Arama Sonuçları - Daraltılmış: 2006 - Computer security. - Electronic books.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092006$0025092006$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Electronic$002bbooks.$002509Electronic$002bbooks.$0026ps$003d300?dt=list2024-09-25T07:56:41ZTrusted platform module basics using TPM in embedded systemsent://SD_ILS/0/SD_ILS:9367052024-09-25T07:56:41Z2024-09-25T07:56:41Zby Kinney, Steven.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=274719">Click to View</a><br/>Format: Elektronik Kaynak<br/>Multimedia security technologies for digital rights managementent://SD_ILS/0/SD_ILS:9366402024-09-25T07:56:41Z2024-09-25T07:56:41Zby Zeng, Wenjun, 1967-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=274233">Click to View</a><br/>Format: Elektronik Kaynak<br/>Combating spyware in the enterpriseent://SD_ILS/0/SD_ILS:9366452024-09-25T07:56:41Z2024-09-25T07:56:41Zby Baskin, Brian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=274289">Click to View</a><br/>Format: Elektronik Kaynak<br/>Part-themed issue on internet securityent://SD_ILS/0/SD_ILS:9379892024-09-25T07:56:41Z2024-09-25T07:56:41Zby Yague, Mariemma.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=285507">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security issues of IT outsourcingent://SD_ILS/0/SD_ILS:9380182024-09-25T07:56:41Z2024-09-25T07:56:41Zby Gritzalis, Stefanos.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=285536">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information assurance and computer securityent://SD_ILS/0/SD_ILS:9381762024-09-25T07:56:41Z2024-09-25T07:56:41Zby NATO Advanced Research Workshop on Information Assurance and Computer Security (2005 : T?etouan, Morocco)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=287000">Click to View</a><br/>Format: Elektronik Kaynak<br/>Securing HP NonStop servers in an open systems world TCP/IP, OSS & SQLent://SD_ILS/0/SD_ILS:9391972024-09-25T07:56:41Z2024-09-25T07:56:41Zby XYPRO Technology Corporation.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=291716">Click to View</a><br/>Format: Elektronik Kaynak<br/>How to cheat at designing security for a Windows Server 2003 networkent://SD_ILS/0/SD_ILS:9338562024-09-25T07:56:41Z2024-09-25T07:56:41Zby Amini, Rob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254832">Click to View</a><br/>Format: Elektronik Kaynak<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:9338582024-09-25T07:56:41Z2024-09-25T07:56:41Zby Long, Johnny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254834">Click to View</a><br/>Format: Elektronik Kaynak<br/>Securing IM and P2P applications for the enterpriseent://SD_ILS/0/SD_ILS:9338712024-09-25T07:56:41Z2024-09-25T07:56:41Zby Piccard, Paul L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254847">Click to View</a><br/>Format: Elektronik Kaynak<br/>Insider threat protecting the enterprise from sabotage, spying, and theftent://SD_ILS/0/SD_ILS:9338732024-09-25T07:56:41Z2024-09-25T07:56:41Zby Cole, Eric.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254849">Click to View</a><br/>Format: Elektronik Kaynak<br/>Perfect passwords selection, protection, authenticationent://SD_ILS/0/SD_ILS:9338752024-09-25T07:56:41Z2024-09-25T07:56:41Zby Burnett, Mark.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254851">Click to View</a><br/>Format: Elektronik Kaynak<br/>BigNum math implementing cryptographic multiple precision arithmeticent://SD_ILS/0/SD_ILS:9346052024-09-25T07:56:41Z2024-09-25T07:56:41Zby St. Denis, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=261284">Click to View</a><br/>Format: Elektronik Kaynak<br/>Essential computer security everyone's guide to e-mail, internet, and wireless securityent://SD_ILS/0/SD_ILS:9433502024-09-25T07:56:41Z2024-09-25T07:56:41Zby Bradley, Tony.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=319200">Click to View</a><br/>Format: Elektronik Kaynak<br/>Click, click, who's really there? protect your family from online predators, pedophiles, privacy loss, and moreent://SD_ILS/0/SD_ILS:9452762024-09-25T07:56:41Z2024-09-25T07:56:41Zby Koh.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338853">Click to View</a><br/>Format: Elektronik Kaynak<br/>Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasuresent://SD_ILS/0/SD_ILS:9394832024-09-25T07:56:41Z2024-09-25T07:56:41Zby Contos, Brian T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294116">Click to View</a><br/>Format: Elektronik Kaynak<br/>Insider threat : protecting the enterprise from sabotage, spying, and theftent://SD_ILS/0/SD_ILS:11882592024-09-25T07:56:41Z2024-09-25T07:56:41Zby Cole, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format: Elektronik Kaynak<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:11882482024-09-25T07:56:41Z2024-09-25T07:56:41Zby Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490214">https://www.sciencedirect.com/science/book/9781597490214</a><br/>Format: Elektronik Kaynak<br/>How to cheat at designing security for a Windows Server 2003 networkent://SD_ILS/0/SD_ILS:11882812024-09-25T07:56:41Z2024-09-25T07:56:41Zby Amini, Rob.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492430">https://www.sciencedirect.com/science/book/9781597492430</a><br/>Format: Elektronik Kaynak<br/>Writing security tools and exploitsent://SD_ILS/0/SD_ILS:11882842024-09-25T07:56:41Z2024-09-25T07:56:41Zby Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499972">http://www.sciencedirect.com/science/book/9781597499972</a><br/>Format: Elektronik Kaynak<br/>Multimedia security technologies for digital rights managementent://SD_ILS/0/SD_ILS:11869942024-09-25T07:56:41Z2024-09-25T07:56:41Zby Zeng, Wenjun, 1967-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123694768">http://www.sciencedirect.com/science/book/9780123694768</a><br/>Format: Elektronik Kaynak<br/>Securing HP NonStop servers in an open systems world : TCP/IP, OSS & SQLent://SD_ILS/0/SD_ILS:11881182024-09-25T07:56:41Z2024-09-25T07:56:41Zby XYPRO Technology Corporation.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583446">http://www.sciencedirect.com/science/book/9781555583446</a><br/>Format: Elektronik Kaynak<br/>Trusted platform module basics : using TPM in embedded systemsent://SD_ILS/0/SD_ILS:11856622024-09-25T07:56:41Z2024-09-25T07:56:41Zby Kinney, Steven.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679602">http://www.sciencedirect.com/science/book/9780750679602</a><br/>Format: Elektronik Kaynak<br/>Syngress force emerging threat analysis : from mischief to maliciousent://SD_ILS/0/SD_ILS:11863392024-09-25T07:56:41Z2024-09-25T07:56:41Zby Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">http://www.sciencedirect.com/science/book/9781597490566</a><br/>Format: Elektronik Kaynak<br/>Combating spyware in the enterpriseent://SD_ILS/0/SD_ILS:11863552024-09-25T07:56:41Z2024-09-25T07:56:41Zby Baskin, Brian.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490641">https://www.sciencedirect.com/science/book/9781597490641</a><br/>Format: Elektronik Kaynak<br/>Essential computer security : everyone's guide to e-mail, internet, and wireless securityent://SD_ILS/0/SD_ILS:11864192024-09-25T07:56:41Z2024-09-25T07:56:41Zby Bradley, Tony, 1969-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491143">https://www.sciencedirect.com/science/book/9781597491143</a><br/>Format: Elektronik Kaynak<br/>How to cheat at Windows system administration using command line scriptsent://SD_ILS/0/SD_ILS:11864252024-09-25T07:56:41Z2024-09-25T07:56:41Zby Bhardwaj, Pawan K.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491051">http://www.sciencedirect.com/science/book/9781597491051</a><br/>Format: Elektronik Kaynak<br/>Hack the stack : using snort and ethereal to master the 8 layers of an insecure networkent://SD_ILS/0/SD_ILS:11864272024-09-25T07:56:41Z2024-09-25T07:56:41Zby Gregg, Michael (Michael C.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">http://www.sciencedirect.com/science/book/9781597491099</a><br/>Format: Elektronik Kaynak<br/>Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasuresent://SD_ILS/0/SD_ILS:11864392024-09-25T07:56:41Z2024-09-25T07:56:41Zby Contos, Brian T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491297">https://www.sciencedirect.com/science/book/9781597491297</a><br/>Format: Elektronik Kaynak<br/>Securing IM and P2P applications for the enterpriseent://SD_ILS/0/SD_ILS:11842632024-09-25T07:56:41Z2024-09-25T07:56:41Zby Piccard, Paul L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490177">http://www.sciencedirect.com/science/book/9781597490177</a>
ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499965">http://www.sciencedirect.com/science/book/9781597499965</a><br/>Format: Elektronik Kaynak<br/>