Arama Sonu&ccedil;lar&#305; - Daralt&#305;lm&#305;&#351;: 2017 - Computer security. - Electronic books. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092017$0025092017$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Electronic$002bbooks.$002509Electronic$002bbooks.$0026ps$003d300?dt=list 2024-09-24T14:59:07Z IoT penetration testing cookbook : identify vulnerabilities and secure your smart devices. ent://SD_ILS/0/SD_ILS:1133049 2024-09-24T14:59:07Z 2024-09-24T14:59:07Z by&#160;Guzman, Aaron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5165736">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security in the digital world : for the home user, parent, consumer and home office ent://SD_ILS/0/SD_ILS:1133712 2024-09-24T14:59:07Z 2024-09-24T14:59:07Z by&#160;Day, Graham, 1945- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5211340">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Kali Linux wireless penetration testing : beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack ent://SD_ILS/0/SD_ILS:1137050 2024-09-24T14:59:07Z 2024-09-24T14:59:07Z by&#160;Buchanan, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5340668">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking the hacker ent://SD_ILS/0/SD_ILS:1125525 2024-09-24T14:59:07Z 2024-09-24T14:59:07Z by&#160;Grimes, Roger A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4845208">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybercrime and business : strategies for global corporate security ent://SD_ILS/0/SD_ILS:1126520 2024-09-24T14:59:07Z 2024-09-24T14:59:07Z by&#160;Moskowitz, Sanford, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4863624">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> From corporate security to commercial force : a business leader's guide to security economics ent://SD_ILS/0/SD_ILS:1126592 2024-09-24T14:59:07Z 2024-09-24T14:59:07Z by&#160;Cabric, Marko, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4865431">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Kali Linux network scanning cookbook : take your penetration-testing skills to the next level ent://SD_ILS/0/SD_ILS:1126762 2024-09-24T14:59:07Z 2024-09-24T14:59:07Z by&#160;Hixon, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4867412">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> RIoT control : understanding and managing risks and the internet of things ent://SD_ILS/0/SD_ILS:1118263 2024-09-24T14:59:07Z 2024-09-24T14:59:07Z by&#160;Macaulay, Tyson, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4691335">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing the internet of things ent://SD_ILS/0/SD_ILS:1122371 2024-09-24T14:59:07Z 2024-09-24T14:59:07Z by&#160;Li, Shancang, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4786871">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Wireshark for security professionals : using wireshark and the metasploit framework ent://SD_ILS/0/SD_ILS:1123925 2024-09-24T14:59:07Z 2024-09-24T14:59:07Z by&#160;Bullock, Jessey, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4816492">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IT-Sicherheitsanalysen : Ein prozessorientiertes Vorgehensmodell ent://SD_ILS/0/SD_ILS:1124797 2024-09-24T14:59:07Z 2024-09-24T14:59:07Z by&#160;Simi&#263;, Daniela, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4830572">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Data hiding techniques in Windows OS : a practical approach to investigation and defense ent://SD_ILS/0/SD_ILS:1117764 2024-09-24T14:59:07Z 2024-09-24T14:59:07Z by&#160;Hassan, Nihad Ahmad, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4676113">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutions ent://SD_ILS/0/SD_ILS:1130588 2024-09-24T14:59:07Z 2024-09-24T14:59:07Z by&#160;Sharma, Himanshu, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5108416">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/>