Arama Sonuçları - Daraltılmış: 2008 - Computer security.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092008$0025092008$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300;jsessionid=349DC02F13F858479AC130A186824753?2024-06-19T13:34:30ZPractical embedded security building secure resource-constrained systemsent://SD_ILS/0/SD_ILS:9425072024-06-19T13:34:30Z2024-06-19T13:34:30Zby Stapko, Timothy John.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=312846">Click to View</a><br/>Format: Elektronik Kaynak<br/>Securing information and communications systems principles, technologies, and applicationsent://SD_ILS/0/SD_ILS:9563262024-06-19T13:34:30Z2024-06-19T13:34:30Zby Furnell, Steven, 1970-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456881">Click to View</a><br/>Format: Elektronik Kaynak<br/>Fuzzing for software security testing and quality assuranceent://SD_ILS/0/SD_ILS:9563292024-06-19T13:34:30Z2024-06-19T13:34:30Zby Takanen, Ari.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456884">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer forensics for dummiesent://SD_ILS/0/SD_ILS:9477742024-06-19T13:34:30Z2024-06-19T13:34:30Zby Volonino, Linda.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=380503">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information security policy, processes, and practicesent://SD_ILS/0/SD_ILS:9532972024-06-19T13:34:30Z2024-06-19T13:34:30Zby Straub, Detmar W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=435197">Click to View</a><br/>Format: Elektronik Kaynak<br/>Digital watermarking and steganographyent://SD_ILS/0/SD_ILS:9440152024-06-19T13:34:30Z2024-06-19T13:34:30Zby Cox, I. J. (Ingemar J.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328311">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information assurance dependability and security in networked systemsent://SD_ILS/0/SD_ILS:9440162024-06-19T13:34:30Z2024-06-19T13:34:30Zby Qian, Yi, 1962-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328312">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information security a manager's guide to thwarting data thieves and hackersent://SD_ILS/0/SD_ILS:9452882024-06-19T13:34:30Z2024-06-19T13:34:30Zby Alexander, Philip, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=339307">Click to View</a><br/>Format: Elektronik Kaynak<br/>Secure computer and network systems modeling, analysis and designent://SD_ILS/0/SD_ILS:9463852024-06-19T13:34:30Z2024-06-19T13:34:30Zby Ye, Nong.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=351427">Click to View</a><br/>Format: Elektronik Kaynak<br/>Trust and security in collaborative computingent://SD_ILS/0/SD_ILS:10302552024-06-19T13:34:30Z2024-06-19T13:34:30Zby Zou, Xukai, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1679354">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking the art of exploitationent://SD_ILS/0/SD_ILS:10099552024-06-19T13:34:30Z2024-06-19T13:34:30Zby Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137538">Click to View</a><br/>Format: Elektronik Kaynak<br/>Practical embedded security : building secure resource-constrained systemsent://SD_ILS/0/SD_ILS:11891682024-06-19T13:34:30Z2024-06-19T13:34:30Zby Stapko, Timothy John.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780750682152">https://www.sciencedirect.com/science/book/9780750682152</a><br/>Format: Elektronik Kaynak<br/>Google hacking for penetration testers. Volume 2ent://SD_ILS/0/SD_ILS:11891022024-06-19T13:34:30Z2024-06-19T13:34:30Zby Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491761">https://www.sciencedirect.com/science/book/9781597491761</a><br/>Format: Elektronik Kaynak<br/>Information assurance : dependability and security in networked systemsent://SD_ILS/0/SD_ILS:11891952024-06-19T13:34:30Z2024-06-19T13:34:30Zby Qian, Yi, 1962-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123735669">https://www.sciencedirect.com/science/book/9780123735669</a><br/>Format: Elektronik Kaynak<br/>Digital watermarking and steganographyent://SD_ILS/0/SD_ILS:11891962024-06-19T13:34:30Z2024-06-19T13:34:30Zby Cox, I. J. (Ingemar J.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123725851">http://www.sciencedirect.com/science/book/9780123725851</a><br/>Format: Elektronik Kaynak<br/>Microsoft forefront security administration guideent://SD_ILS/0/SD_ILS:11891202024-06-19T13:34:30Z2024-06-19T13:34:30Zby Varsalone, Jesse.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492447">https://www.sciencedirect.com/science/book/9781597492447</a><br/>Format: Elektronik Kaynak<br/>Check Point NGX R65 security administrationent://SD_ILS/0/SD_ILS:11891222024-06-19T13:34:30Z2024-06-19T13:34:30Zby Bonnell, Ralph.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492454">http://www.sciencedirect.com/science/book/9781597492454</a><br/>Format: Elektronik Kaynak<br/>OSSEC host-based intrusion detection guideent://SD_ILS/0/SD_ILS:11896202024-06-19T13:34:30Z2024-06-19T13:34:30Zby Hay, Andrew.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492409">http://www.sciencedirect.com/science/book/9781597492409</a><br/>Format: Elektronik Kaynak<br/>Securing Windows server 2008 : prevent attacks from outside and inside your organization.ent://SD_ILS/0/SD_ILS:11896212024-06-19T13:34:30Z2024-06-19T13:34:30ZScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492805">https://www.sciencedirect.com/science/book/9781597492805</a><br/>Format: Elektronik Kaynak<br/>No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfingent://SD_ILS/0/SD_ILS:11896352024-06-19T13:34:30Z2024-06-19T13:34:30Zby Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492157">https://www.sciencedirect.com/science/book/9781597492157</a><br/>Format: Elektronik Kaynak<br/>Malware forensics : investigating and analyzing malicious codeent://SD_ILS/0/SD_ILS:11896362024-06-19T13:34:30Z2024-06-19T13:34:30Zby Aquilina, James M.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492683">http://www.sciencedirect.com/science/book/9781597492683</a><br/>Format: Elektronik Kaynak<br/>Securing Citrix XenApp Server in the enterpriseent://SD_ILS/0/SD_ILS:11896372024-06-19T13:34:30Z2024-06-19T13:34:30Zby Bin Azad, Tariq.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492812">http://www.sciencedirect.com/science/book/9781597492812</a><br/>Format: Elektronik Kaynak<br/>Scene of the cybercrime.ent://SD_ILS/0/SD_ILS:11896652024-06-19T13:34:30Z2024-06-19T13:34:30Zby Cross, Michael, 1965-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492768">https://www.sciencedirect.com/science/book/9781597492768</a><br/>Format: Elektronik Kaynak<br/>OS X exploits and defenseent://SD_ILS/0/SD_ILS:11897052024-06-19T13:34:30Z2024-06-19T13:34:30Zby Baccas, Paul.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492546">http://www.sciencedirect.com/science/book/9781597492546</a><br/>Format: Elektronik Kaynak<br/>Infosecurity 2008 threat analysisent://SD_ILS/0/SD_ILS:11900002024-06-19T13:34:30Z2024-06-19T13:34:30Zby Clark, Champ, III.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492249">https://www.sciencedirect.com/science/book/9781597492249</a><br/>Format: Elektronik Kaynak<br/>