Arama Sonu&ccedil;lar&#305; - Daralt&#305;lm&#305;&#351;: 2014 - Computer networks -- Security measures. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dPUBDATE$002509Publication$002bDate$0025092014$0025092014$0026qf$003dSUBJECT$002509Konu$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300? 2024-05-17T16:43:18Z Assessing information security : strategies, tactics, logic and framework ent://SD_ILS/0/SD_ILS:1053834 2024-05-17T16:43:18Z 2024-05-17T16:43:18Z by&#160;Vladimirov, A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192124">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Procuring penetration testing services. ent://SD_ILS/0/SD_ILS:1037085 2024-05-17T16:43:18Z 2024-05-17T16:43:18Z <a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778766">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Integrated security systems design : a complete reference for building enterprise-wide digital security systems ent://SD_ILS/0/SD_ILS:1037343 2024-05-17T16:43:18Z 2024-05-17T16:43:18Z by&#160;Norman, Thomas, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1781681">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security ent://SD_ILS/0/SD_ILS:1038551 2024-05-17T16:43:18Z 2024-05-17T16:43:18Z by&#160;Perez, Andre, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1800888">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber security and resiliency policy framework ent://SD_ILS/0/SD_ILS:1039877 2024-05-17T16:43:18Z 2024-05-17T16:43:18Z by&#160;Vaseashta, A. (Ashok), editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1818046">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber threat! : how to manage the growing risk of cyber attacks ent://SD_ILS/0/SD_ILS:1034296 2024-05-17T16:43:18Z 2024-05-17T16:43:18Z by&#160;Ulsch, N. MacDonnell, 1951- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1742833">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013 ent://SD_ILS/0/SD_ILS:1035010 2024-05-17T16:43:18Z 2024-05-17T16:43:18Z by&#160;Ginodman, Veniamin, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1752831">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning ent://SD_ILS/0/SD_ILS:1036178 2024-05-17T16:43:18Z 2024-05-17T16:43:18Z by&#160;Hutchens, Justin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1771381">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Online security for the business traveler ent://SD_ILS/0/SD_ILS:1036251 2024-05-17T16:43:18Z 2024-05-17T16:43:18Z by&#160;Gonzalez, Deborah, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1772301">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux ent://SD_ILS/0/SD_ILS:1031737 2024-05-17T16:43:18Z 2024-05-17T16:43:18Z by&#160;Buchanan, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1688607">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:1032266 2024-05-17T16:43:18Z 2024-05-17T16:43:18Z by&#160;Andress, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1699255">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity for executives : a practical guide ent://SD_ILS/0/SD_ILS:1032594 2024-05-17T16:43:18Z 2024-05-17T16:43:18Z by&#160;Touhill, Gregory J., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1707094">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security architect : careers in information security ent://SD_ILS/0/SD_ILS:1033065 2024-05-17T16:43:18Z 2024-05-17T16:43:18Z by&#160;Collins, Jon, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1713960">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking point of sale : payment application secrets, threats, and solutions ent://SD_ILS/0/SD_ILS:1027046 2024-05-17T16:43:18Z 2024-05-17T16:43:18Z by&#160;Gomzin, Slava.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629175">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Threat modeling : designing for security ent://SD_ILS/0/SD_ILS:1027048 2024-05-17T16:43:18Z 2024-05-17T16:43:18Z by&#160;Shostack, Adam.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629177">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Critical infrastructure protection ent://SD_ILS/0/SD_ILS:1027637 2024-05-17T16:43:18Z 2024-05-17T16:43:18Z by&#160;Edwards, Matthew, editor of compilation.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1637644">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Best practices in computer network defense : incident detection and response ent://SD_ILS/0/SD_ILS:1027641 2024-05-17T16:43:18Z 2024-05-17T16:43:18Z by&#160;Hathaway, Melissa E., editor of compilation.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1637648">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually ent://SD_ILS/0/SD_ILS:1028145 2024-05-17T16:43:18Z 2024-05-17T16:43:18Z by&#160;Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1644005">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Learning pentesting for Android devices : a practical guide to learning penetration testing for Android devices and applications ent://SD_ILS/0/SD_ILS:1028152 2024-05-17T16:43:18Z 2024-05-17T16:43:18Z by&#160;Gupta, Aditya, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1644013">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer forensics with FTK : enhance your computer forensics knowledge through illustrations, tips, tricks, and practical real-world scenarios ent://SD_ILS/0/SD_ILS:1029107 2024-05-17T16:43:18Z 2024-05-17T16:43:18Z by&#160;Carbone, Fernando, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1657797">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 ent://SD_ILS/0/SD_ILS:1029162 2024-05-17T16:43:18Z 2024-05-17T16:43:18Z by&#160;Carvey, Harlan A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1659012">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Targeted cyber attacks : multi-staged attacks driven by exploits and malware ent://SD_ILS/0/SD_ILS:1029784 2024-05-17T16:43:18Z 2024-05-17T16:43:18Z by&#160;Sood, Aditya K., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1673591">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of digital privacy : simple tools to protect your personal information and your identity online ent://SD_ILS/0/SD_ILS:1023569 2024-05-17T16:43:18Z 2024-05-17T16:43:18Z by&#160;Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1573362">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Applied network security monitoring : collection, detection, and analysis ent://SD_ILS/0/SD_ILS:1023659 2024-05-17T16:43:18Z 2024-05-17T16:43:18Z by&#160;Sanders, Chris, 1986-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1574451">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Mastering metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach ent://SD_ILS/0/SD_ILS:1025364 2024-05-17T16:43:18Z 2024-05-17T16:43:18Z by&#160;Jaswal, Nipun, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1593853">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security careers : skills, compensation, and career paths ent://SD_ILS/0/SD_ILS:1025703 2024-05-17T16:43:18Z 2024-05-17T16:43:18Z by&#160;Walker, Stephen W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1598238">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber security ent://SD_ILS/0/SD_ILS:1025719 2024-05-17T16:43:18Z 2024-05-17T16:43:18Z by&#160;Voeller, John G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1598809">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Communications and information infrastructure security ent://SD_ILS/0/SD_ILS:1025720 2024-05-17T16:43:18Z 2024-05-17T16:43:18Z by&#160;Voeller, John G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1598810">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network and system security ent://SD_ILS/0/SD_ILS:1018501 2024-05-17T16:43:18Z 2024-05-17T16:43:18Z by&#160;Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1364061">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber security and IT infrastructure protection ent://SD_ILS/0/SD_ILS:1018941 2024-05-17T16:43:18Z 2024-05-17T16:43:18Z by&#160;Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1377640">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking with Kali : practical penetration testing techniques ent://SD_ILS/0/SD_ILS:1007619 2024-05-17T16:43:18Z 2024-05-17T16:43:18Z by&#160;Broad, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115177">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Business continuity and disaster recovery planning for IT professionals ent://SD_ILS/0/SD_ILS:1007620 2024-05-17T16:43:18Z 2024-05-17T16:43:18Z by&#160;Snedaker, Susan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115178">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cryptography for security and privacy in cloud computing ent://SD_ILS/0/SD_ILS:1020988 2024-05-17T16:43:18Z 2024-05-17T16:43:18Z by&#160;Rass, Stefan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1463547">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity : managing systems, conducting testing, and investigating intrusions ent://SD_ILS/0/SD_ILS:1021516 2024-05-17T16:43:18Z 2024-05-17T16:43:18Z by&#160;Mowbray, Thomas J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1481185">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of IT audit : purposes, processes, and practical information ent://SD_ILS/0/SD_ILS:1022729 2024-05-17T16:43:18Z 2024-05-17T16:43:18Z by&#160;Gantz, Stephen D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1550527">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/>