Arama Sonuçları - Daraltılmış: 2005 - Computer security.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dPUBDATE$002509Publication$002bDate$0025092005$0025092005$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300;jsessionid=7BD94A81740D75D875C7A50675A2CC1D?2024-05-21T09:50:59ZAldatma sanatı : güvenliğin insan boyutunun kullanılmasıent://SD_ILS/0/SD_ILS:2829292024-05-21T09:50:59Z2024-05-21T09:50:59Zby Mitnick, Kevin D.<br/>Format: Kitap<br/>Fikir ve sanat eserlerinin korunması : (protection of intellectual property rights)ent://SD_ILS/0/SD_ILS:1233462024-05-21T09:50:59Z2024-05-21T09:50:59Zby Sert, Selin<br/>Format: Kitap<br/>Implementing database security and auditingent://SD_ILS/0/SD_ILS:9380792024-05-21T09:50:59Z2024-05-21T09:50:59Zby Ben-Natan, Ron.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=286701">Click to View</a><br/>Format: Elektronik Kaynak<br/>Dr. Tom Shinder's configuring ISA Server 2004ent://SD_ILS/0/SD_ILS:9394792024-05-21T09:50:59Z2024-05-21T09:50:59Zby Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294094">Click to View</a><br/>Format: Elektronik Kaynak<br/>Google Hacking for Penetration Testersent://SD_ILS/0/SD_ILS:9394972024-05-21T09:50:59Z2024-05-21T09:50:59Zby Long, Johnny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294147">Click to View</a><br/>Format: Elektronik Kaynak<br/>Risk management for computer security Protecting your network and information assetsent://SD_ILS/0/SD_ILS:9396582024-05-21T09:50:59Z2024-05-21T09:50:59Zby Jones, Andy, 1952-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294671">Click to View</a><br/>Format: Elektronik Kaynak<br/>Basics of contemporary cryptography for IT practitionersent://SD_ILS/0/SD_ILS:9399792024-05-21T09:50:59Z2024-05-21T09:50:59Zby Ryabko, Boris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=296069">Click to View</a><br/>Format: Elektronik Kaynak<br/>Buffer overflow attacks detect, exploit, preventent://SD_ILS/0/SD_ILS:9302072024-05-21T09:50:59Z2024-05-21T09:50:59Zby Foster, James C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=222803">Click to View</a><br/>Format: Elektronik Kaynak<br/>Black hat physical device security exploiting hardware and softwareent://SD_ILS/0/SD_ILS:9302092024-05-21T09:50:59Z2024-05-21T09:50:59Zby Miller, Drew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=222851">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber spying tracking your family's (sometimes) secret online livesent://SD_ILS/0/SD_ILS:9302102024-05-21T09:50:59Z2024-05-21T09:50:59Zby Fair, Ted.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=222853">Click to View</a><br/>Format: Elektronik Kaynak<br/>Sockets, shellcode, porting & coding reverse engineering exploits and tool coding for security professionalsent://SD_ILS/0/SD_ILS:9307132024-05-21T09:50:59Z2024-05-21T09:50:59Zby Foster, James C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=226568">Click to View</a><br/>Format: Elektronik Kaynak<br/>Intrusion prevention and active response deploying network and host IPSent://SD_ILS/0/SD_ILS:9307142024-05-21T09:50:59Z2024-05-21T09:50:59Zby Henmi, Anne.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=226578">Click to View</a><br/>Format: Elektronik Kaynak<br/>InfoSec career hacking sell your skillz, not your soulent://SD_ILS/0/SD_ILS:9308102024-05-21T09:50:59Z2024-05-21T09:50:59Zby Bayles, Aaron W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227231">Click to View</a><br/>Format: Elektronik Kaynak<br/>Reversing secrets of reverse engineeringent://SD_ILS/0/SD_ILS:9308762024-05-21T09:50:59Z2024-05-21T09:50:59Zby Eilam, Eldad.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227440">Click to View</a><br/>Format: Elektronik Kaynak<br/>Aggressive network self-defenseent://SD_ILS/0/SD_ILS:9306562024-05-21T09:50:59Z2024-05-21T09:50:59Zby Wyler, Neil R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=225321">Click to View</a><br/>Format: Elektronik Kaynak<br/>User's guide to cryptography and standardsent://SD_ILS/0/SD_ILS:9310172024-05-21T09:50:59Z2024-05-21T09:50:59Zby Dent, Alexander W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227658">Click to View</a><br/>Format: Elektronik Kaynak<br/>Contemporary cryptographyent://SD_ILS/0/SD_ILS:9312872024-05-21T09:50:59Z2024-05-21T09:50:59Zby Oppliger, Rolf.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=231638">Click to View</a><br/>Format: Elektronik Kaynak<br/>Host integrity monitoring using Osiris and Samhainent://SD_ILS/0/SD_ILS:9316062024-05-21T09:50:59Z2024-05-21T09:50:59Zby Wotring, Brian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=233599">Click to View</a><br/>Format: Elektronik Kaynak<br/>Nessus, Snort, & Ethereal power tools customizing open source security applicationsent://SD_ILS/0/SD_ILS:9338632024-05-21T09:50:59Z2024-05-21T09:50:59Zby Archibald, Neil.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254839">Click to View</a><br/>Format: Elektronik Kaynak<br/>Software piracy exposedent://SD_ILS/0/SD_ILS:9338642024-05-21T09:50:59Z2024-05-21T09:50:59Zby Honick, Ron.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254840">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network security evaluation using the NSA IEMent://SD_ILS/0/SD_ILS:9338662024-05-21T09:50:59Z2024-05-21T09:50:59Zby Fuller, Ed.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254842">Click to View</a><br/>Format: Elektronik Kaynak<br/>Silence on the wire a field guide to passive reconnaissance and indirect attacksent://SD_ILS/0/SD_ILS:9365792024-05-21T09:50:59Z2024-05-21T09:50:59Zby Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273504">Click to View</a><br/>Format: Elektronik Kaynak<br/>Multilevel security and DB2 row-level security revealedent://SD_ILS/0/SD_ILS:10751592024-05-21T09:50:59Z2024-05-21T09:50:59Zby Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306464">Click to View</a><br/>Format: Elektronik Kaynak<br/>Federated identity management and web services security with IBM tivoli security solutionsent://SD_ILS/0/SD_ILS:10752162024-05-21T09:50:59Z2024-05-21T09:50:59Zby Bücker, Axel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306521">Click to View</a><br/>Format: Elektronik Kaynak<br/>IBM rational application developer V6 portlet application development and portal toolsent://SD_ILS/0/SD_ILS:10752422024-05-21T09:50:59Z2024-05-21T09:50:59Zby Rodriguez, Juan R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306547">Click to View</a><br/>Format: Elektronik Kaynak<br/>Implementing database security and auditing : a guide for DBAs, information security administrators and auditorsent://SD_ILS/0/SD_ILS:11881152024-05-21T09:50:59Z2024-05-21T09:50:59Zby Ben-Natan, Ron.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">http://www.sciencedirect.com/science/book/9781555583347</a><br/>Format: Elektronik Kaynak<br/>Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionalsent://SD_ILS/0/SD_ILS:11882422024-05-21T09:50:59Z2024-05-21T09:50:59Zby Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490054">http://www.sciencedirect.com/science/book/9781597490054</a><br/>Format: Elektronik Kaynak<br/>Stealing the network : how to own an identityent://SD_ILS/0/SD_ILS:11882432024-05-21T09:50:59Z2024-05-21T09:50:59Zby Alder, Raven.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490061">https://www.sciencedirect.com/science/book/9781597490061</a><br/>Format: Elektronik Kaynak<br/>InfoSec career hacking : sell your skillz, not your soulent://SD_ILS/0/SD_ILS:11882442024-05-21T09:50:59Z2024-05-21T09:50:59Zby Bayles, Aaron W.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490115">https://www.sciencedirect.com/science/book/9781597490115</a><br/>Format: Elektronik Kaynak<br/>Host integrity monitoring : using Osiris and Samhainent://SD_ILS/0/SD_ILS:11882452024-05-21T09:50:59Z2024-05-21T09:50:59Zby Wotring, Brian.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490184">http://www.sciencedirect.com/science/book/9781597490184</a><br/>Format: Elektronik Kaynak<br/>Hacking a terror network : the silent threat of covert channelsent://SD_ILS/0/SD_ILS:11883632024-05-21T09:50:59Z2024-05-21T09:50:59Zby Rogers, Russ.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994985">https://www.sciencedirect.com/science/book/9781928994985</a><br/>Format: Elektronik Kaynak<br/>Cyber spying : tracking your family's (sometimes) secret online livesent://SD_ILS/0/SD_ILS:11883792024-05-21T09:50:59Z2024-05-21T09:50:59Zby Fair, Ted.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836418">https://www.sciencedirect.com/science/book/9781931836418</a><br/>Format: Elektronik Kaynak<br/>Intrusion prevention and active response : deploying network and host IPSent://SD_ILS/0/SD_ILS:11884002024-05-21T09:50:59Z2024-05-21T09:50:59Zby Rash, Michael.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266474">http://www.sciencedirect.com/science/book/9781932266474</a><br/>Format: Elektronik Kaynak<br/>Buffer overflow attacks : detect, exploit, preventent://SD_ILS/0/SD_ILS:11884072024-05-21T09:50:59Z2024-05-21T09:50:59Zby Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266672">http://www.sciencedirect.com/science/book/9781932266672</a><br/>Format: Elektronik Kaynak<br/>Black Hat physical device security : exploiting hardware and softwareent://SD_ILS/0/SD_ILS:11884102024-05-21T09:50:59Z2024-05-21T09:50:59Zby Miller, Drew, 1978-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266818">http://www.sciencedirect.com/science/book/9781932266818</a><br/>Format: Elektronik Kaynak<br/>Software piracy exposedent://SD_ILS/0/SD_ILS:11884172024-05-21T09:50:59Z2024-05-21T09:50:59Zby Craig, Paul.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781932266986">https://www.sciencedirect.com/science/book/9781932266986</a><br/>Format: Elektronik Kaynak<br/>Aggressive network self-defenseent://SD_ILS/0/SD_ILS:11884902024-05-21T09:50:59Z2024-05-21T09:50:59Zby Wyler, Neil R.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">http://www.sciencedirect.com/science/book/9781931836203</a><br/>Format: Elektronik Kaynak<br/>IM, instant messaging, securityent://SD_ILS/0/SD_ILS:11856392024-05-21T09:50:59Z2024-05-21T09:50:59Zby Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583385">http://www.sciencedirect.com/science/book/9781555583385</a><br/>Format: Elektronik Kaynak<br/>Her yönüyle elektronik imza : e-imzaent://SD_ILS/0/SD_ILS:12190912024-05-21T09:50:59Z2024-05-21T09:50:59Zby Sağıroğlu, Şeref, Doç. Dr., yazar.<br/>Format: Kitap<br/>