287 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Clarke, Justin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=953188">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Wiki at war conflict in a socially networked world ent://SD_ILS/0/SD_ILS:1063016 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Carafano, James Jay, 1955-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3038033">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber conflict competing national perspectives ent://SD_ILS/0/SD_ILS:1008510 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Ventre, Daniel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1124641">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The tangled Web a guide to securing modern Web applications ent://SD_ILS/0/SD_ILS:1009976 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137574">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Client-side attacks and defense ent://SD_ILS/0/SD_ILS:1001905 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Shimonski, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1036349">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security for service oriented systems ent://SD_ILS/0/SD_ILS:972345 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Thuraisingham, Bhavani M.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=631696">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Identity management concepts, technologies, and systems ent://SD_ILS/0/SD_ILS:972507 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Bertino, Elisa.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=634511">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer Forensics jumpstart ent://SD_ILS/0/SD_ILS:973680 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Solomon, Michael R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=661659">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security risk management building an information security risk management program from the ground up ent://SD_ILS/0/SD_ILS:976804 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Wheeler, Evan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=685406">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing the cloud cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:977055 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Winkler, J. R. (Joachim R.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=686827">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Use of risk analysis in computer-aided persuasion ent://SD_ILS/0/SD_ILS:988362 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Duman, Ekrem.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=836226">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Intrusion detection a machine learning approach ent://SD_ILS/0/SD_ILS:981161 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Tsai, Jeffrey J.-P.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=737642">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IBM WebSphere application server V7.0 security secure your WebSphere applications with Java EE and JAAS security standards ent://SD_ILS/0/SD_ILS:996260 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Siliceo, Omar.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=943983">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Moodle security learn how to install and configure Moodle in the most secure way possible ent://SD_ILS/0/SD_ILS:996265 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Mileti&#263;, Darko.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=943988">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> WordPress 3 ultimate security protect your WordPress site and its network ent://SD_ILS/0/SD_ILS:996789 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Connelly, Olly.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948509">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Oracle Identity and Access Manager 11g for administrators administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasks ent://SD_ILS/0/SD_ILS:996835 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Kumar, Atul.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948559">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Microsoft Forefront UAG 2010 administrator's handbook take full command of Microsoft Forefront Unified Access Gateway to secure your business applications and provide dynamic remote access with DirectAccess ent://SD_ILS/0/SD_ILS:996844 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Ben-Ari, Erez.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948568">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> BackTrack 4 assuring security by penetration testing : master the art of penetration testing with BackTrack ent://SD_ILS/0/SD_ILS:996968 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Ali, Shakeel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=950518">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Wars of disruption and resilience cybered conflict, power, and national security ent://SD_ILS/0/SD_ILS:1063343 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Demchak, Chris C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3039013">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> CMS security handbook the comprehensive guide for WordPress, Joomla!, Drupal, and Plone ent://SD_ILS/0/SD_ILS:979005 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Canavan, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706893">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Implementing SSL/TLS using cryptography and PKI ent://SD_ILS/0/SD_ILS:979007 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Davies, Joshua Dennis.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706899">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Web commerce security design and development ent://SD_ILS/0/SD_ILS:978975 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Nahari, Hadi.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706729">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Mac security bible ent://SD_ILS/0/SD_ILS:960377 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Kissell, Joe.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=477803">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IT audit, control, and security ent://SD_ILS/0/SD_ILS:972135 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Moeller, Robert R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=624573">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Adaptive security management architecture ent://SD_ILS/0/SD_ILS:972238 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=625004">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security in ad hoc and sensor networks ent://SD_ILS/0/SD_ILS:1030254 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Beyah, Raheem (Raheem A.), 1976-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1679353">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Managing information security ent://SD_ILS/0/SD_ILS:1018342 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1357643">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Unauthorised access physical penetration testing for IT security teams ent://SD_ILS/0/SD_ILS:958776 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Allsopp, Wil.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=470412">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:955637 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=453166">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> SSL and TLS theory and practice ent://SD_ILS/0/SD_ILS:996571 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Oppliger, Rolf.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=946557">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Practical embedded security building secure resource-constrained systems ent://SD_ILS/0/SD_ILS:942507 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Stapko, Timothy John.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=312846">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing information and communications systems principles, technologies, and applications ent://SD_ILS/0/SD_ILS:956326 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Furnell, Steven, 1970-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456881">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Fuzzing for software security testing and quality assurance ent://SD_ILS/0/SD_ILS:956329 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Takanen, Ari.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456884">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Aspects of network and information security ent://SD_ILS/0/SD_ILS:947147 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;NATO Advanced Study Institute on Network Security and Intrusion Detection (2005 : Yerevan, Armenia)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=363205">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information assurance dependability and security in networked systems ent://SD_ILS/0/SD_ILS:944016 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Qian, Yi, 1962-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328312">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IT compliance and controls best practices for implementation ent://SD_ILS/0/SD_ILS:945051 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;DeLuccia, James J., 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=335724">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Secure computer and network systems modeling, analysis and design ent://SD_ILS/0/SD_ILS:946385 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Ye, Nong.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=351427">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Implementing NAP and NAC security technologies the complete guide to network access control ent://SD_ILS/0/SD_ILS:946583 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Hoffman, Daniel (Daniel V.), 1972-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=353459">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Implementing 802.1X security solutions for wired and wireless networks ent://SD_ILS/0/SD_ILS:946579 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Geier, James T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=353449">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Joomla! web security secure your Joomla! website from common security threats with this easy-to-use guide ent://SD_ILS/0/SD_ILS:998781 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Canavan, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=978105">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Trust and security in collaborative computing ent://SD_ILS/0/SD_ILS:1030255 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Zou, Xukai, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1679354">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking the art of exploitation ent://SD_ILS/0/SD_ILS:1009955 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137538">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Techno security's guide to e-discovery and digital forensics ent://SD_ILS/0/SD_ILS:948015 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Wiles, Jack.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=405426">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows forensic analysis DVD toolkit, ent://SD_ILS/0/SD_ILS:944076 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Carvey, Harlan A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328624">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security assessment from vulnerability to patch ent://SD_ILS/0/SD_ILS:937038 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Manzuik, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=280219">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Integrated security systems design concepts, specifications, and implementation ent://SD_ILS/0/SD_ILS:938298 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Norman, Thomas L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=287955">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Developer's guide to web application security ent://SD_ILS/0/SD_ILS:938521 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Cross, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=289735">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The misuse of information systems the impact of security countermeasures ent://SD_ILS/0/SD_ILS:1058044 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;D'Arcy, John P., 1975-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3016826">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security data visualization graphical techniques for network analysis ent://SD_ILS/0/SD_ILS:1058454 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Conti, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3017625">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security in distributed and networking systems ent://SD_ILS/0/SD_ILS:1013897 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Pan, Yi, 1960-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1193126">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Toward a safer and more secure cyberspace ent://SD_ILS/0/SD_ILS:1085452 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Goodman, Seymour E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3378311">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasures ent://SD_ILS/0/SD_ILS:939483 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Contos, Brian T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294116">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at designing security for a Windows Server 2003 network ent://SD_ILS/0/SD_ILS:933856 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Amini, Rob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254832">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security log management identifying patterns in the chaos ent://SD_ILS/0/SD_ILS:933857 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Babbin, Jacob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254833">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:933858 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Long, Johnny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254834">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing IM and P2P applications for the enterprise ent://SD_ILS/0/SD_ILS:933871 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Piccard, Paul L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254847">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Insider threat protecting the enterprise from sabotage, spying, and theft ent://SD_ILS/0/SD_ILS:933873 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Cole, Eric.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254849">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Configuring SonicWALL firewalls ent://SD_ILS/0/SD_ILS:934073 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Lathem, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=256369">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Designing and building enterprise DMZs ent://SD_ILS/0/SD_ILS:943348 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Flynn, Hal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=319198">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security for mobile networks and platforms ent://SD_ILS/0/SD_ILS:945204 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Aissi, Selim.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338731">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at managing information security ent://SD_ILS/0/SD_ILS:934742 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Osborne, Mark.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=266207">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Firewall policies and VPN configurations ent://SD_ILS/0/SD_ILS:935986 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Cantrell, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=272100">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Buffer overflow attacks detect, exploit, prevent ent://SD_ILS/0/SD_ILS:930207 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Foster, James C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=222803">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Configuring NetScreen Firewalls ent://SD_ILS/0/SD_ILS:939461 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Cameron, Rob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294055">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Dr. Tom Shinder's configuring ISA Server 2004 ent://SD_ILS/0/SD_ILS:939479 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294094">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Intrusion prevention and active response deploying network and host IPS ent://SD_ILS/0/SD_ILS:930714 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Henmi, Anne.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=226578">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Host integrity monitoring using Osiris and Samhain ent://SD_ILS/0/SD_ILS:931606 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Wotring, Brian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=233599">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cisco Pix firewalls configure, manage and troubleshoot ent://SD_ILS/0/SD_ILS:933859 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Behrens, Thorsten.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254835">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Nessus, Snort, &amp; Ethereal power tools customizing open source security applications ent://SD_ILS/0/SD_ILS:933863 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Archibald, Neil.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254839">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security evaluation using the NSA IEM ent://SD_ILS/0/SD_ILS:933866 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Fuller, Ed.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254842">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Silence on the wire a field guide to passive reconnaissance and indirect attacks ent://SD_ILS/0/SD_ILS:936579 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273504">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> WebSphere application server for z/OS V5 and J2EE 1.3 security handbook ent://SD_ILS/0/SD_ILS:1075077 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Allison, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306382">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> z/OS 1.6 security services update ent://SD_ILS/0/SD_ILS:1075148 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Kappeler, Patrick.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306453">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Secure production deployment of B2B solutions using WebSphere business integration connect ent://SD_ILS/0/SD_ILS:1075151 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Putte, Geert van de.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306456">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Identity and access management solutions using WebSphere Portal V5.1, Tivoli Identity Manager V4.5.1, and Tivoli Access Manager V5.1 ent://SD_ILS/0/SD_ILS:1075241 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Ganci, John.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306546">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Distributed security and high availability with Tivoli Access Manager and WebSphere Application Server for z/OS ent://SD_ILS/0/SD_ILS:1075297 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Davies, Saida.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306602">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IBM system z9 109 technical introduction ent://SD_ILS/0/SD_ILS:1075277 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Ogden, Bill.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306582">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> z/OS diagnostic data collection and analysis ent://SD_ILS/0/SD_ILS:1075465 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Rogers, Paul.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306770">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Innocent code a security wake-up call for Web programmers ent://SD_ILS/0/SD_ILS:929474 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Huseby, Sverre H.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=210558">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Implementing SSH strategies for optimizing the Secure Shell ent://SD_ILS/0/SD_ILS:929721 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Dwivedi, Himanshu.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=215119">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Virtual private networking a construction, operation and utilization guide ent://SD_ILS/0/SD_ILS:958798 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Held, Gilbert, 1943-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=470565">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Ethereal packet sniffing ent://SD_ILS/0/SD_ILS:939485 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Orebaugh, Angela.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294122">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking the code ASP. NET web application security ent://SD_ILS/0/SD_ILS:939506 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Burnett, Mark (Mark M.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294160">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> MCSE designing security for a Windows Server 2003 network : exam 70-298 study guide &amp; DVD training system ent://SD_ILS/0/SD_ILS:939533 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Khnaser, Elias N.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294253">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber adversary characterization auditing the hacker mind ent://SD_ILS/0/SD_ILS:939469 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Parker, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294071">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Nessus network auditing ent://SD_ILS/0/SD_ILS:939540 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Beale, Jay.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294281">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security sage's guide to hardening the network infrastructure ent://SD_ILS/0/SD_ILS:939571 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Andr&eacute;s, Steven.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294359">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Defense and detection strategies against Internet worms ent://SD_ILS/0/SD_ILS:931019 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Nazario, Jose.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227660">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at Configuring ISA Server 2004 ent://SD_ILS/0/SD_ILS:933877 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Shinder, Dr. Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254853">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security foundations ent://SD_ILS/0/SD_ILS:935040 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Strebe, Matthew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=267332">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network and security issues for internet mobile entertainment ent://SD_ILS/0/SD_ILS:938596 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=289848">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Implementing PKI Services on z/OS ent://SD_ILS/0/SD_ILS:1075572 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306877">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Internet applications the emerging global computer. ent://SD_ILS/0/SD_ILS:1092046 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411450">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Building DMZs for Enterprise networks ent://SD_ILS/0/SD_ILS:939444 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Shimonski, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294015">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cisco security professional's guide to secure intrusion detection systems ent://SD_ILS/0/SD_ILS:939451 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294035">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Configuring Symantec Antivirus, Corporate Edition ent://SD_ILS/0/SD_ILS:939462 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Hunter, Laura E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294056">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Best damn firewall book period ent://SD_ILS/0/SD_ILS:939585 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294396">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Snort 2.0 intrusion detection ent://SD_ILS/0/SD_ILS:939575 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Beale, Jay.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294371">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Special ops host and Network security for Microsoft, UNIX, and Oracle ent://SD_ILS/0/SD_ILS:939577 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Birkholz, Erik Pace.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294373">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security a practical guide ent://SD_ILS/0/SD_ILS:940334 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Poole, Owen.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=298471">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity operations handbook ent://SD_ILS/0/SD_ILS:942613 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Rittinghouse, John W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=313612">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking the art of exploitation ent://SD_ILS/0/SD_ILS:936567 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273488">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Z/OS WebSphere and J2EE security handbook ent://SD_ILS/0/SD_ILS:1075315 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Wunderlich, Holger.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306620">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security configuration in a TCP/IP Sysplex environment ent://SD_ILS/0/SD_ILS:1075356 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306661">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Enterprise business portals II with IBM tivoli access manager ent://SD_ILS/0/SD_ILS:1075452 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;B&uuml;cker, Axel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306757">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The Internet under crisis conditions learning from September 11 ent://SD_ILS/0/SD_ILS:1082772 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3375369">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> ExamWise for CIW security professional exam 1D0-470 ent://SD_ILS/0/SD_ILS:1091942 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Bayer, Chad M.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3410580">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security secrets, intruders and ID tags. ent://SD_ILS/0/SD_ILS:1092043 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411447">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing ColdFusion ent://SD_ILS/0/SD_ILS:939498 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Meyer, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294151">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing your network ent://SD_ILS/0/SD_ILS:939504 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Ahmad, David R. Mirza.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294158">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cisco security specialist's guide to PIX Firewall ent://SD_ILS/0/SD_ILS:939452 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Osipov, Vitaly.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294036">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Managing Cisco network security ent://SD_ILS/0/SD_ILS:939524 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Danielyan, Edgar.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294234">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Nokia Network security solutions handbook ent://SD_ILS/0/SD_ILS:939542 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Maxwell, Douglas D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294289">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Introduction to communication electronic warfare systems ent://SD_ILS/0/SD_ILS:930979 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Poisel, Richard.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227618">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security jumpstart ent://SD_ILS/0/SD_ILS:936008 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Strebe, Matthew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=272216">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity today and tomorrow pay now or pay later ent://SD_ILS/0/SD_ILS:1082583 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3375180">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing Windows 2000 ent://SD_ILS/0/SD_ILS:939501 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Todd, Chad.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294154">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing your wireless network ent://SD_ILS/0/SD_ILS:939507 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Owens, Les.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294161">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Configuring ISA server 2000 building firewalls for windows 2000 ent://SD_ILS/0/SD_ILS:939460 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294054">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Trust in cyberspace ent://SD_ILS/0/SD_ILS:1085960 2024-06-15T10:02:48Z 2024-06-15T10:02:48Z by&#160;Schneider, Fred B.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3378820">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/>