Arama Sonu&ccedil;lar&#305; - Daralt&#305;lm&#305;&#351;: 2004 - Computer networks -- Security measures. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dPUBDATE$002509Publication$002bDate$0025092004$0025092004$0026qf$003dSUBJECT$002509Konu$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300;jsessionid=EBB96C0800BC3FA4925577B3F2D5DDB1? 2024-06-05T14:35:31Z Innocent code a security wake-up call for Web programmers ent://SD_ILS/0/SD_ILS:929474 2024-06-05T14:35:31Z 2024-06-05T14:35:31Z by&#160;Huseby, Sverre H.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=210558">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Implementing SSH strategies for optimizing the Secure Shell ent://SD_ILS/0/SD_ILS:929721 2024-06-05T14:35:31Z 2024-06-05T14:35:31Z by&#160;Dwivedi, Himanshu.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=215119">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Defense and detection strategies against Internet worms ent://SD_ILS/0/SD_ILS:931019 2024-06-05T14:35:31Z 2024-06-05T14:35:31Z by&#160;Nazario, Jose.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227660">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at Configuring ISA Server 2004 ent://SD_ILS/0/SD_ILS:933877 2024-06-05T14:35:31Z 2024-06-05T14:35:31Z by&#160;Shinder, Dr. Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254853">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security foundations ent://SD_ILS/0/SD_ILS:935040 2024-06-05T14:35:31Z 2024-06-05T14:35:31Z by&#160;Strebe, Matthew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=267332">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Ethereal packet sniffing ent://SD_ILS/0/SD_ILS:939485 2024-06-05T14:35:31Z 2024-06-05T14:35:31Z by&#160;Orebaugh, Angela.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294122">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking the code ASP. NET web application security ent://SD_ILS/0/SD_ILS:939506 2024-06-05T14:35:31Z 2024-06-05T14:35:31Z by&#160;Burnett, Mark (Mark M.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294160">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber adversary characterization auditing the hacker mind ent://SD_ILS/0/SD_ILS:939469 2024-06-05T14:35:31Z 2024-06-05T14:35:31Z by&#160;Parker, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294071">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> MCSE designing security for a Windows Server 2003 network : exam 70-298 study guide &amp; DVD training system ent://SD_ILS/0/SD_ILS:939533 2024-06-05T14:35:31Z 2024-06-05T14:35:31Z by&#160;Khnaser, Elias N.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294253">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Nessus network auditing ent://SD_ILS/0/SD_ILS:939540 2024-06-05T14:35:31Z 2024-06-05T14:35:31Z by&#160;Beale, Jay.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294281">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security sage's guide to hardening the network infrastructure ent://SD_ILS/0/SD_ILS:939571 2024-06-05T14:35:31Z 2024-06-05T14:35:31Z by&#160;Andr&eacute;s, Steven.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294359">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network and security issues for internet mobile entertainment ent://SD_ILS/0/SD_ILS:938596 2024-06-05T14:35:31Z 2024-06-05T14:35:31Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=289848">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Virtual private networking a construction, operation and utilization guide ent://SD_ILS/0/SD_ILS:958798 2024-06-05T14:35:31Z 2024-06-05T14:35:31Z by&#160;Held, Gilbert, 1943-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=470565">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Implementing PKI Services on z/OS ent://SD_ILS/0/SD_ILS:1075572 2024-06-05T14:35:31Z 2024-06-05T14:35:31Z by&#160;Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306877">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Internet applications the emerging global computer. ent://SD_ILS/0/SD_ILS:1092046 2024-06-05T14:35:31Z 2024-06-05T14:35:31Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411450">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security sage's guide to hardening the network infrastructure ent://SD_ILS/0/SD_ILS:1188364 2024-06-05T14:35:31Z 2024-06-05T14:35:31Z by&#160;Andr&eacute;s, Steven.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836012">https://www.sciencedirect.com/science/book/9781931836012</a><br/>Format:&#160;Elektronik Kaynak<br/> Snort 2.1 intrusion detection ent://SD_ILS/0/SD_ILS:1188366 2024-06-05T14:35:31Z 2024-06-05T14:35:31Z by&#160;Beale, Jay.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836043">https://www.sciencedirect.com/science/book/9781931836043</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber adversary characterization : auditing the hacker mind ent://SD_ILS/0/SD_ILS:1188369 2024-06-05T14:35:31Z 2024-06-05T14:35:31Z by&#160;Parker, Tom.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836111">http://www.sciencedirect.com/science/book/9781931836111</a><br/>Format:&#160;Elektronik Kaynak<br/> CYA : securing Exchange Server 2003 and Outlook Web Access : cover your a** by getting it right the first time ent://SD_ILS/0/SD_ILS:1188372 2024-06-05T14:35:31Z 2024-06-05T14:35:31Z by&#160;Walther, Henrik.<br/><a href="http://www.sciencedirect.com/science/book/9781931836258">Available from ScienceDirect. Online version available for university members only. This requires an institutional login off-campus</a> ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836241">http://www.sciencedirect.com/science/book/9781931836241</a><br/>Format:&#160;Elektronik Kaynak<br/> CYA : securing IIS 6.0 : cover your a** by getting it right the first time ent://SD_ILS/0/SD_ILS:1188373 2024-06-05T14:35:31Z 2024-06-05T14:35:31Z by&#160;Cheah, Chun Hai.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836258">http://www.sciencedirect.com/science/book/9781931836258</a><br/>Format:&#160;Elektronik Kaynak<br/> Zero day exploit : countdown to darkness ent://SD_ILS/0/SD_ILS:1188489 2024-06-05T14:35:31Z 2024-06-05T14:35:31Z by&#160;Shein, Rob.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836098">http://www.sciencedirect.com/science/book/9781931836098</a><br/>Format:&#160;Elektronik Kaynak<br/> Policy-based network management : solutions for the next generation ent://SD_ILS/0/SD_ILS:1188195 2024-06-05T14:35:31Z 2024-06-05T14:35:31Z by&#160;Strassner, John.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558608597">http://www.sciencedirect.com/science/book/9781558608597</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking the code : ASP.NET web application security ent://SD_ILS/0/SD_ILS:1188406 2024-06-05T14:35:31Z 2024-06-05T14:35:31Z by&#160;Burnett, Mark (Mark M.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266658">http://www.sciencedirect.com/science/book/9781932266658</a><br/>Format:&#160;Elektronik Kaynak<br/> Ethereal : packet sniffing ent://SD_ILS/0/SD_ILS:1188411 2024-06-05T14:35:31Z 2024-06-05T14:35:31Z by&#160;Orebaugh, Angela.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266825">http://www.sciencedirect.com/science/book/9781932266825</a><br/>Format:&#160;Elektronik Kaynak<br/> Managing and securing a Cisco structured wireless-aware network ent://SD_ILS/0/SD_ILS:1188415 2024-06-05T14:35:31Z 2024-06-05T14:35:31Z by&#160;Wall, David.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781932266917">https://www.sciencedirect.com/science/book/9781932266917</a><br/>Format:&#160;Elektronik Kaynak<br/> Implementing homeland security for enterprise IT ent://SD_ILS/0/SD_ILS:1188099 2024-06-05T14:35:31Z 2024-06-05T14:35:31Z by&#160;Erbschloe, Michael.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">http://www.sciencedirect.com/science/book/9781555583125</a><br/>Format:&#160;Elektronik Kaynak<br/> Wireless operational security ent://SD_ILS/0/SD_ILS:1188104 2024-06-05T14:35:31Z 2024-06-05T14:35:31Z by&#160;Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583170">http://www.sciencedirect.com/science/book/9781555583170</a> ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583170">https://www.sciencedirect.com/science/book/9781555583170</a><br/>Format:&#160;Elektronik Kaynak<br/>