Arama Sonu&ccedil;lar&#305; - Daralt&#305;lm&#305;&#351;: 2005 - Computer security. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dPUBDATE$002509Publication$002bDate$0025092005$0025092005$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300;jsessionid=7BD94A81740D75D875C7A50675A2CC1D? 2024-05-21T09:50:59Z Aldatma sanat&#305; : g&uuml;venli&#287;in insan boyutunun kullan&#305;lmas&#305; ent://SD_ILS/0/SD_ILS:282929 2024-05-21T09:50:59Z 2024-05-21T09:50:59Z by&#160;Mitnick, Kevin D.<br/>Format:&#160;Kitap<br/> Fikir ve sanat eserlerinin korunmas&#305; : (protection of intellectual property rights) ent://SD_ILS/0/SD_ILS:123346 2024-05-21T09:50:59Z 2024-05-21T09:50:59Z by&#160;Sert, Selin<br/>Format:&#160;Kitap<br/> Implementing database security and auditing ent://SD_ILS/0/SD_ILS:938079 2024-05-21T09:50:59Z 2024-05-21T09:50:59Z by&#160;Ben-Natan, Ron.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=286701">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Dr. Tom Shinder's configuring ISA Server 2004 ent://SD_ILS/0/SD_ILS:939479 2024-05-21T09:50:59Z 2024-05-21T09:50:59Z by&#160;Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294094">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Google Hacking for Penetration Testers ent://SD_ILS/0/SD_ILS:939497 2024-05-21T09:50:59Z 2024-05-21T09:50:59Z by&#160;Long, Johnny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294147">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Risk management for computer security Protecting your network and information assets ent://SD_ILS/0/SD_ILS:939658 2024-05-21T09:50:59Z 2024-05-21T09:50:59Z by&#160;Jones, Andy, 1952-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294671">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Basics of contemporary cryptography for IT practitioners ent://SD_ILS/0/SD_ILS:939979 2024-05-21T09:50:59Z 2024-05-21T09:50:59Z by&#160;Ryabko, Boris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=296069">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Buffer overflow attacks detect, exploit, prevent ent://SD_ILS/0/SD_ILS:930207 2024-05-21T09:50:59Z 2024-05-21T09:50:59Z by&#160;Foster, James C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=222803">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Black hat physical device security exploiting hardware and software ent://SD_ILS/0/SD_ILS:930209 2024-05-21T09:50:59Z 2024-05-21T09:50:59Z by&#160;Miller, Drew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=222851">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber spying tracking your family's (sometimes) secret online lives ent://SD_ILS/0/SD_ILS:930210 2024-05-21T09:50:59Z 2024-05-21T09:50:59Z by&#160;Fair, Ted.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=222853">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Sockets, shellcode, porting &amp; coding reverse engineering exploits and tool coding for security professionals ent://SD_ILS/0/SD_ILS:930713 2024-05-21T09:50:59Z 2024-05-21T09:50:59Z by&#160;Foster, James C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=226568">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Intrusion prevention and active response deploying network and host IPS ent://SD_ILS/0/SD_ILS:930714 2024-05-21T09:50:59Z 2024-05-21T09:50:59Z by&#160;Henmi, Anne.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=226578">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> InfoSec career hacking sell your skillz, not your soul ent://SD_ILS/0/SD_ILS:930810 2024-05-21T09:50:59Z 2024-05-21T09:50:59Z by&#160;Bayles, Aaron W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227231">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Reversing secrets of reverse engineering ent://SD_ILS/0/SD_ILS:930876 2024-05-21T09:50:59Z 2024-05-21T09:50:59Z by&#160;Eilam, Eldad.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227440">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Aggressive network self-defense ent://SD_ILS/0/SD_ILS:930656 2024-05-21T09:50:59Z 2024-05-21T09:50:59Z by&#160;Wyler, Neil R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=225321">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> User's guide to cryptography and standards ent://SD_ILS/0/SD_ILS:931017 2024-05-21T09:50:59Z 2024-05-21T09:50:59Z by&#160;Dent, Alexander W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227658">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Contemporary cryptography ent://SD_ILS/0/SD_ILS:931287 2024-05-21T09:50:59Z 2024-05-21T09:50:59Z by&#160;Oppliger, Rolf.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=231638">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Host integrity monitoring using Osiris and Samhain ent://SD_ILS/0/SD_ILS:931606 2024-05-21T09:50:59Z 2024-05-21T09:50:59Z by&#160;Wotring, Brian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=233599">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Nessus, Snort, &amp; Ethereal power tools customizing open source security applications ent://SD_ILS/0/SD_ILS:933863 2024-05-21T09:50:59Z 2024-05-21T09:50:59Z by&#160;Archibald, Neil.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254839">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Software piracy exposed ent://SD_ILS/0/SD_ILS:933864 2024-05-21T09:50:59Z 2024-05-21T09:50:59Z by&#160;Honick, Ron.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254840">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security evaluation using the NSA IEM ent://SD_ILS/0/SD_ILS:933866 2024-05-21T09:50:59Z 2024-05-21T09:50:59Z by&#160;Fuller, Ed.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254842">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Silence on the wire a field guide to passive reconnaissance and indirect attacks ent://SD_ILS/0/SD_ILS:936579 2024-05-21T09:50:59Z 2024-05-21T09:50:59Z by&#160;Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273504">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Multilevel security and DB2 row-level security revealed ent://SD_ILS/0/SD_ILS:1075159 2024-05-21T09:50:59Z 2024-05-21T09:50:59Z by&#160;Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306464">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Federated identity management and web services security with IBM tivoli security solutions ent://SD_ILS/0/SD_ILS:1075216 2024-05-21T09:50:59Z 2024-05-21T09:50:59Z by&#160;B&uuml;cker, Axel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306521">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IBM rational application developer V6 portlet application development and portal tools ent://SD_ILS/0/SD_ILS:1075242 2024-05-21T09:50:59Z 2024-05-21T09:50:59Z by&#160;Rodriguez, Juan R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306547">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Implementing database security and auditing : a guide for DBAs, information security administrators and auditors ent://SD_ILS/0/SD_ILS:1188115 2024-05-21T09:50:59Z 2024-05-21T09:50:59Z by&#160;Ben-Natan, Ron.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">http://www.sciencedirect.com/science/book/9781555583347</a><br/>Format:&#160;Elektronik Kaynak<br/> Sockets, shellcode, porting &amp; coding : reverse engineering exploits and tool coding for security professionals ent://SD_ILS/0/SD_ILS:1188242 2024-05-21T09:50:59Z 2024-05-21T09:50:59Z by&#160;Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490054">http://www.sciencedirect.com/science/book/9781597490054</a><br/>Format:&#160;Elektronik Kaynak<br/> Stealing the network : how to own an identity ent://SD_ILS/0/SD_ILS:1188243 2024-05-21T09:50:59Z 2024-05-21T09:50:59Z by&#160;Alder, Raven.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490061">https://www.sciencedirect.com/science/book/9781597490061</a><br/>Format:&#160;Elektronik Kaynak<br/> InfoSec career hacking : sell your skillz, not your soul ent://SD_ILS/0/SD_ILS:1188244 2024-05-21T09:50:59Z 2024-05-21T09:50:59Z by&#160;Bayles, Aaron W.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490115">https://www.sciencedirect.com/science/book/9781597490115</a><br/>Format:&#160;Elektronik Kaynak<br/> Host integrity monitoring : using Osiris and Samhain ent://SD_ILS/0/SD_ILS:1188245 2024-05-21T09:50:59Z 2024-05-21T09:50:59Z by&#160;Wotring, Brian.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490184">http://www.sciencedirect.com/science/book/9781597490184</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking a terror network : the silent threat of covert channels ent://SD_ILS/0/SD_ILS:1188363 2024-05-21T09:50:59Z 2024-05-21T09:50:59Z by&#160;Rogers, Russ.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994985">https://www.sciencedirect.com/science/book/9781928994985</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber spying : tracking your family's (sometimes) secret online lives ent://SD_ILS/0/SD_ILS:1188379 2024-05-21T09:50:59Z 2024-05-21T09:50:59Z by&#160;Fair, Ted.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836418">https://www.sciencedirect.com/science/book/9781931836418</a><br/>Format:&#160;Elektronik Kaynak<br/> Intrusion prevention and active response : deploying network and host IPS ent://SD_ILS/0/SD_ILS:1188400 2024-05-21T09:50:59Z 2024-05-21T09:50:59Z by&#160;Rash, Michael.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266474">http://www.sciencedirect.com/science/book/9781932266474</a><br/>Format:&#160;Elektronik Kaynak<br/> Buffer overflow attacks : detect, exploit, prevent ent://SD_ILS/0/SD_ILS:1188407 2024-05-21T09:50:59Z 2024-05-21T09:50:59Z by&#160;Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266672">http://www.sciencedirect.com/science/book/9781932266672</a><br/>Format:&#160;Elektronik Kaynak<br/> Black Hat physical device security : exploiting hardware and software ent://SD_ILS/0/SD_ILS:1188410 2024-05-21T09:50:59Z 2024-05-21T09:50:59Z by&#160;Miller, Drew, 1978-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266818">http://www.sciencedirect.com/science/book/9781932266818</a><br/>Format:&#160;Elektronik Kaynak<br/> Software piracy exposed ent://SD_ILS/0/SD_ILS:1188417 2024-05-21T09:50:59Z 2024-05-21T09:50:59Z by&#160;Craig, Paul.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781932266986">https://www.sciencedirect.com/science/book/9781932266986</a><br/>Format:&#160;Elektronik Kaynak<br/> Aggressive network self-defense ent://SD_ILS/0/SD_ILS:1188490 2024-05-21T09:50:59Z 2024-05-21T09:50:59Z by&#160;Wyler, Neil R.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">http://www.sciencedirect.com/science/book/9781931836203</a><br/>Format:&#160;Elektronik Kaynak<br/> IM, instant messaging, security ent://SD_ILS/0/SD_ILS:1185639 2024-05-21T09:50:59Z 2024-05-21T09:50:59Z by&#160;Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583385">http://www.sciencedirect.com/science/book/9781555583385</a><br/>Format:&#160;Elektronik Kaynak<br/> Her y&ouml;n&uuml;yle elektronik imza : e-imza ent://SD_ILS/0/SD_ILS:1219091 2024-05-21T09:50:59Z 2024-05-21T09:50:59Z by&#160;Sa&#287;&#305;ro&#287;lu, &#350;eref, Do&ccedil;. Dr., yazar.<br/>Format:&#160;Kitap<br/>