Arama Sonu&ccedil;lar&#305; - Daralt&#305;lm&#305;&#351;: 2004 - Computer networks -- Security measures. - Ebook Central SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dPUBDATE$002509Publication$002bDate$0025092004$0025092004$0026qf$003dSUBJECT$002509Konu$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dLOCATION$002509Lokasyon$0025091$00253AEBOOKCENT$002509Ebook$002bCentral$0026ps$003d300? 2024-06-06T12:46:55Z Virtual private networking a construction, operation and utilization guide ent://SD_ILS/0/SD_ILS:958798 2024-06-06T12:46:55Z 2024-06-06T12:46:55Z by&#160;Held, Gilbert, 1943-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=470565">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Implementing PKI Services on z/OS ent://SD_ILS/0/SD_ILS:1075572 2024-06-06T12:46:55Z 2024-06-06T12:46:55Z by&#160;Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306877">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Internet applications the emerging global computer. ent://SD_ILS/0/SD_ILS:1092046 2024-06-06T12:46:55Z 2024-06-06T12:46:55Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411450">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at Configuring ISA Server 2004 ent://SD_ILS/0/SD_ILS:933877 2024-06-06T12:46:55Z 2024-06-06T12:46:55Z by&#160;Shinder, Dr. Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254853">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security foundations ent://SD_ILS/0/SD_ILS:935040 2024-06-06T12:46:55Z 2024-06-06T12:46:55Z by&#160;Strebe, Matthew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=267332">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Innocent code a security wake-up call for Web programmers ent://SD_ILS/0/SD_ILS:929474 2024-06-06T12:46:55Z 2024-06-06T12:46:55Z by&#160;Huseby, Sverre H.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=210558">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Implementing SSH strategies for optimizing the Secure Shell ent://SD_ILS/0/SD_ILS:929721 2024-06-06T12:46:55Z 2024-06-06T12:46:55Z by&#160;Dwivedi, Himanshu.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=215119">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Defense and detection strategies against Internet worms ent://SD_ILS/0/SD_ILS:931019 2024-06-06T12:46:55Z 2024-06-06T12:46:55Z by&#160;Nazario, Jose.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227660">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Ethereal packet sniffing ent://SD_ILS/0/SD_ILS:939485 2024-06-06T12:46:55Z 2024-06-06T12:46:55Z by&#160;Orebaugh, Angela.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294122">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking the code ASP. NET web application security ent://SD_ILS/0/SD_ILS:939506 2024-06-06T12:46:55Z 2024-06-06T12:46:55Z by&#160;Burnett, Mark (Mark M.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294160">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> MCSE designing security for a Windows Server 2003 network : exam 70-298 study guide &amp; DVD training system ent://SD_ILS/0/SD_ILS:939533 2024-06-06T12:46:55Z 2024-06-06T12:46:55Z by&#160;Khnaser, Elias N.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294253">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Nessus network auditing ent://SD_ILS/0/SD_ILS:939540 2024-06-06T12:46:55Z 2024-06-06T12:46:55Z by&#160;Beale, Jay.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294281">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber adversary characterization auditing the hacker mind ent://SD_ILS/0/SD_ILS:939469 2024-06-06T12:46:55Z 2024-06-06T12:46:55Z by&#160;Parker, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294071">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security sage's guide to hardening the network infrastructure ent://SD_ILS/0/SD_ILS:939571 2024-06-06T12:46:55Z 2024-06-06T12:46:55Z by&#160;Andr&eacute;s, Steven.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294359">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network and security issues for internet mobile entertainment ent://SD_ILS/0/SD_ILS:938596 2024-06-06T12:46:55Z 2024-06-06T12:46:55Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=289848">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/>