Arama Sonu&ccedil;lar&#305; - Daralt&#305;lm&#305;&#351;: 2008 - Computer security. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092008$0025092008$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300;jsessionid=349DC02F13F858479AC130A186824753? 2024-06-19T13:34:30Z Practical embedded security building secure resource-constrained systems ent://SD_ILS/0/SD_ILS:942507 2024-06-19T13:34:30Z 2024-06-19T13:34:30Z by&#160;Stapko, Timothy John.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=312846">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing information and communications systems principles, technologies, and applications ent://SD_ILS/0/SD_ILS:956326 2024-06-19T13:34:30Z 2024-06-19T13:34:30Z by&#160;Furnell, Steven, 1970-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456881">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Fuzzing for software security testing and quality assurance ent://SD_ILS/0/SD_ILS:956329 2024-06-19T13:34:30Z 2024-06-19T13:34:30Z by&#160;Takanen, Ari.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456884">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer forensics for dummies ent://SD_ILS/0/SD_ILS:947774 2024-06-19T13:34:30Z 2024-06-19T13:34:30Z by&#160;Volonino, Linda.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=380503">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security policy, processes, and practices ent://SD_ILS/0/SD_ILS:953297 2024-06-19T13:34:30Z 2024-06-19T13:34:30Z by&#160;Straub, Detmar W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=435197">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Digital watermarking and steganography ent://SD_ILS/0/SD_ILS:944015 2024-06-19T13:34:30Z 2024-06-19T13:34:30Z by&#160;Cox, I. J. (Ingemar J.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328311">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information assurance dependability and security in networked systems ent://SD_ILS/0/SD_ILS:944016 2024-06-19T13:34:30Z 2024-06-19T13:34:30Z by&#160;Qian, Yi, 1962-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328312">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security a manager's guide to thwarting data thieves and hackers ent://SD_ILS/0/SD_ILS:945288 2024-06-19T13:34:30Z 2024-06-19T13:34:30Z by&#160;Alexander, Philip, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=339307">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Secure computer and network systems modeling, analysis and design ent://SD_ILS/0/SD_ILS:946385 2024-06-19T13:34:30Z 2024-06-19T13:34:30Z by&#160;Ye, Nong.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=351427">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Trust and security in collaborative computing ent://SD_ILS/0/SD_ILS:1030255 2024-06-19T13:34:30Z 2024-06-19T13:34:30Z by&#160;Zou, Xukai, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1679354">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking the art of exploitation ent://SD_ILS/0/SD_ILS:1009955 2024-06-19T13:34:30Z 2024-06-19T13:34:30Z by&#160;Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137538">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Practical embedded security : building secure resource-constrained systems ent://SD_ILS/0/SD_ILS:1189168 2024-06-19T13:34:30Z 2024-06-19T13:34:30Z by&#160;Stapko, Timothy John.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780750682152">https://www.sciencedirect.com/science/book/9780750682152</a><br/>Format:&#160;Elektronik Kaynak<br/> Google hacking for penetration testers. Volume 2 ent://SD_ILS/0/SD_ILS:1189102 2024-06-19T13:34:30Z 2024-06-19T13:34:30Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491761">https://www.sciencedirect.com/science/book/9781597491761</a><br/>Format:&#160;Elektronik Kaynak<br/> Information assurance : dependability and security in networked systems ent://SD_ILS/0/SD_ILS:1189195 2024-06-19T13:34:30Z 2024-06-19T13:34:30Z by&#160;Qian, Yi, 1962-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123735669">https://www.sciencedirect.com/science/book/9780123735669</a><br/>Format:&#160;Elektronik Kaynak<br/> Digital watermarking and steganography ent://SD_ILS/0/SD_ILS:1189196 2024-06-19T13:34:30Z 2024-06-19T13:34:30Z by&#160;Cox, I. J. (Ingemar J.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123725851">http://www.sciencedirect.com/science/book/9780123725851</a><br/>Format:&#160;Elektronik Kaynak<br/> Microsoft forefront security administration guide ent://SD_ILS/0/SD_ILS:1189120 2024-06-19T13:34:30Z 2024-06-19T13:34:30Z by&#160;Varsalone, Jesse.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492447">https://www.sciencedirect.com/science/book/9781597492447</a><br/>Format:&#160;Elektronik Kaynak<br/> Check Point NGX R65 security administration ent://SD_ILS/0/SD_ILS:1189122 2024-06-19T13:34:30Z 2024-06-19T13:34:30Z by&#160;Bonnell, Ralph.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492454">http://www.sciencedirect.com/science/book/9781597492454</a><br/>Format:&#160;Elektronik Kaynak<br/> OSSEC host-based intrusion detection guide ent://SD_ILS/0/SD_ILS:1189620 2024-06-19T13:34:30Z 2024-06-19T13:34:30Z by&#160;Hay, Andrew.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492409">http://www.sciencedirect.com/science/book/9781597492409</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing Windows server 2008 : prevent attacks from outside and inside your organization. ent://SD_ILS/0/SD_ILS:1189621 2024-06-19T13:34:30Z 2024-06-19T13:34:30Z ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492805">https://www.sciencedirect.com/science/book/9781597492805</a><br/>Format:&#160;Elektronik Kaynak<br/> No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfing ent://SD_ILS/0/SD_ILS:1189635 2024-06-19T13:34:30Z 2024-06-19T13:34:30Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492157">https://www.sciencedirect.com/science/book/9781597492157</a><br/>Format:&#160;Elektronik Kaynak<br/> Malware forensics : investigating and analyzing malicious code ent://SD_ILS/0/SD_ILS:1189636 2024-06-19T13:34:30Z 2024-06-19T13:34:30Z by&#160;Aquilina, James M.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492683">http://www.sciencedirect.com/science/book/9781597492683</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing Citrix XenApp Server in the enterprise ent://SD_ILS/0/SD_ILS:1189637 2024-06-19T13:34:30Z 2024-06-19T13:34:30Z by&#160;Bin Azad, Tariq.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492812">http://www.sciencedirect.com/science/book/9781597492812</a><br/>Format:&#160;Elektronik Kaynak<br/> Scene of the cybercrime. ent://SD_ILS/0/SD_ILS:1189665 2024-06-19T13:34:30Z 2024-06-19T13:34:30Z by&#160;Cross, Michael, 1965-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492768">https://www.sciencedirect.com/science/book/9781597492768</a><br/>Format:&#160;Elektronik Kaynak<br/> OS X exploits and defense ent://SD_ILS/0/SD_ILS:1189705 2024-06-19T13:34:30Z 2024-06-19T13:34:30Z by&#160;Baccas, Paul.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492546">http://www.sciencedirect.com/science/book/9781597492546</a><br/>Format:&#160;Elektronik Kaynak<br/> Infosecurity 2008 threat analysis ent://SD_ILS/0/SD_ILS:1190000 2024-06-19T13:34:30Z 2024-06-19T13:34:30Z by&#160;Clark, Champ, III.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492249">https://www.sciencedirect.com/science/book/9781597492249</a><br/>Format:&#160;Elektronik Kaynak<br/>