Arama Sonuçları - Daraltılmış: 2014 - Computer networks -- Security measures.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092014$0025092014$0026qf$003dSUBJECT$002509Konu$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300?dt=list2024-09-21T08:20:24ZAssessing information security : strategies, tactics, logic and frameworkent://SD_ILS/0/SD_ILS:10538342024-09-21T08:20:24Z2024-09-21T08:20:24Zby Vladimirov, A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192124">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking with Kali : practical penetration testing techniquesent://SD_ILS/0/SD_ILS:10076192024-09-21T08:20:24Z2024-09-21T08:20:24Zby Broad, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115177">Click to View</a><br/>Format: Elektronik Kaynak<br/>Business continuity and disaster recovery planning for IT professionalsent://SD_ILS/0/SD_ILS:10076202024-09-21T08:20:24Z2024-09-21T08:20:24Zby Snedaker, Susan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115178">Click to View</a><br/>Format: Elektronik Kaynak<br/>Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linuxent://SD_ILS/0/SD_ILS:10317372024-09-21T08:20:24Z2024-09-21T08:20:24Zby Buchanan, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1688607">Click to View</a><br/>Format: Elektronik Kaynak<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:10322662024-09-21T08:20:24Z2024-09-21T08:20:24Zby Andress, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1699255">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity for executives : a practical guideent://SD_ILS/0/SD_ILS:10325942024-09-21T08:20:24Z2024-09-21T08:20:24Zby Touhill, Gregory J., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1707094">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security architect : careers in information securityent://SD_ILS/0/SD_ILS:10330652024-09-21T08:20:24Z2024-09-21T08:20:24Zby Collins, Jon, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1713960">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber threat! : how to manage the growing risk of cyber attacksent://SD_ILS/0/SD_ILS:10342962024-09-21T08:20:24Z2024-09-21T08:20:24Zby Ulsch, N. MacDonnell, 1951- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1742833">Click to View</a><br/>Format: Elektronik Kaynak<br/>Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtuallyent://SD_ILS/0/SD_ILS:10281452024-09-21T08:20:24Z2024-09-21T08:20:24Zby Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1644005">Click to View</a><br/>Format: Elektronik Kaynak<br/>Learning pentesting for Android devices : a practical guide to learning penetration testing for Android devices and applicationsent://SD_ILS/0/SD_ILS:10281522024-09-21T08:20:24Z2024-09-21T08:20:24Zby Gupta, Aditya, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1644013">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer forensics with FTK : enhance your computer forensics knowledge through illustrations, tips, tricks, and practical real-world scenariosent://SD_ILS/0/SD_ILS:10291072024-09-21T08:20:24Z2024-09-21T08:20:24Zby Carbone, Fernando, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1657797">Click to View</a><br/>Format: Elektronik Kaynak<br/>Windows forensic analysis toolkit : advanced analysis techniques for Windows 8ent://SD_ILS/0/SD_ILS:10291622024-09-21T08:20:24Z2024-09-21T08:20:24Zby Carvey, Harlan A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1659012">Click to View</a><br/>Format: Elektronik Kaynak<br/>Targeted cyber attacks : multi-staged attacks driven by exploits and malwareent://SD_ILS/0/SD_ILS:10297842024-09-21T08:20:24Z2024-09-21T08:20:24Zby Sood, Aditya K., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1673591">Click to View</a><br/>Format: Elektronik Kaynak<br/>Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013ent://SD_ILS/0/SD_ILS:10350102024-09-21T08:20:24Z2024-09-21T08:20:24Zby Ginodman, Veniamin, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1752831">Click to View</a><br/>Format: Elektronik Kaynak<br/>Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanningent://SD_ILS/0/SD_ILS:10361782024-09-21T08:20:24Z2024-09-21T08:20:24Zby Hutchens, Justin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1771381">Click to View</a><br/>Format: Elektronik Kaynak<br/>Online security for the business travelerent://SD_ILS/0/SD_ILS:10362512024-09-21T08:20:24Z2024-09-21T08:20:24Zby Gonzalez, Deborah, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1772301">Click to View</a><br/>Format: Elektronik Kaynak<br/>Procuring penetration testing services.ent://SD_ILS/0/SD_ILS:10370852024-09-21T08:20:24Z2024-09-21T08:20:24Z<a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778766">Click to View</a><br/>Format: Elektronik Kaynak<br/>Integrated security systems design : a complete reference for building enterprise-wide digital security systemsent://SD_ILS/0/SD_ILS:10373432024-09-21T08:20:24Z2024-09-21T08:20:24Zby Norman, Thomas, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1781681">Click to View</a><br/>Format: Elektronik Kaynak<br/>Mastering metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approachent://SD_ILS/0/SD_ILS:10253642024-09-21T08:20:24Z2024-09-21T08:20:24Zby Jaswal, Nipun, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1593853">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security careers : skills, compensation, and career pathsent://SD_ILS/0/SD_ILS:10257032024-09-21T08:20:24Z2024-09-21T08:20:24Zby Walker, Stephen W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1598238">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber securityent://SD_ILS/0/SD_ILS:10257192024-09-21T08:20:24Z2024-09-21T08:20:24Zby Voeller, John G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1598809">Click to View</a><br/>Format: Elektronik Kaynak<br/>Communications and information infrastructure securityent://SD_ILS/0/SD_ILS:10257202024-09-21T08:20:24Z2024-09-21T08:20:24Zby Voeller, John G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1598810">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking point of sale : payment application secrets, threats, and solutionsent://SD_ILS/0/SD_ILS:10270462024-09-21T08:20:24Z2024-09-21T08:20:24Zby Gomzin, Slava.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629175">Click to View</a><br/>Format: Elektronik Kaynak<br/>Threat modeling : designing for securityent://SD_ILS/0/SD_ILS:10270482024-09-21T08:20:24Z2024-09-21T08:20:24Zby Shostack, Adam.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629177">Click to View</a><br/>Format: Elektronik Kaynak<br/>Critical infrastructure protectionent://SD_ILS/0/SD_ILS:10276372024-09-21T08:20:24Z2024-09-21T08:20:24Zby Edwards, Matthew, editor of compilation.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1637644">Click to View</a><br/>Format: Elektronik Kaynak<br/>Best practices in computer network defense : incident detection and responseent://SD_ILS/0/SD_ILS:10276412024-09-21T08:20:24Z2024-09-21T08:20:24Zby Hathaway, Melissa E., editor of compilation.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1637648">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network securityent://SD_ILS/0/SD_ILS:10385512024-09-21T08:20:24Z2024-09-21T08:20:24Zby Perez, Andre, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1800888">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber security and resiliency policy frameworkent://SD_ILS/0/SD_ILS:10398772024-09-21T08:20:24Z2024-09-21T08:20:24Zby Vaseashta, A. (Ashok), editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1818046">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity : managing systems, conducting testing, and investigating intrusionsent://SD_ILS/0/SD_ILS:10215162024-09-21T08:20:24Z2024-09-21T08:20:24Zby Mowbray, Thomas J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1481185">Click to View</a><br/>Format: Elektronik Kaynak<br/>The basics of IT audit : purposes, processes, and practical informationent://SD_ILS/0/SD_ILS:10227292024-09-21T08:20:24Z2024-09-21T08:20:24Zby Gantz, Stephen D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1550527">Click to View</a><br/>Format: Elektronik Kaynak<br/>The basics of digital privacy : simple tools to protect your personal information and your identity onlineent://SD_ILS/0/SD_ILS:10235692024-09-21T08:20:24Z2024-09-21T08:20:24Zby Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1573362">Click to View</a><br/>Format: Elektronik Kaynak<br/>Applied network security monitoring : collection, detection, and analysisent://SD_ILS/0/SD_ILS:10236592024-09-21T08:20:24Z2024-09-21T08:20:24Zby Sanders, Chris, 1986-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1574451">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network and system securityent://SD_ILS/0/SD_ILS:10185012024-09-21T08:20:24Z2024-09-21T08:20:24Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1364061">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber security and IT infrastructure protectionent://SD_ILS/0/SD_ILS:10189412024-09-21T08:20:24Z2024-09-21T08:20:24Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1377640">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cryptography for security and privacy in cloud computingent://SD_ILS/0/SD_ILS:10209882024-09-21T08:20:24Z2024-09-21T08:20:24Zby Rass, Stefan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1463547">Click to View</a><br/>Format: Elektronik Kaynak<br/>