Arama Sonu&ccedil;lar&#305; - Daralt&#305;lm&#305;&#351;: Computer security. - 2014 SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092014$0025092014$0026ps$003d300;jsessionid=769D4F4C3DF83EB0F89EBF13252DF48A? 2024-05-28T11:09:11Z Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux ent://SD_ILS/0/SD_ILS:1031737 2024-05-28T11:09:11Z 2024-05-28T11:09:11Z by&#160;Buchanan, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1688607">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security leader insights for information protection : lessons and strategies from leading security professionals ent://SD_ILS/0/SD_ILS:1032265 2024-05-28T11:09:11Z 2024-05-28T11:09:11Z by&#160;Fahy, Bob, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1699254">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:1032266 2024-05-28T11:09:11Z 2024-05-28T11:09:11Z by&#160;Andress, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1699255">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cloud management and security ent://SD_ILS/0/SD_ILS:1032338 2024-05-28T11:09:11Z 2024-05-28T11:09:11Z by&#160;Abbadi, Imad M., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1701403">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac Memory ent://SD_ILS/0/SD_ILS:1034100 2024-05-28T11:09:11Z 2024-05-28T11:09:11Z by&#160;Ligh, Michael Hale, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1740753">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber threat! : how to manage the growing risk of cyber attacks ent://SD_ILS/0/SD_ILS:1034296 2024-05-28T11:09:11Z 2024-05-28T11:09:11Z by&#160;Ulsch, N. MacDonnell, 1951- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1742833">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013 ent://SD_ILS/0/SD_ILS:1035010 2024-05-28T11:09:11Z 2024-05-28T11:09:11Z by&#160;Ginodman, Veniamin, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1752831">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Chinese cybersecurity and defense ent://SD_ILS/0/SD_ILS:1035841 2024-05-28T11:09:11Z 2024-05-28T11:09:11Z by&#160;Ventre, Daniel, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1765106">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning ent://SD_ILS/0/SD_ILS:1036178 2024-05-28T11:09:11Z 2024-05-28T11:09:11Z by&#160;Hutchens, Justin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1771381">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber essentials : a pocket guide ent://SD_ILS/0/SD_ILS:1037088 2024-05-28T11:09:11Z 2024-05-28T11:09:11Z by&#160;Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778769">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber blockades ent://SD_ILS/0/SD_ILS:1039423 2024-05-28T11:09:11Z 2024-05-28T11:09:11Z by&#160;Russell, Alison Lawlor, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1810129">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Datennutzungs- und datenschutzvertr&auml;ge : muster, klauseln, erl&auml;uterungen ent://SD_ILS/0/SD_ILS:1053491 2024-05-28T11:09:11Z 2024-05-28T11:09:11Z by&#160;Moos, Flemming, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2129586">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Assessing information security : strategies, tactics, logic and framework ent://SD_ILS/0/SD_ILS:1053834 2024-05-28T11:09:11Z 2024-05-28T11:09:11Z by&#160;Vladimirov, A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192124">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking point of sale : payment application secrets, threats, and solutions ent://SD_ILS/0/SD_ILS:1027046 2024-05-28T11:09:11Z 2024-05-28T11:09:11Z by&#160;Gomzin, Slava.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629175">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Threat modeling : designing for security ent://SD_ILS/0/SD_ILS:1027048 2024-05-28T11:09:11Z 2024-05-28T11:09:11Z by&#160;Shostack, Adam.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629177">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Best practices in computer network defense : incident detection and response ent://SD_ILS/0/SD_ILS:1027641 2024-05-28T11:09:11Z 2024-05-28T11:09:11Z by&#160;Hathaway, Melissa E., editor of compilation.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1637648">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer forensics with FTK : enhance your computer forensics knowledge through illustrations, tips, tricks, and practical real-world scenarios ent://SD_ILS/0/SD_ILS:1029107 2024-05-28T11:09:11Z 2024-05-28T11:09:11Z by&#160;Carbone, Fernando, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1657797">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 ent://SD_ILS/0/SD_ILS:1029162 2024-05-28T11:09:11Z 2024-05-28T11:09:11Z by&#160;Carvey, Harlan A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1659012">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Implementing NetScaler VPX : leverage the features of NetScaler VPX to optimize and deploy responsive web services and applications on multiple virtualization platforms ent://SD_ILS/0/SD_ILS:1029902 2024-05-28T11:09:11Z 2024-05-28T11:09:11Z by&#160;Sandbu, Marius, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1674868">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Collaboration with cloud computing : security, social media, and unified communications ent://SD_ILS/0/SD_ILS:1029961 2024-05-28T11:09:11Z 2024-05-28T11:09:11Z by&#160;Messier, Ric, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1675198">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of digital privacy : simple tools to protect your personal information and your identity online ent://SD_ILS/0/SD_ILS:1023569 2024-05-28T11:09:11Z 2024-05-28T11:09:11Z by&#160;Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1573362">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Applied network security monitoring : collection, detection, and analysis ent://SD_ILS/0/SD_ILS:1023659 2024-05-28T11:09:11Z 2024-05-28T11:09:11Z by&#160;Sanders, Chris, 1986-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1574451">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Detection and intelligent systems for homeland security. ent://SD_ILS/0/SD_ILS:1025727 2024-05-28T11:09:11Z 2024-05-28T11:09:11Z by&#160;Voeller, John G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1598817">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Data-driven security : analysis, visualization and dashboards ent://SD_ILS/0/SD_ILS:1025819 2024-05-28T11:09:11Z 2024-05-28T11:09:11Z by&#160;Jacobs, Jay.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1599321">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Core software security : security at the source ent://SD_ILS/0/SD_ILS:1022705 2024-05-28T11:09:11Z 2024-05-28T11:09:11Z by&#160;Ransome, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1547083">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of IT audit : purposes, processes, and practical information ent://SD_ILS/0/SD_ILS:1022729 2024-05-28T11:09:11Z 2024-05-28T11:09:11Z by&#160;Gantz, Stephen D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1550527">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber security and IT infrastructure protection ent://SD_ILS/0/SD_ILS:1018941 2024-05-28T11:09:11Z 2024-05-28T11:09:11Z by&#160;Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1377640">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer security : awareness for the home ent://SD_ILS/0/SD_ILS:1127161 2024-05-28T11:09:11Z 2024-05-28T11:09:11Z by&#160;Cyborski, Shannon, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4876967">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/>