Arama Sonu&ccedil;lar&#305; - Daralt&#305;lm&#305;&#351;: Computer security. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300? 2024-05-14T06:34:15Z Security controls evaluation, testing, and assessment handbook ent://SD_ILS/0/SD_ILS:1148986 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Johnson, Leighton, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5986757">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> An introduction to cyber modeling and simulation ent://SD_ILS/0/SD_ILS:1142123 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Couretas, Jerry M., 1966- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5520841">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber smart : five habits to protect your family, money, and identity from cyber criminals ent://SD_ILS/0/SD_ILS:1143906 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;McDonough, Bart, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5612908">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Solving cyber risk : protecting your company and society ent://SD_ILS/0/SD_ILS:1143948 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Coburn, Andrew (Andrew W.), author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5614240">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Understanding security issues ent://SD_ILS/0/SD_ILS:1132529 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Donaldson, Scott E., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5157542">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity law : protect yourself and your customers ent://SD_ILS/0/SD_ILS:1145228 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Brathwaite, Shimon, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5719658">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies ent://SD_ILS/0/SD_ILS:1145686 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Le, Dac-Nhuong, 1983- editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5741215">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity blue team toolkit ent://SD_ILS/0/SD_ILS:1145841 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Tanner, Nadean, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5747366">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hardware security : a hands-on learning approach ent://SD_ILS/0/SD_ILS:1146041 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Bhunia, Swarup, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5754491">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors ent://SD_ILS/0/SD_ILS:1146214 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Carpenter, Perry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5763515">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The business of cybersecurity : foundations and ideologies ent://SD_ILS/0/SD_ILS:1146381 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Sathnur, Ashwini, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5770273">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Digital asset valuation and cyber risk measurement : principles of cybernomics ent://SD_ILS/0/SD_ILS:1146603 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Ruan, Keyun, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5780982">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security risk management for ISO 27001/ISO 27002 ent://SD_ILS/0/SD_ILS:1148197 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5894007">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> How cyber security can protect your business : a guide for all stakeholders ent://SD_ILS/0/SD_ILS:1148887 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Wright, Christopher, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5979597">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Engineering secure and dependable software systems ent://SD_ILS/0/SD_ILS:1148337 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Pretschner, Alexander, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5899580">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Siber g&uuml;venlik : sald&#305;r&#305; &amp; savunma stratejileri ent://SD_ILS/0/SD_ILS:1195743 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;&Ouml;zkaya, Erdal<br/>Format:&#160;Kitap<br/> Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate Windows malware ent://SD_ILS/0/SD_ILS:1140471 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Monnappa K A, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5446050">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybers&eacute;curit&eacute; et RGPD : prot&eacute;gez votre PME : guide pratique pour s&eacute;curiser votre syst&egrave;me informatique et vous conformer au RGPD ent://SD_ILS/0/SD_ILS:1141512 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Ejzyn, Alain, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5496488">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Port cybersecurity : securing critical information infrastructures and supply chains ent://SD_ILS/0/SD_ILS:1130929 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Polemi, Nineta, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5118465">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security and resilience in intelligent data-centric systems and communication networks ent://SD_ILS/0/SD_ILS:1130161 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Ficco, Massimo, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5090270">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Empirical research for software security : foundations and experience ent://SD_ILS/0/SD_ILS:1132973 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;ben Othmane, Lotfi, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5164090">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> NIST cybersecurity framework : a pocket guide ent://SD_ILS/0/SD_ILS:1147075 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5796954">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Data protection and the cloud-are you really managing the risks? ent://SD_ILS/0/SD_ILS:1147076 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Ticher, Paul, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5796955">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Online danger : how to protect yourself and your loved ones from the evil side of the internet ent://SD_ILS/0/SD_ILS:1148139 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Cole, Eric, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5893451">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The five technological forces disrupting security : how social, mobile, cloud and iot are fundamentally changing the practice of physical security ent://SD_ILS/0/SD_ILS:1128883 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Van Till, Steve, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4981408">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Java programlama diliyle kriptoloji uygulamalar&#305; ent://SD_ILS/0/SD_ILS:1206978 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Bodur, H&uuml;seyin, yazar.<br/>Format:&#160;Kitap<br/> On Privacy-Preserving Protocols for Smart Metering Systems Security and Privacy in Smart Grids ent://SD_ILS/0/SD_ILS:480290 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Borges de Oliveira, F&aacute;bio. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40718-0">http://dx.doi.org/10.1007/978-3-319-40718-0</a><br/>Format:&#160;Elektronik Kaynak<br/> Security Challenges and Approaches in Internet of Things ent://SD_ILS/0/SD_ILS:480524 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Misra, Sridipta. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44230-3">http://dx.doi.org/10.1007/978-3-319-44230-3</a><br/>Format:&#160;Elektronik Kaynak<br/> Information Fusion for Cyber-Security Analytics ent://SD_ILS/0/SD_ILS:480528 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Alsmadi, Izzat M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44257-0">http://dx.doi.org/10.1007/978-3-319-44257-0</a><br/>Format:&#160;Elektronik Kaynak<br/> Multimedia Forensics and Security Foundations, Innovations, and Applications ent://SD_ILS/0/SD_ILS:480530 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Hassanien, Aboul Ella. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44270-9">http://dx.doi.org/10.1007/978-3-319-44270-9</a><br/>Format:&#160;Elektronik Kaynak<br/> Vehicular Cyber Physical Systems Adaptive Connectivity and Security ent://SD_ILS/0/SD_ILS:480540 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Rawat, Danda B. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44494-9">http://dx.doi.org/10.1007/978-3-319-44494-9</a><br/>Format:&#160;Elektronik Kaynak<br/> Smart Grids: Security and Privacy Issues ent://SD_ILS/0/SD_ILS:480572 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Boroojeni, Kianoosh G. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45050-6">http://dx.doi.org/10.1007/978-3-319-45050-6</a><br/>Format:&#160;Elektronik Kaynak<br/> Biometric Security and Privacy Opportunities &amp; Challenges in The Big Data Era ent://SD_ILS/0/SD_ILS:480719 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Jiang, Richard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-47301-7">http://dx.doi.org/10.1007/978-3-319-47301-7</a><br/>Format:&#160;Elektronik Kaynak<br/> Information Security Practices Emerging Threats and Perspectives ent://SD_ILS/0/SD_ILS:480820 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Traor&eacute;, Issa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-48947-6">http://dx.doi.org/10.1007/978-3-319-48947-6</a><br/>Format:&#160;Elektronik Kaynak<br/> Hardware IP Security and Trust ent://SD_ILS/0/SD_ILS:480829 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Mishra, Prabhat. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-49025-0">http://dx.doi.org/10.1007/978-3-319-49025-0</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity for Industry 4.0 Analysis for Design and Manufacturing ent://SD_ILS/0/SD_ILS:480924 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Thames, Lane. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-50660-9">http://dx.doi.org/10.1007/978-3-319-50660-9</a><br/>Format:&#160;Elektronik Kaynak<br/> Security-Aware Design for Cyber-Physical Systems A Platform-Based Approach ent://SD_ILS/0/SD_ILS:480968 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Lin, Chung-Wei. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-51328-7">http://dx.doi.org/10.1007/978-3-319-51328-7</a><br/>Format:&#160;Elektronik Kaynak<br/> Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 1 ent://SD_ILS/0/SD_ILS:481578 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1675-2">http://dx.doi.org/10.1007/978-981-10-1675-2</a><br/>Format:&#160;Elektronik Kaynak<br/> Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 2 ent://SD_ILS/0/SD_ILS:481579 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1678-3">http://dx.doi.org/10.1007/978-981-10-1678-3</a><br/>Format:&#160;Elektronik Kaynak<br/> Group-target Tracking ent://SD_ILS/0/SD_ILS:481592 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Geng, Wen-dong. author.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1888-6">http://dx.doi.org/10.1007/978-981-10-1888-6</a><br/>Format:&#160;Elektronik Kaynak<br/> Innovations in Computer Science and Engineering Proceedings of the Fourth ICICSE 2016 ent://SD_ILS/0/SD_ILS:481764 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Saini, H. S. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3818-1">http://dx.doi.org/10.1007/978-981-10-3818-1</a><br/>Format:&#160;Elektronik Kaynak<br/> Computing and Network Sustainability Proceedings of IRSCNS 2016 ent://SD_ILS/0/SD_ILS:481772 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Vishwakarma, H.R . editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3935-5">http://dx.doi.org/10.1007/978-981-10-3935-5</a><br/>Format:&#160;Elektronik Kaynak<br/> Proceedings of the First International Conference on Intelligent Computing and Communication ent://SD_ILS/0/SD_ILS:481606 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Mandal, Jyotsna Kumar. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2035-3">http://dx.doi.org/10.1007/978-981-10-2035-3</a><br/>Format:&#160;Elektronik Kaynak<br/> Digital Watermarking Techniques and Trends ent://SD_ILS/0/SD_ILS:481612 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Nematollahi, Mohammad Ali. author.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2095-7">http://dx.doi.org/10.1007/978-981-10-2095-7</a><br/>Format:&#160;Elektronik Kaynak<br/> Information Science and Applications 2017 ICISA 2017 ent://SD_ILS/0/SD_ILS:481784 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Kim, Kuinam. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-4154-9">http://dx.doi.org/10.1007/978-981-10-4154-9</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer Communication, Networking and Internet Security Proceedings of IC3T 2016 ent://SD_ILS/0/SD_ILS:481714 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3226-4">http://dx.doi.org/10.1007/978-981-10-3226-4</a><br/>Format:&#160;Elektronik Kaynak<br/> Advanced Computing and Systems for Security Volume Four ent://SD_ILS/0/SD_ILS:481731 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3391-9">http://dx.doi.org/10.1007/978-981-10-3391-9</a><br/>Format:&#160;Elektronik Kaynak<br/> Advanced Computing and Systems for Security Volume Three ent://SD_ILS/0/SD_ILS:481732 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3409-1">http://dx.doi.org/10.1007/978-981-10-3409-1</a><br/>Format:&#160;Elektronik Kaynak<br/> Data hiding techniques in Windows OS : a practical approach to investigation and defense ent://SD_ILS/0/SD_ILS:1117764 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Hassan, Nihad Ahmad, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4676113">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> RIoT control : understanding and managing risks and the internet of things ent://SD_ILS/0/SD_ILS:1118263 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Macaulay, Tyson, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4691335">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security in the digital world : for the home user, parent, consumer and home office ent://SD_ILS/0/SD_ILS:1133712 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Day, Graham, 1945- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5211340">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Kali Linux wireless penetration testing : beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack ent://SD_ILS/0/SD_ILS:1137050 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Buchanan, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5340668">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Wireshark for security professionals : using wireshark and the metasploit framework ent://SD_ILS/0/SD_ILS:1123925 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Bullock, Jessey, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4816492">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IT-Sicherheitsanalysen : Ein prozessorientiertes Vorgehensmodell ent://SD_ILS/0/SD_ILS:1124797 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Simi&#263;, Daniela, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4830572">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking the hacker ent://SD_ILS/0/SD_ILS:1125525 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Grimes, Roger A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4845208">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutions ent://SD_ILS/0/SD_ILS:1130588 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Sharma, Himanshu, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5108416">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IoT penetration testing cookbook : identify vulnerabilities and secure your smart devices. ent://SD_ILS/0/SD_ILS:1133049 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Guzman, Aaron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5165736">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybercrime and business : strategies for global corporate security ent://SD_ILS/0/SD_ILS:1126520 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Moskowitz, Sanford, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4863624">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> From corporate security to commercial force : a business leader's guide to security economics ent://SD_ILS/0/SD_ILS:1126592 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Cabric, Marko, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4865431">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Kali Linux network scanning cookbook : take your penetration-testing skills to the next level ent://SD_ILS/0/SD_ILS:1126762 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Hixon, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4867412">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing the internet of things ent://SD_ILS/0/SD_ILS:1122371 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Li, Shancang, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4786871">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> You : for sale protecting your personal data and privacy online ent://SD_ILS/0/SD_ILS:1053757 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Sumner, Stuart, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2187472">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Chaotic secure communication : principles and technologies ent://SD_ILS/0/SD_ILS:1119254 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Sun, Kehui, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4707910">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information technology security fundamentals ent://SD_ILS/0/SD_ILS:1102697 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Sagers, Glen., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4009415">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security science : measuring the vulnerability to data compromises ent://SD_ILS/0/SD_ILS:1113500 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Young, Carl S., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4567434">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Dns security : defending the domain name system ent://SD_ILS/0/SD_ILS:1113215 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Liska, Allan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4556898">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Data breach preparation and response : breaches are certain, impact is not ent://SD_ILS/0/SD_ILS:1113216 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Fowler, Kevvie, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4556899">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security and privacy in the digital era. Volume 1 ent://SD_ILS/0/SD_ILS:1115270 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Guerrier, Claudine, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4648717">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security in fixed and wireless networks ent://SD_ILS/0/SD_ILS:1115585 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Sch&auml;fer, G&uuml;nter, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4658592">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Breaking into information security : crafting a custom career path to get the job you really want ent://SD_ILS/0/SD_ILS:1104442 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;More, Josh, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4187289">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber security awareness for CEOs and management ent://SD_ILS/0/SD_ILS:1104566 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Willson, David, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4189279">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Meeting people via WiFi and Bluetooth ent://SD_ILS/0/SD_ILS:1104567 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Schroeder, Joshua, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4189280">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Essential skills for hackers ent://SD_ILS/0/SD_ILS:1104568 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4189281">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The information systems security officer's guide : establishing and managing a cyber security program ent://SD_ILS/0/SD_ILS:1105580 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Kovacich, Gerald L., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4334673">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Selling information security to the board : a primer ent://SD_ILS/0/SD_ILS:1111186 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4519662">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Nine steps to succes : an ISO 27001: 2013 implementation overview ent://SD_ILS/0/SD_ILS:1111189 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4519667">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Linux server security : hack and defend ent://SD_ILS/0/SD_ILS:1111179 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Binnie, Christopher, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4519259">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> OS X incident response : scripting and analysis ent://SD_ILS/0/SD_ILS:1111334 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Bradley, Jaron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4526010">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Critical infrastructure protection against hybrid warfare security related challenges ent://SD_ILS/0/SD_ILS:1121166 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Niglia, Alessandro, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4753392">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Building a corporate culture of security : strategies for strengthening organizational resiliency ent://SD_ILS/0/SD_ILS:1108349 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Sullivant, John, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4425984">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows registry forensics : advanced digital forensic analysis of the windows registry ent://SD_ILS/0/SD_ILS:1108686 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Carvey, Harlan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4438754">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hiding behind the keyboard : uncovering covert communication methods with forensic analysis ent://SD_ILS/0/SD_ILS:1109062 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Shavers, Brett, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4452264">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network performance and security : testing and analyzing using open source and low-cost tools ent://SD_ILS/0/SD_ILS:1109063 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Chapman, Chris, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4452265">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Digital privacy in the marketplace : perspectives on the information exchange ent://SD_ILS/0/SD_ILS:1044912 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Milne, George R., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1920895">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Black hat Python : Python programming for hackers and pentesters ent://SD_ILS/0/SD_ILS:1045196 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Seitz, Justin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1931622">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Zabbix network monitoring essentials : your one-stop solution to efficient network monitoring with zabbix ent://SD_ILS/0/SD_ILS:1046048 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Vacche, Andrea Dalle, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1973849">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Kali Linux wireless penetration testing beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux ent://SD_ILS/0/SD_ILS:1047089 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Ramachandran, Vivek, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2005211">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The defende&#341;s dilemma : charting a course toward cybersecurity ent://SD_ILS/0/SD_ILS:1050852 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Libicki, Martin C., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2075897">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Dissecting the hack : the V3rb0ten network ent://SD_ILS/0/SD_ILS:1053000 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Street, Jayson E., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2098440">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Infosec management fundamentals ent://SD_ILS/0/SD_ILS:1053583 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2146007">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing social media in the enterprise ent://SD_ILS/0/SD_ILS:1053585 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2146009">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Smart grid security : innovative solutions for a modernized grid ent://SD_ILS/0/SD_ILS:1053628 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Skopik, Florian, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2146995">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Bent functions : results and applications to cryptography ent://SD_ILS/0/SD_ILS:1053831 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Tokareva, Natalia, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192079">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Data protection and the cloud : are the risks too great? ent://SD_ILS/0/SD_ILS:1053835 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Ticher, Paul, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192125">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Web application security is a stack : how to CYA (Cover Your Apps) completely ent://SD_ILS/0/SD_ILS:1053836 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Vittie, Lori Mac, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192126">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security analytics : finding security insights, patterns and anomalies in big data ent://SD_ILS/0/SD_ILS:1041629 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Mark, Talabis, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1873129">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems ent://SD_ILS/0/SD_ILS:1042469 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Knapp, Eric D., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1887712">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security intelligence : a practitioner's guide to solving enterprise security challenges ent://SD_ILS/0/SD_ILS:1042735 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Li, Qing, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1895130">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Online safety ent://SD_ILS/0/SD_ILS:1043270 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Healey, Justin, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1899260">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computational network science : an algorithmic approach ent://SD_ILS/0/SD_ILS:1038184 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Hexmoor, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1798312">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> CSA guide to cloud computing : implementing cloud privacy and security ent://SD_ILS/0/SD_ILS:1038103 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Samani, Raj, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1793946">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Understanding bitcoin : cryptography, engineering and economics. ent://SD_ILS/0/SD_ILS:1040180 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Franco, Pedro, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1823060">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Designing and building a security operations center ent://SD_ILS/0/SD_ILS:1040615 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Nathans, David, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1834659">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The science and technology of counterterrorism : measuring physical and electronic security risk ent://SD_ILS/0/SD_ILS:1027987 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Young, Carl S., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1641934">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Using security patterns in web-application ent://SD_ILS/0/SD_ILS:1135621 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Alam, Shahnawaz, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5291824">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Applications of secure multiparty computation ent://SD_ILS/0/SD_ILS:1132914 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Laud, Peeter, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5161932">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network attacks &amp; exploitation : a framework ent://SD_ILS/0/SD_ILS:1103144 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Monte, Matthew, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040351">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Group policy : fundamentals, security, and the managed desktop ent://SD_ILS/0/SD_ILS:1103167 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Moskowitz, Jeremy, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040685">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber resilience best practices ent://SD_ILS/0/SD_ILS:1104467 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;AXELOS Limited, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4187569">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybers&eacute;curit&eacute; des Installations Industrielles : Chapitre XII Panorama de l'offre Technologique Pour la Cybers&eacute;curit&eacute; Industrielle ent://SD_ILS/0/SD_ILS:1145091 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Fourastier, Yannick, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709845">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybers&eacute;curit&eacute; des Installations Industrielles ent://SD_ILS/0/SD_ILS:1145096 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Fourastier, Yannick, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709851">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybers&eacute;curit&eacute; des installations industrielles : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:1145060 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709810">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre XIII, &Eacute;tat des Lieux des R&eacute;f&eacute;rentiels en S&eacute;curit&eacute; des Syst&egrave;mes Num&eacute;riques Industriels : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:1145061 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709811">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybers&eacute;curit&eacute; des installations industrielles : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:1145062 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709812">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybers&eacute;curit&eacute; des Installations Industrielles. Chapter V, Des bus de terrain a l'Industrial Ethernet ent://SD_ILS/0/SD_ILS:1145070 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709821">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre X, S&eacute;curit&eacute; des R&eacute;seaux Industriels &eacute;tendus : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:1145073 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709824">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre XIV, R&eacute;glementation de la Cybers&eacute;curit&eacute; et R&eacute;gime Juridique des Syst&egrave;mes Num&eacute;riques Industriels : une &eacute;tude des Dispositions R&eacute;glementaires en Cybers&eacute;curit&eacute; en France et Aux &Eacute;tats-Unis : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:1145074 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709825">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre II, Typologie des installations industrielles : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:1145077 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709828">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre II, Typologie des installations industrielles : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:1145078 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709829">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapter IV, Malveillance num&eacute;rique sur les syst&egrave;mes industriels : histoire de la menace, &eacute;v&eacute;nements embl&eacute;matiques, tendances et perspectives : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:1145079 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709831">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapter VI, Analyse des risques : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:1145082 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709834">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre I, Mythes et r&eacute;alit&eacute;s de la cybers&eacute;curit&eacute; des syst&egrave;mes num&eacute;riques industriels : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:1145083 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709836">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Application security in the ISO 27001:2013 environment ent://SD_ILS/0/SD_ILS:1106987 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Vasudevan, Vinod, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4395800">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Datennutzungs- und datenschutzvertr&auml;ge : muster, klauseln, erl&auml;uterungen ent://SD_ILS/0/SD_ILS:1053491 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Moos, Flemming, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2129586">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Assessing information security : strategies, tactics, logic and framework ent://SD_ILS/0/SD_ILS:1053834 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Vladimirov, A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192124">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber threat! : how to manage the growing risk of cyber attacks ent://SD_ILS/0/SD_ILS:1034296 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Ulsch, N. MacDonnell, 1951- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1742833">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac Memory ent://SD_ILS/0/SD_ILS:1034100 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Ligh, Michael Hale, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1740753">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013 ent://SD_ILS/0/SD_ILS:1035010 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Ginodman, Veniamin, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1752831">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Chinese cybersecurity and defense ent://SD_ILS/0/SD_ILS:1035841 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Ventre, Daniel, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1765106">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning ent://SD_ILS/0/SD_ILS:1036178 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Hutchens, Justin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1771381">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber essentials : a pocket guide ent://SD_ILS/0/SD_ILS:1037088 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778769">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Detection and intelligent systems for homeland security. ent://SD_ILS/0/SD_ILS:1025727 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Voeller, John G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1598817">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Data-driven security : analysis, visualization and dashboards ent://SD_ILS/0/SD_ILS:1025819 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Jacobs, Jay.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1599321">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking point of sale : payment application secrets, threats, and solutions ent://SD_ILS/0/SD_ILS:1027046 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Gomzin, Slava.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629175">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Threat modeling : designing for security ent://SD_ILS/0/SD_ILS:1027048 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Shostack, Adam.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629177">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber blockades ent://SD_ILS/0/SD_ILS:1039423 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Russell, Alison Lawlor, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1810129">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Best practices in computer network defense : incident detection and response ent://SD_ILS/0/SD_ILS:1027641 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Hathaway, Melissa E., editor of compilation.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1637648">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer forensics with FTK : enhance your computer forensics knowledge through illustrations, tips, tricks, and practical real-world scenarios ent://SD_ILS/0/SD_ILS:1029107 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Carbone, Fernando, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1657797">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 ent://SD_ILS/0/SD_ILS:1029162 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Carvey, Harlan A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1659012">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Implementing NetScaler VPX : leverage the features of NetScaler VPX to optimize and deploy responsive web services and applications on multiple virtualization platforms ent://SD_ILS/0/SD_ILS:1029902 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Sandbu, Marius, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1674868">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Collaboration with cloud computing : security, social media, and unified communications ent://SD_ILS/0/SD_ILS:1029961 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Messier, Ric, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1675198">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux ent://SD_ILS/0/SD_ILS:1031737 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Buchanan, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1688607">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security leader insights for information protection : lessons and strategies from leading security professionals ent://SD_ILS/0/SD_ILS:1032265 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Fahy, Bob, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1699254">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:1032266 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Andress, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1699255">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cloud management and security ent://SD_ILS/0/SD_ILS:1032338 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Abbadi, Imad M., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1701403">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Core software security : security at the source ent://SD_ILS/0/SD_ILS:1022705 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Ransome, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1547083">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of IT audit : purposes, processes, and practical information ent://SD_ILS/0/SD_ILS:1022729 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Gantz, Stephen D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1550527">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of digital privacy : simple tools to protect your personal information and your identity online ent://SD_ILS/0/SD_ILS:1023569 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1573362">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Applied network security monitoring : collection, detection, and analysis ent://SD_ILS/0/SD_ILS:1023659 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Sanders, Chris, 1986-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1574451">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber security and IT infrastructure protection ent://SD_ILS/0/SD_ILS:1018941 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1377640">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer security : awareness for the home ent://SD_ILS/0/SD_ILS:1127161 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Cyborski, Shannon, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4876967">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Technocrime, policing and surveillance ent://SD_ILS/0/SD_ILS:1000567 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Leman-Langlois, St&eacute;phane, 1965-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1016143">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Intelligent systems for security informatics ent://SD_ILS/0/SD_ILS:1009493 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Yang, Christopher.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1133729">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber security for educational leaders a guide to understanding and implementing technology policies ent://SD_ILS/0/SD_ILS:1010656 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Sianjina, Rayton R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1143733">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Pragmatic security metrics applying metametrics to information security ent://SD_ILS/0/SD_ILS:1010972 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Brotby, W. Krag.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1153198">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security risk assessment toolkit practical assessments through data collection and data analysis ent://SD_ILS/0/SD_ILS:1002837 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Talabis, Mark Ryan N.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1047930">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network intrusion analysis methodologies, tools, and techniques for incident analysis and response ent://SD_ILS/0/SD_ILS:1003376 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Fichera, Joe, 1966-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1058152">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Data hiding exposing concealed data in multimedia, operating systems, mobile devices, and network protocols ent://SD_ILS/0/SD_ILS:1003916 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Raggo, Michael T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073014">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineers ent://SD_ILS/0/SD_ILS:1003922 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;O'Connor, T. J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073021">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Logging and log management the authoritative guide to understanding the concepts surrounding logging and log management ent://SD_ILS/0/SD_ILS:1004458 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Chuvakin, Anton A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1077419">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Investigative computer forensics the practical guide for lawyers, accountants, investigators, and business executives ent://SD_ILS/0/SD_ILS:986492 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Laykin, Erik.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=817953">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Enterprise security a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise ent://SD_ILS/0/SD_ILS:1005995 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Woody, Aaron.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1103988">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Group policy fundamentals, security, and the managed desktop ent://SD_ILS/0/SD_ILS:1006089 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Moskowitz, Jeremy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1104500">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking for dummies ent://SD_ILS/0/SD_ILS:1006251 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Beaver, Kevin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1106542">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Web application defender's cookbook battling hackers and protecting users ent://SD_ILS/0/SD_ILS:1006627 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Barnett, Ryan C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108733">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The complete guide to physical security ent://SD_ILS/0/SD_ILS:1007002 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Baker, Paul R., 1958-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1112600">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows server 2012 security from end to edge and beyond architecting, designing, planning, and deploying Windows server 2012 security solutions ent://SD_ILS/0/SD_ILS:1007612 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115164">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Practical anonymity hiding in plain sight online ent://SD_ILS/0/SD_ILS:1007614 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Loshin, Peter.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115167">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Social media security : leveraging social networking while mitigating risk ent://SD_ILS/0/SD_ILS:1007617 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Cross, Michael, 1965-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115173">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Simple steps to data encryption a practical guide to secure computing ent://SD_ILS/0/SD_ILS:1007623 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Loshin, Pete.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115182">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Linux malware incident response : a practitioner's guide to forensic collection and examination of volatile data : an excerpt from Malware forensics field guide for Linux systems ent://SD_ILS/0/SD_ILS:1007625 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Malin, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115185">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Using social media for global security ent://SD_ILS/0/SD_ILS:1007845 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Gupta, Ravi.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1118756">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Citrix Access Gateway VPX 5.04 essentials a practical step-by-step guide to provide secure remote access using the Citrix Access Gateway VPX ent://SD_ILS/0/SD_ILS:1008015 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Mallett, Andrew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1119760">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Safety management for software-based equipment ent://SD_ILS/0/SD_ILS:1013439 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Boulanger, Jean-Louis.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1187169">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Sicherheit in kommunikationsnetzen ent://SD_ILS/0/SD_ILS:1022091 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Sorge, Christoph.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1524463">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> OAuth 2.0 identity and access management patterns ent://SD_ILS/0/SD_ILS:1023480 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Spasovski, Martin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572907">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Getting started with FortiGate ent://SD_ILS/0/SD_ILS:1023474 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Fabbri, Rosato.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572901">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Instant Java password and authentication security ent://SD_ILS/0/SD_ILS:1023486 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Mayoral, Fernando.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572913">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Data visualization. Part 2 ent://SD_ILS/0/SD_ILS:1024206 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Assam, Tarek.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1579356">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IBM mainframe security beyond the basics : a practical guide from a z/OS and RACF perspective ent://SD_ILS/0/SD_ILS:1019878 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Dattani, Dinesh D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1411689">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information protection playbook ent://SD_ILS/0/SD_ILS:1019990 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Kane, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1418381">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyberspace and cybersecurity ent://SD_ILS/0/SD_ILS:1020695 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Kostopoulos, George K., 1939- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1446799">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> An introduction to information security and ISO27001:2013 : a pocket guide ent://SD_ILS/0/SD_ILS:1020992 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Watkins, Steve G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1463578">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> ISO27001 / ISO27002 : a pocket guide ent://SD_ILS/0/SD_ILS:1020993 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Calder, Alan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1463579">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Yaz&#305;l&#305;m g&uuml;venli&#287;i sald&#305;r&#305; ve savunma ent://SD_ILS/0/SD_ILS:291569 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Demir, B&uuml;nyamin<br/>Format:&#160;Kitap<br/> Siber g&uuml;venlik ent://SD_ILS/0/SD_ILS:668303 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Canl&#305;, Mustafa<br/>Format:&#160;Kitap<br/> Biohackers the politics of open science ent://SD_ILS/0/SD_ILS:1088207 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Delfanti, Alessandro.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3386719">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Convergence : illicit networks and national security in the age of globalization ent://SD_ILS/0/SD_ILS:1102033 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Miklaucic, Michael, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3571653">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Embedded systems security practical methods for safe and secure software and systems development ent://SD_ILS/0/SD_ILS:133376 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Kleidermacher, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123868862">http://www.sciencedirect.com/science/book/9780123868862</a><br/>Format:&#160;Elektronik Kaynak<br/> Advances in intelligence and security informatics ent://SD_ILS/0/SD_ILS:133381 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Mao, Wenji.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123972002">http://www.sciencedirect.com/science/book/9780123972002</a><br/>Format:&#160;Elektronik Kaynak<br/> Low tech hacking street smarts for security professionals ent://SD_ILS/0/SD_ILS:137106 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Wiles, Jack.<br/><a href="http://ezproxy.lb.polyu.edu.hk/login?url=http://www.sciencedirect.com/science/book/9781597496650">ScienceDirect e-book</a> ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496650">http://www.sciencedirect.com/science/book/9781597496650</a><br/>Format:&#160;Elektronik Kaynak<br/> SQL injection attacks and defense ent://SD_ILS/0/SD_ILS:997287 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Clarke, Justin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=953188">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing SQL servers protecting your database from attackers ent://SD_ILS/0/SD_ILS:998953 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=980013">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Getting started with Citrix XenApp 6.5 design and implement Citrix farms based on XenApp 6.5 ent://SD_ILS/0/SD_ILS:999870 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Musumeci, Guillermo.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=995550">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking web apps detecting and preventing web application security problems ent://SD_ILS/0/SD_ILS:1000371 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Shema, Mike.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1012529">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Microsoft Forefront Identity Manager 2010 R2 handbook ent://SD_ILS/0/SD_ILS:1000680 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Nordstr&ouml;m, Kent.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1019543">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Microsoft SQL Server 2012 security cookbook ent://SD_ILS/0/SD_ILS:1001891 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Bruchez, Rudi.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1036251">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Practical malware analysis the hands-on guide to dissecting malicious software ent://SD_ILS/0/SD_ILS:1009972 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Sikorski, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137570">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The tangled Web a guide to securing modern Web applications ent://SD_ILS/0/SD_ILS:1009976 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137574">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Oracle 11g anti-hacker's cookbook ent://SD_ILS/0/SD_ILS:1003349 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Neagu, Adrian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1057945">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing WebLogic Server 12c learn to develop, administer, and troubleshot your WebLogic Server ent://SD_ILS/0/SD_ILS:1004959 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Masini, Luca.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1085228">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Nmap 6 network exploration and security auditing cookbook ; a complete guide to mastering Nmap 6 and its scripting engine, covering practical tasks for penetration testers and system administrators ent://SD_ILS/0/SD_ILS:1004961 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Calderon Pale, Paulino.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1085230">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows forensic analysis toolkit advanced analysis techniques for Windows 7 ent://SD_ILS/0/SD_ILS:989925 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Carvey, Harlan A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=850700">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Advances in intelligence and security informatics ent://SD_ILS/0/SD_ILS:993023 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Mao, Wenji.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=892251">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Embedded systems security practical methods for safe and secure software and systems development ent://SD_ILS/0/SD_ILS:992555 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Kleidermacher, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=886256">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IBM i security administration and compliance ent://SD_ILS/0/SD_ILS:993715 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Woodbury, Carol.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=906259">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Malware forensics field guide for Windows systems digital forensics field guides ent://SD_ILS/0/SD_ILS:995189 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Malin, Cameron H.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=921016">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Safeguarding critical e-documents implementing a program for securing confidential information assets ent://SD_ILS/0/SD_ILS:987148 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Smallwood, Robert F., 1959-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=821999">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity for industrial control systems SCADA, DCS, PLC, HMI, and SIS ent://SD_ILS/0/SD_ILS:987449 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Macaulay, Tyson.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826923">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Data mining tools for malware detection ent://SD_ILS/0/SD_ILS:987461 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Masud, Mehedy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826949">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Low tech hacking street smarts for security professionals ent://SD_ILS/0/SD_ILS:987787 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Wiles, Jack.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=829964">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Spring Security 3.1 secure your web applications from hackers with the step-by-step guide ent://SD_ILS/0/SD_ILS:1006508 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Winch, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108351">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> A multidisciplinary introduction to information security ent://SD_ILS/0/SD_ILS:1028416 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Mj&oslash;lsnes, Stig F., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1648315">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of information security understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:133592 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Andress, Jason.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing SQL server protecting your database from attackers ent://SD_ILS/0/SD_ILS:137191 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Cherry, Denny.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496254">http://www.sciencedirect.com/science/book/9781597496254</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing the cloud cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:137201 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Winkler, J. R. (Joachim R.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format:&#160;Elektronik Kaynak<br/> Industrial network security securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems ent://SD_ILS/0/SD_ILS:137208 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Knapp, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496452">http://www.sciencedirect.com/science/book/9781597496452</a><br/>Format:&#160;Elektronik Kaynak<br/> Web application obfuscation -/WAFs..Evasion..Filters//alert (/Obfuscation/)- ent://SD_ILS/0/SD_ILS:137209 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Heiderich, Mario.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496049">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektronik Kaynak<br/> Identity management concepts, technologies, and systems ent://SD_ILS/0/SD_ILS:972507 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Bertino, Elisa.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=634511">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security risk management building an information security risk management program from the ground up ent://SD_ILS/0/SD_ILS:976804 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Wheeler, Evan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=685406">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing the cloud cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:977055 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Winkler, J. R. (Joachim R.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=686827">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security 2020 reduce security risks this decade ent://SD_ILS/0/SD_ILS:978416 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Howard, Doug.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=694289">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Social engineering the art of human hacking ent://SD_ILS/0/SD_ILS:978980 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Hadnagy, Christopher.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706746">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Web commerce security design and development ent://SD_ILS/0/SD_ILS:978975 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Nahari, Hadi.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706729">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer Forensics jumpstart ent://SD_ILS/0/SD_ILS:973680 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Solomon, Michael R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=661659">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Oracle Identity and Access Manager 11g for administrators administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasks ent://SD_ILS/0/SD_ILS:996835 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Kumar, Atul.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948559">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Microsoft Forefront UAG 2010 administrator's handbook take full command of Microsoft Forefront Unified Access Gateway to secure your business applications and provide dynamic remote access with DirectAccess ent://SD_ILS/0/SD_ILS:996844 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Ben-Ari, Erez.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948568">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Formal models and techniques for analyzing security protocols ent://SD_ILS/0/SD_ILS:984359 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=784604">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> A bug hunter's diary a guided tour through the wilds of software security ent://SD_ILS/0/SD_ILS:1009945 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Klein, Tobias.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137526">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The web application hacker's handbook finding and exploiting security flaws ent://SD_ILS/0/SD_ILS:986773 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Stuttard, Dafydd.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=819008">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The Cloud understanding the security, privacy and trust challenges ent://SD_ILS/0/SD_ILS:987397 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Robinson, Neil, 1964-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=825129">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Introduction to cryptography with open-source software ent://SD_ILS/0/SD_ILS:1027312 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;McAndrew, Alasdair, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1633743">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Advances in computers. Volume 83 ent://SD_ILS/0/SD_ILS:1183782 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Zelkowitz, Marvin V., 1945-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123855107">http://www.sciencedirect.com/science/book/9780123855107</a><br/>Format:&#160;Elektronik Kaynak<br/> Thor's Microsoft security bible : a collection of practical security techniques ent://SD_ILS/0/SD_ILS:1183972 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Mullen, Timothy M.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495721">http://www.sciencedirect.com/science/book/9781597495721</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:1183815 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Andress, Jason.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496537">https://www.sciencedirect.com/science/book/9781597496537</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing the cloud : cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:1183743 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Winkler, J. R. (Joachim R.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format:&#160;Elektronik Kaynak<br/> Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems ent://SD_ILS/0/SD_ILS:1184011 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Knapp, Eric.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496452">https://www.sciencedirect.com/science/book/9781597496452</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber attacks : protecting national infrastructure ent://SD_ILS/0/SD_ILS:1181825 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Amoroso, Edward G.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123849175">https://www.sciencedirect.com/science/book/9780123849175</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing SQL server : protecting your database from attackers ent://SD_ILS/0/SD_ILS:1183510 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Cherry, Denny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496254">https://www.sciencedirect.com/science/book/9781597496254</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows Registry Forensics : Advanced Digital Forensic Analysis of the Windows Registry. ent://SD_ILS/0/SD_ILS:1183526 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Carvey, Harlan.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495806">https://www.sciencedirect.com/science/book/9781597495806</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of hacking and penetration testing ethical hacking and penetration testing made easy ent://SD_ILS/0/SD_ILS:133594 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Engebretson, Pat (Patrick Henry), 1974-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496551">http://www.sciencedirect.com/science/book/9781597496551</a><br/>Format:&#160;Elektronik Kaynak<br/> IT audit, control, and security ent://SD_ILS/0/SD_ILS:972135 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Moeller, Robert R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=624573">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Adaptive security management architecture ent://SD_ILS/0/SD_ILS:972238 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=625004">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Logics and languages for reliability and security ent://SD_ILS/0/SD_ILS:966627 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Esparza, Javier.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=557042">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cloud security a comprehensive guide to secure cloud computing ent://SD_ILS/0/SD_ILS:968403 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Krutz, Ronald L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=589027">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Mac security bible ent://SD_ILS/0/SD_ILS:960377 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Kissell, Joe.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=477803">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Group policy fundamentals, security, and the managed desktop ent://SD_ILS/0/SD_ILS:963479 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Moskowitz, Jeremy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=530009">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Dear hacker letters to the editor of 2600 ent://SD_ILS/0/SD_ILS:964867 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Goldstein, Emmanuel J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537340">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hashing in computer science fifty years of slicing and dicing ent://SD_ILS/0/SD_ILS:964869 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Konheim, Alan G., 1934-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537352">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Professional Cocoa application security ent://SD_ILS/0/SD_ILS:964870 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Lee, Graham J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537355">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Least privilege security for Windows 7, Vista, And XP secure desktops for regulatory compliance and business agility ent://SD_ILS/0/SD_ILS:996314 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Smith, Russell.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=944038">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> GlassFish security secure your GlassFish installation, web applications, EJB applications, application client module, and web services using Java EE and GlassFish security measures ent://SD_ILS/0/SD_ILS:996405 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Kalali, Masoud.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=944941">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Risk factors in computer-crime victimization ent://SD_ILS/0/SD_ILS:1003244 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Choi, Kyung-shick, 1973-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1057793">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Safety of computer architectures ent://SD_ILS/0/SD_ILS:1008153 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Boulanger, Jean-Louis.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1120753">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Relation based access control ent://SD_ILS/0/SD_ILS:1025132 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Zhang, Rui.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1589007">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Advances in artificial intelligence for privacy protection and security ent://SD_ILS/0/SD_ILS:1030272 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Solanas, Agusti.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1679374">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Secure and resilient software development ent://SD_ILS/0/SD_ILS:1020692 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Merkow, Mark S., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1446770">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Dissecting the hack : the forb1dd3n network ent://SD_ILS/0/SD_ILS:1181379 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Street, Jayson E.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495684">https://www.sciencedirect.com/science/book/9781597495684</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of hacking and penetration testing : ethical hacking and penetration testing made easy ent://SD_ILS/0/SD_ILS:1183950 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Engebretson, Pat (Patrick Henry), 1974-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496551">https://www.sciencedirect.com/science/book/9781597496551</a><br/>Format:&#160;Elektronik Kaynak<br/> A guide to kernel exploitation : attacking the core ent://SD_ILS/0/SD_ILS:1181770 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Perla, Enrico.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494861">https://www.sciencedirect.com/science/book/9781597494861</a><br/>Format:&#160;Elektronik Kaynak<br/> Managed code rootkits : hooking into runtime environments ent://SD_ILS/0/SD_ILS:1181827 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Metula, Erez.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495745">http://www.sciencedirect.com/science/book/9781597495745</a><br/>Format:&#160;Elektronik Kaynak<br/> System assurance : beyond detecting vulnerabilities ent://SD_ILS/0/SD_ILS:1183266 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Mansourov, Nikolai.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123814142">https://www.sciencedirect.com/science/book/9780123814142</a><br/>Format:&#160;Elektronik Kaynak<br/> Seven deadliest Microsoft attacks ent://SD_ILS/0/SD_ILS:1177479 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Kraus, Rob.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495516">https://www.sciencedirect.com/science/book/9781597495516</a><br/>Format:&#160;Elektronik Kaynak<br/> Seven deadliest wireless technologies attacks ent://SD_ILS/0/SD_ILS:1178019 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Haines, Brad.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495417">https://www.sciencedirect.com/science/book/9781597495417</a><br/>Format:&#160;Elektronik Kaynak<br/> Seven deadliest USB attacks ent://SD_ILS/0/SD_ILS:1178020 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Anderson, Brian (Brian James)<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495530">https://www.sciencedirect.com/science/book/9781597495530</a><br/>Format:&#160;Elektronik Kaynak<br/> Seven deadliest social network attacks ent://SD_ILS/0/SD_ILS:1178031 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Timm, Carl.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495455">https://www.sciencedirect.com/science/book/9781597495455</a><br/>Format:&#160;Elektronik Kaynak<br/> Virtualization and forensics : a digital forensic investigator's guide to virtual environments ent://SD_ILS/0/SD_ILS:1178429 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Barrett, Diane.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format:&#160;Elektronik Kaynak<br/> Distributed systems security issues, processes, and solutions ent://SD_ILS/0/SD_ILS:954183 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Belapurkar, Abhijit.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=437429">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Enterprise information security and privacy ent://SD_ILS/0/SD_ILS:956331 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Axelrod, C. Warren.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456886">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:955637 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=453166">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The definitive guide to the C&amp;A transformation the first publication of a comprehensive view of the C&amp;A transformation ent://SD_ILS/0/SD_ILS:965453 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Mehan, Julie E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=547041">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Gray hat Python Python programming for hackers and reverse engineers ent://SD_ILS/0/SD_ILS:1009952 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Seitz, Justin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137535">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Aldatma sanat&#305; : g&uuml;venli&#287;in insan boyutunun kullan&#305;lmas&#305; ent://SD_ILS/0/SD_ILS:282929 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Mitnick, Kevin D.<br/>Format:&#160;Kitap<br/> Aldatma sanat&#305; : g&uuml;venli&#287;in insan boyutunun kullan&#305;lmas&#305; ent://SD_ILS/0/SD_ILS:1158369 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Mitnick, Kevin D.<br/>Format:&#160;Kitap<br/> Next generation SSH2 implementation : securing data in motion ent://SD_ILS/0/SD_ILS:1191763 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Liu, Dale.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492836">https://www.sciencedirect.com/science/book/9781597492836</a><br/>Format:&#160;Elektronik Kaynak<br/> SQL injection attacks and defense ent://SD_ILS/0/SD_ILS:1192819 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Clarke, Justin.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494243">https://www.sciencedirect.com/science/book/9781597494243</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security a manager's guide to thwarting data thieves and hackers ent://SD_ILS/0/SD_ILS:945288 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Alexander, Philip, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=339307">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Secure computer and network systems modeling, analysis and design ent://SD_ILS/0/SD_ILS:946385 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Ye, Nong.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=351427">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer forensics for dummies ent://SD_ILS/0/SD_ILS:947774 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Volonino, Linda.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=380503">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Practical embedded security building secure resource-constrained systems ent://SD_ILS/0/SD_ILS:942507 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Stapko, Timothy John.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=312846">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Digital watermarking and steganography ent://SD_ILS/0/SD_ILS:944015 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Cox, I. J. (Ingemar J.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328311">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information assurance dependability and security in networked systems ent://SD_ILS/0/SD_ILS:944016 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Qian, Yi, 1962-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328312">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security policy, processes, and practices ent://SD_ILS/0/SD_ILS:953297 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Straub, Detmar W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=435197">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing information and communications systems principles, technologies, and applications ent://SD_ILS/0/SD_ILS:956326 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Furnell, Steven, 1970-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456881">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Fuzzing for software security testing and quality assurance ent://SD_ILS/0/SD_ILS:956329 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Takanen, Ari.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456884">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking the art of exploitation ent://SD_ILS/0/SD_ILS:1009955 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137538">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Trust and security in collaborative computing ent://SD_ILS/0/SD_ILS:1030255 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Zou, Xukai, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1679354">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Google hacking for penetration testers. Volume 2 ent://SD_ILS/0/SD_ILS:1189102 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491761">https://www.sciencedirect.com/science/book/9781597491761</a><br/>Format:&#160;Elektronik Kaynak<br/> Practical embedded security : building secure resource-constrained systems ent://SD_ILS/0/SD_ILS:1189168 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Stapko, Timothy John.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780750682152">https://www.sciencedirect.com/science/book/9780750682152</a><br/>Format:&#160;Elektronik Kaynak<br/> Microsoft forefront security administration guide ent://SD_ILS/0/SD_ILS:1189120 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Varsalone, Jesse.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492447">https://www.sciencedirect.com/science/book/9781597492447</a><br/>Format:&#160;Elektronik Kaynak<br/> Check Point NGX R65 security administration ent://SD_ILS/0/SD_ILS:1189122 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Bonnell, Ralph.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492454">http://www.sciencedirect.com/science/book/9781597492454</a><br/>Format:&#160;Elektronik Kaynak<br/> Information assurance : dependability and security in networked systems ent://SD_ILS/0/SD_ILS:1189195 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Qian, Yi, 1962-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123735669">https://www.sciencedirect.com/science/book/9780123735669</a><br/>Format:&#160;Elektronik Kaynak<br/> Digital watermarking and steganography ent://SD_ILS/0/SD_ILS:1189196 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Cox, I. J. (Ingemar J.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123725851">http://www.sciencedirect.com/science/book/9780123725851</a><br/>Format:&#160;Elektronik Kaynak<br/> OSSEC host-based intrusion detection guide ent://SD_ILS/0/SD_ILS:1189620 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Hay, Andrew.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492409">http://www.sciencedirect.com/science/book/9781597492409</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing Windows server 2008 : prevent attacks from outside and inside your organization. ent://SD_ILS/0/SD_ILS:1189621 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492805">https://www.sciencedirect.com/science/book/9781597492805</a><br/>Format:&#160;Elektronik Kaynak<br/> No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfing ent://SD_ILS/0/SD_ILS:1189635 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492157">https://www.sciencedirect.com/science/book/9781597492157</a><br/>Format:&#160;Elektronik Kaynak<br/> Malware forensics : investigating and analyzing malicious code ent://SD_ILS/0/SD_ILS:1189636 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Aquilina, James M.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492683">http://www.sciencedirect.com/science/book/9781597492683</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing Citrix XenApp Server in the enterprise ent://SD_ILS/0/SD_ILS:1189637 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Bin Azad, Tariq.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492812">http://www.sciencedirect.com/science/book/9781597492812</a><br/>Format:&#160;Elektronik Kaynak<br/> Scene of the cybercrime. ent://SD_ILS/0/SD_ILS:1189665 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Cross, Michael, 1965-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492768">https://www.sciencedirect.com/science/book/9781597492768</a><br/>Format:&#160;Elektronik Kaynak<br/> OS X exploits and defense ent://SD_ILS/0/SD_ILS:1189705 2024-05-14T06:34:15Z 2024-05-14T06:34:15Z by&#160;Baccas, Paul.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492546">http://www.sciencedirect.com/science/book/9781597492546</a><br/>Format:&#160;Elektronik Kaynak<br/>