Arama Sonuçları - Daraltılmış: 2013 - Computer security. - Electronic books.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092013$0025092013$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Electronic$002bbooks.$002509Electronic$002bbooks.$0026ps$003d300?dt=list2024-09-24T23:01:42ZBiohackers the politics of open scienceent://SD_ILS/0/SD_ILS:10882072024-09-24T23:01:42Z2024-09-24T23:01:42Zby Delfanti, Alessandro.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3386719">Click to View</a><br/>Format: Elektronik Kaynak<br/>Convergence : illicit networks and national security in the age of globalizationent://SD_ILS/0/SD_ILS:11020332024-09-24T23:01:42Z2024-09-24T23:01:42Zby Miklaucic, Michael, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3571653">Click to View</a><br/>Format: Elektronik Kaynak<br/>Technocrime, policing and surveillanceent://SD_ILS/0/SD_ILS:10005672024-09-24T23:01:42Z2024-09-24T23:01:42Zby Leman-Langlois, Stéphane, 1965-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1016143">Click to View</a><br/>Format: Elektronik Kaynak<br/>Intelligent systems for security informaticsent://SD_ILS/0/SD_ILS:10094932024-09-24T23:01:42Z2024-09-24T23:01:42Zby Yang, Christopher.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1133729">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber security for educational leaders a guide to understanding and implementing technology policiesent://SD_ILS/0/SD_ILS:10106562024-09-24T23:01:42Z2024-09-24T23:01:42Zby Sianjina, Rayton R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1143733">Click to View</a><br/>Format: Elektronik Kaynak<br/>Pragmatic security metrics applying metametrics to information securityent://SD_ILS/0/SD_ILS:10109722024-09-24T23:01:42Z2024-09-24T23:01:42Zby Brotby, W. Krag.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1153198">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information security risk assessment toolkit practical assessments through data collection and data analysisent://SD_ILS/0/SD_ILS:10028372024-09-24T23:01:42Z2024-09-24T23:01:42Zby Talabis, Mark Ryan N.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1047930">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network intrusion analysis methodologies, tools, and techniques for incident analysis and responseent://SD_ILS/0/SD_ILS:10033762024-09-24T23:01:42Z2024-09-24T23:01:42Zby Fichera, Joe, 1966-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1058152">Click to View</a><br/>Format: Elektronik Kaynak<br/>Data hiding exposing concealed data in multimedia, operating systems, mobile devices, and network protocolsent://SD_ILS/0/SD_ILS:10039162024-09-24T23:01:42Z2024-09-24T23:01:42Zby Raggo, Michael T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073014">Click to View</a><br/>Format: Elektronik Kaynak<br/>Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineersent://SD_ILS/0/SD_ILS:10039222024-09-24T23:01:42Z2024-09-24T23:01:42Zby O'Connor, T. J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073021">Click to View</a><br/>Format: Elektronik Kaynak<br/>Logging and log management the authoritative guide to understanding the concepts surrounding logging and log managementent://SD_ILS/0/SD_ILS:10044582024-09-24T23:01:42Z2024-09-24T23:01:42Zby Chuvakin, Anton A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1077419">Click to View</a><br/>Format: Elektronik Kaynak<br/>Enterprise security a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterpriseent://SD_ILS/0/SD_ILS:10059952024-09-24T23:01:42Z2024-09-24T23:01:42Zby Woody, Aaron.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1103988">Click to View</a><br/>Format: Elektronik Kaynak<br/>Group policy fundamentals, security, and the managed desktopent://SD_ILS/0/SD_ILS:10060892024-09-24T23:01:42Z2024-09-24T23:01:42Zby Moskowitz, Jeremy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1104500">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking for dummiesent://SD_ILS/0/SD_ILS:10062512024-09-24T23:01:42Z2024-09-24T23:01:42Zby Beaver, Kevin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1106542">Click to View</a><br/>Format: Elektronik Kaynak<br/>Web application defender's cookbook battling hackers and protecting usersent://SD_ILS/0/SD_ILS:10066272024-09-24T23:01:42Z2024-09-24T23:01:42Zby Barnett, Ryan C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108733">Click to View</a><br/>Format: Elektronik Kaynak<br/>The complete guide to physical securityent://SD_ILS/0/SD_ILS:10070022024-09-24T23:01:42Z2024-09-24T23:01:42Zby Baker, Paul R., 1958-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1112600">Click to View</a><br/>Format: Elektronik Kaynak<br/>Windows server 2012 security from end to edge and beyond architecting, designing, planning, and deploying Windows server 2012 security solutionsent://SD_ILS/0/SD_ILS:10076122024-09-24T23:01:42Z2024-09-24T23:01:42Zby Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115164">Click to View</a><br/>Format: Elektronik Kaynak<br/>Practical anonymity hiding in plain sight onlineent://SD_ILS/0/SD_ILS:10076142024-09-24T23:01:42Z2024-09-24T23:01:42Zby Loshin, Peter.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115167">Click to View</a><br/>Format: Elektronik Kaynak<br/>Social media security : leveraging social networking while mitigating riskent://SD_ILS/0/SD_ILS:10076172024-09-24T23:01:42Z2024-09-24T23:01:42Zby Cross, Michael, 1965-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115173">Click to View</a><br/>Format: Elektronik Kaynak<br/>Simple steps to data encryption a practical guide to secure computingent://SD_ILS/0/SD_ILS:10076232024-09-24T23:01:42Z2024-09-24T23:01:42Zby Loshin, Pete.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115182">Click to View</a><br/>Format: Elektronik Kaynak<br/>Linux malware incident response : a practitioner's guide to forensic collection and examination of volatile data : an excerpt from Malware forensics field guide for Linux systemsent://SD_ILS/0/SD_ILS:10076252024-09-24T23:01:42Z2024-09-24T23:01:42Zby Malin, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115185">Click to View</a><br/>Format: Elektronik Kaynak<br/>Using social media for global securityent://SD_ILS/0/SD_ILS:10078452024-09-24T23:01:42Z2024-09-24T23:01:42Zby Gupta, Ravi.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1118756">Click to View</a><br/>Format: Elektronik Kaynak<br/>Citrix Access Gateway VPX 5.04 essentials a practical step-by-step guide to provide secure remote access using the Citrix Access Gateway VPXent://SD_ILS/0/SD_ILS:10080152024-09-24T23:01:42Z2024-09-24T23:01:42Zby Mallett, Andrew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1119760">Click to View</a><br/>Format: Elektronik Kaynak<br/>Investigative computer forensics the practical guide for lawyers, accountants, investigators, and business executivesent://SD_ILS/0/SD_ILS:9864922024-09-24T23:01:42Z2024-09-24T23:01:42Zby Laykin, Erik.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=817953">Click to View</a><br/>Format: Elektronik Kaynak<br/>Safety management for software-based equipmentent://SD_ILS/0/SD_ILS:10134392024-09-24T23:01:42Z2024-09-24T23:01:42Zby Boulanger, Jean-Louis.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1187169">Click to View</a><br/>Format: Elektronik Kaynak<br/>Sicherheit in kommunikationsnetzenent://SD_ILS/0/SD_ILS:10220912024-09-24T23:01:42Z2024-09-24T23:01:42Zby Sorge, Christoph.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1524463">Click to View</a><br/>Format: Elektronik Kaynak<br/>Getting started with FortiGateent://SD_ILS/0/SD_ILS:10234742024-09-24T23:01:42Z2024-09-24T23:01:42Zby Fabbri, Rosato.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572901">Click to View</a><br/>Format: Elektronik Kaynak<br/>OAuth 2.0 identity and access management patternsent://SD_ILS/0/SD_ILS:10234802024-09-24T23:01:42Z2024-09-24T23:01:42Zby Spasovski, Martin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572907">Click to View</a><br/>Format: Elektronik Kaynak<br/>Instant Java password and authentication securityent://SD_ILS/0/SD_ILS:10234862024-09-24T23:01:42Z2024-09-24T23:01:42Zby Mayoral, Fernando.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572913">Click to View</a><br/>Format: Elektronik Kaynak<br/>Data visualization. Part 2ent://SD_ILS/0/SD_ILS:10242062024-09-24T23:01:42Z2024-09-24T23:01:42Zby Assam, Tarek.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1579356">Click to View</a><br/>Format: Elektronik Kaynak<br/>IBM mainframe security beyond the basics : a practical guide from a z/OS and RACF perspectiveent://SD_ILS/0/SD_ILS:10198782024-09-24T23:01:42Z2024-09-24T23:01:42Zby Dattani, Dinesh D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1411689">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information protection playbookent://SD_ILS/0/SD_ILS:10199902024-09-24T23:01:42Z2024-09-24T23:01:42Zby Kane, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1418381">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyberspace and cybersecurityent://SD_ILS/0/SD_ILS:10206952024-09-24T23:01:42Z2024-09-24T23:01:42Zby Kostopoulos, George K., 1939- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1446799">Click to View</a><br/>Format: Elektronik Kaynak<br/>An introduction to information security and ISO27001:2013 : a pocket guideent://SD_ILS/0/SD_ILS:10209922024-09-24T23:01:42Z2024-09-24T23:01:42Zby Watkins, Steve G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1463578">Click to View</a><br/>Format: Elektronik Kaynak<br/>ISO27001 / ISO27002 : a pocket guideent://SD_ILS/0/SD_ILS:10209932024-09-24T23:01:42Z2024-09-24T23:01:42Zby Calder, Alan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1463579">Click to View</a><br/>Format: Elektronik Kaynak<br/>