Arama Sonuçları - Daraltılmış: 2014 - Computer security. - Electronic books.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092014$0025092014$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Electronic$002bbooks.$002509Electronic$002bbooks.$0026ps$003d300?dt=list2024-09-24T12:51:28ZDatennutzungs- und datenschutzverträge : muster, klauseln, erläuterungenent://SD_ILS/0/SD_ILS:10534912024-09-24T12:51:28Z2024-09-24T12:51:28Zby Moos, Flemming, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2129586">Click to View</a><br/>Format: Elektronik Kaynak<br/>Assessing information security : strategies, tactics, logic and frameworkent://SD_ILS/0/SD_ILS:10538342024-09-24T12:51:28Z2024-09-24T12:51:28Zby Vladimirov, A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192124">Click to View</a><br/>Format: Elektronik Kaynak<br/>Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linuxent://SD_ILS/0/SD_ILS:10317372024-09-24T12:51:28Z2024-09-24T12:51:28Zby Buchanan, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1688607">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security leader insights for information protection : lessons and strategies from leading security professionalsent://SD_ILS/0/SD_ILS:10322652024-09-24T12:51:28Z2024-09-24T12:51:28Zby Fahy, Bob, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1699254">Click to View</a><br/>Format: Elektronik Kaynak<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:10322662024-09-24T12:51:28Z2024-09-24T12:51:28Zby Andress, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1699255">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cloud management and securityent://SD_ILS/0/SD_ILS:10323382024-09-24T12:51:28Z2024-09-24T12:51:28Zby Abbadi, Imad M., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1701403">Click to View</a><br/>Format: Elektronik Kaynak<br/>The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac Memoryent://SD_ILS/0/SD_ILS:10341002024-09-24T12:51:28Z2024-09-24T12:51:28Zby Ligh, Michael Hale, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1740753">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber threat! : how to manage the growing risk of cyber attacksent://SD_ILS/0/SD_ILS:10342962024-09-24T12:51:28Z2024-09-24T12:51:28Zby Ulsch, N. MacDonnell, 1951- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1742833">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer forensics with FTK : enhance your computer forensics knowledge through illustrations, tips, tricks, and practical real-world scenariosent://SD_ILS/0/SD_ILS:10291072024-09-24T12:51:28Z2024-09-24T12:51:28Zby Carbone, Fernando, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1657797">Click to View</a><br/>Format: Elektronik Kaynak<br/>Windows forensic analysis toolkit : advanced analysis techniques for Windows 8ent://SD_ILS/0/SD_ILS:10291622024-09-24T12:51:28Z2024-09-24T12:51:28Zby Carvey, Harlan A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1659012">Click to View</a><br/>Format: Elektronik Kaynak<br/>Implementing NetScaler VPX : leverage the features of NetScaler VPX to optimize and deploy responsive web services and applications on multiple virtualization platformsent://SD_ILS/0/SD_ILS:10299022024-09-24T12:51:28Z2024-09-24T12:51:28Zby Sandbu, Marius, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1674868">Click to View</a><br/>Format: Elektronik Kaynak<br/>Collaboration with cloud computing : security, social media, and unified communicationsent://SD_ILS/0/SD_ILS:10299612024-09-24T12:51:28Z2024-09-24T12:51:28Zby Messier, Ric, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1675198">Click to View</a><br/>Format: Elektronik Kaynak<br/>Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013ent://SD_ILS/0/SD_ILS:10350102024-09-24T12:51:28Z2024-09-24T12:51:28Zby Ginodman, Veniamin, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1752831">Click to View</a><br/>Format: Elektronik Kaynak<br/>Chinese cybersecurity and defenseent://SD_ILS/0/SD_ILS:10358412024-09-24T12:51:28Z2024-09-24T12:51:28Zby Ventre, Daniel, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1765106">Click to View</a><br/>Format: Elektronik Kaynak<br/>Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanningent://SD_ILS/0/SD_ILS:10361782024-09-24T12:51:28Z2024-09-24T12:51:28Zby Hutchens, Justin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1771381">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber essentials : a pocket guideent://SD_ILS/0/SD_ILS:10370882024-09-24T12:51:28Z2024-09-24T12:51:28Zby Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778769">Click to View</a><br/>Format: Elektronik Kaynak<br/>Detection and intelligent systems for homeland security.ent://SD_ILS/0/SD_ILS:10257272024-09-24T12:51:28Z2024-09-24T12:51:28Zby Voeller, John G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1598817">Click to View</a><br/>Format: Elektronik Kaynak<br/>Data-driven security : analysis, visualization and dashboardsent://SD_ILS/0/SD_ILS:10258192024-09-24T12:51:28Z2024-09-24T12:51:28Zby Jacobs, Jay.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1599321">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking point of sale : payment application secrets, threats, and solutionsent://SD_ILS/0/SD_ILS:10270462024-09-24T12:51:28Z2024-09-24T12:51:28Zby Gomzin, Slava.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629175">Click to View</a><br/>Format: Elektronik Kaynak<br/>Threat modeling : designing for securityent://SD_ILS/0/SD_ILS:10270482024-09-24T12:51:28Z2024-09-24T12:51:28Zby Shostack, Adam.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629177">Click to View</a><br/>Format: Elektronik Kaynak<br/>Best practices in computer network defense : incident detection and responseent://SD_ILS/0/SD_ILS:10276412024-09-24T12:51:28Z2024-09-24T12:51:28Zby Hathaway, Melissa E., editor of compilation.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1637648">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber blockadesent://SD_ILS/0/SD_ILS:10394232024-09-24T12:51:28Z2024-09-24T12:51:28Zby Russell, Alison Lawlor, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1810129">Click to View</a><br/>Format: Elektronik Kaynak<br/>Core software security : security at the sourceent://SD_ILS/0/SD_ILS:10227052024-09-24T12:51:28Z2024-09-24T12:51:28Zby Ransome, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1547083">Click to View</a><br/>Format: Elektronik Kaynak<br/>The basics of IT audit : purposes, processes, and practical informationent://SD_ILS/0/SD_ILS:10227292024-09-24T12:51:28Z2024-09-24T12:51:28Zby Gantz, Stephen D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1550527">Click to View</a><br/>Format: Elektronik Kaynak<br/>The basics of digital privacy : simple tools to protect your personal information and your identity onlineent://SD_ILS/0/SD_ILS:10235692024-09-24T12:51:28Z2024-09-24T12:51:28Zby Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1573362">Click to View</a><br/>Format: Elektronik Kaynak<br/>Applied network security monitoring : collection, detection, and analysisent://SD_ILS/0/SD_ILS:10236592024-09-24T12:51:28Z2024-09-24T12:51:28Zby Sanders, Chris, 1986-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1574451">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber security and IT infrastructure protectionent://SD_ILS/0/SD_ILS:10189412024-09-24T12:51:28Z2024-09-24T12:51:28Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1377640">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer security : awareness for the homeent://SD_ILS/0/SD_ILS:11271612024-09-24T12:51:28Z2024-09-24T12:51:28Zby Cyborski, Shannon, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4876967">Click to View</a><br/>Format: Elektronik Kaynak<br/>