Arama Sonu&ccedil;lar&#305; - Daralt&#305;lm&#305;&#351;: Electronic books. - ProQuest (Firm) - Computer security. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Electronic$002bbooks.$002509Electronic$002bbooks.$0026qf$003dAUTHOR$002509Yazar$002509ProQuest$002b$002528Firm$002529$002509ProQuest$002b$002528Firm$002529$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300? 2024-06-04T16:40:08Z Biohackers the politics of open science ent://SD_ILS/0/SD_ILS:1088207 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Delfanti, Alessandro.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3386719">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Investigative computer forensics the practical guide for lawyers, accountants, investigators, and business executives ent://SD_ILS/0/SD_ILS:986492 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Laykin, Erik.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=817953">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Pragmatic security metrics applying metametrics to information security ent://SD_ILS/0/SD_ILS:1010972 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Brotby, W. Krag.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1153198">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Safety management for software-based equipment ent://SD_ILS/0/SD_ILS:1013439 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Boulanger, Jean-Louis.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1187169">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Technocrime, policing and surveillance ent://SD_ILS/0/SD_ILS:1000567 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Leman-Langlois, St&eacute;phane, 1965-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1016143">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Logging and log management the authoritative guide to understanding the concepts surrounding logging and log management ent://SD_ILS/0/SD_ILS:1004458 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Chuvakin, Anton A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1077419">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Enterprise security a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise ent://SD_ILS/0/SD_ILS:1005995 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Woody, Aaron.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1103988">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Group policy fundamentals, security, and the managed desktop ent://SD_ILS/0/SD_ILS:1006089 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Moskowitz, Jeremy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1104500">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking for dummies ent://SD_ILS/0/SD_ILS:1006251 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Beaver, Kevin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1106542">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Web application defender's cookbook battling hackers and protecting users ent://SD_ILS/0/SD_ILS:1006627 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Barnett, Ryan C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108733">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The complete guide to physical security ent://SD_ILS/0/SD_ILS:1007002 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Baker, Paul R., 1958-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1112600">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security risk assessment toolkit practical assessments through data collection and data analysis ent://SD_ILS/0/SD_ILS:1002837 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Talabis, Mark Ryan N.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1047930">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network intrusion analysis methodologies, tools, and techniques for incident analysis and response ent://SD_ILS/0/SD_ILS:1003376 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Fichera, Joe, 1966-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1058152">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Data hiding exposing concealed data in multimedia, operating systems, mobile devices, and network protocols ent://SD_ILS/0/SD_ILS:1003916 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Raggo, Michael T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073014">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineers ent://SD_ILS/0/SD_ILS:1003922 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;O'Connor, T. J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073021">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows server 2012 security from end to edge and beyond architecting, designing, planning, and deploying Windows server 2012 security solutions ent://SD_ILS/0/SD_ILS:1007612 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115164">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Practical anonymity hiding in plain sight online ent://SD_ILS/0/SD_ILS:1007614 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Loshin, Peter.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115167">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Simple steps to data encryption a practical guide to secure computing ent://SD_ILS/0/SD_ILS:1007623 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Loshin, Pete.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115182">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Using social media for global security ent://SD_ILS/0/SD_ILS:1007845 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Gupta, Ravi.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1118756">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Citrix Access Gateway VPX 5.04 essentials a practical step-by-step guide to provide secure remote access using the Citrix Access Gateway VPX ent://SD_ILS/0/SD_ILS:1008015 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Mallett, Andrew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1119760">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Intelligent systems for security informatics ent://SD_ILS/0/SD_ILS:1009493 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Yang, Christopher.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1133729">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber security for educational leaders a guide to understanding and implementing technology policies ent://SD_ILS/0/SD_ILS:1010656 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Sianjina, Rayton R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1143733">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Malware forensics field guide for Windows systems digital forensics field guides ent://SD_ILS/0/SD_ILS:995189 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Malin, Cameron H.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=921016">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> SQL injection attacks and defense ent://SD_ILS/0/SD_ILS:997287 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Clarke, Justin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=953188">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Embedded systems security practical methods for safe and secure software and systems development ent://SD_ILS/0/SD_ILS:992555 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Kleidermacher, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=886256">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Advances in intelligence and security informatics ent://SD_ILS/0/SD_ILS:993023 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Mao, Wenji.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=892251">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IBM i security administration and compliance ent://SD_ILS/0/SD_ILS:993715 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Woodbury, Carol.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=906259">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Safeguarding critical e-documents implementing a program for securing confidential information assets ent://SD_ILS/0/SD_ILS:987148 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Smallwood, Robert F., 1959-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=821999">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity for industrial control systems SCADA, DCS, PLC, HMI, and SIS ent://SD_ILS/0/SD_ILS:987449 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Macaulay, Tyson.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826923">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Data mining tools for malware detection ent://SD_ILS/0/SD_ILS:987461 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Masud, Mehedy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826949">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Low tech hacking street smarts for security professionals ent://SD_ILS/0/SD_ILS:987787 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Wiles, Jack.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=829964">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows forensic analysis toolkit advanced analysis techniques for Windows 7 ent://SD_ILS/0/SD_ILS:989925 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Carvey, Harlan A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=850700">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing SQL servers protecting your database from attackers ent://SD_ILS/0/SD_ILS:998953 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=980013">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Getting started with Citrix XenApp 6.5 design and implement Citrix farms based on XenApp 6.5 ent://SD_ILS/0/SD_ILS:999870 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Musumeci, Guillermo.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=995550">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking web apps detecting and preventing web application security problems ent://SD_ILS/0/SD_ILS:1000371 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Shema, Mike.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1012529">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Microsoft Forefront Identity Manager 2010 R2 handbook ent://SD_ILS/0/SD_ILS:1000680 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Nordstr&ouml;m, Kent.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1019543">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing WebLogic Server 12c learn to develop, administer, and troubleshot your WebLogic Server ent://SD_ILS/0/SD_ILS:1004959 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Masini, Luca.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1085228">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Nmap 6 network exploration and security auditing cookbook ; a complete guide to mastering Nmap 6 and its scripting engine, covering practical tasks for penetration testers and system administrators ent://SD_ILS/0/SD_ILS:1004961 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Calderon Pale, Paulino.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1085230">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Spring Security 3.1 secure your web applications from hackers with the step-by-step guide ent://SD_ILS/0/SD_ILS:1006508 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Winch, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108351">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Microsoft SQL Server 2012 security cookbook ent://SD_ILS/0/SD_ILS:1001891 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Bruchez, Rudi.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1036251">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Oracle 11g anti-hacker's cookbook ent://SD_ILS/0/SD_ILS:1003349 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Neagu, Adrian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1057945">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Practical malware analysis the hands-on guide to dissecting malicious software ent://SD_ILS/0/SD_ILS:1009972 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Sikorski, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137570">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The tangled Web a guide to securing modern Web applications ent://SD_ILS/0/SD_ILS:1009976 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137574">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Identity management concepts, technologies, and systems ent://SD_ILS/0/SD_ILS:972507 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Bertino, Elisa.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=634511">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer Forensics jumpstart ent://SD_ILS/0/SD_ILS:973680 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Solomon, Michael R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=661659">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security risk management building an information security risk management program from the ground up ent://SD_ILS/0/SD_ILS:976804 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Wheeler, Evan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=685406">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing the cloud cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:977055 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Winkler, J. R. (Joachim R.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=686827">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Formal models and techniques for analyzing security protocols ent://SD_ILS/0/SD_ILS:984359 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=784604">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The web application hacker's handbook finding and exploiting security flaws ent://SD_ILS/0/SD_ILS:986773 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Stuttard, Dafydd.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=819008">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Oracle Identity and Access Manager 11g for administrators administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasks ent://SD_ILS/0/SD_ILS:996835 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Kumar, Atul.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948559">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Microsoft Forefront UAG 2010 administrator's handbook take full command of Microsoft Forefront Unified Access Gateway to secure your business applications and provide dynamic remote access with DirectAccess ent://SD_ILS/0/SD_ILS:996844 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Ben-Ari, Erez.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948568">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The Cloud understanding the security, privacy and trust challenges ent://SD_ILS/0/SD_ILS:987397 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Robinson, Neil, 1964-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=825129">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security 2020 reduce security risks this decade ent://SD_ILS/0/SD_ILS:978416 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Howard, Doug.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=694289">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Web commerce security design and development ent://SD_ILS/0/SD_ILS:978975 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Nahari, Hadi.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706729">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Social engineering the art of human hacking ent://SD_ILS/0/SD_ILS:978980 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Hadnagy, Christopher.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706746">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> A bug hunter's diary a guided tour through the wilds of software security ent://SD_ILS/0/SD_ILS:1009945 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Klein, Tobias.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137526">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Mac security bible ent://SD_ILS/0/SD_ILS:960377 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Kissell, Joe.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=477803">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Group policy fundamentals, security, and the managed desktop ent://SD_ILS/0/SD_ILS:963479 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Moskowitz, Jeremy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=530009">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Dear hacker letters to the editor of 2600 ent://SD_ILS/0/SD_ILS:964867 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Goldstein, Emmanuel J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537340">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hashing in computer science fifty years of slicing and dicing ent://SD_ILS/0/SD_ILS:964869 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Konheim, Alan G., 1934-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537352">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Professional Cocoa application security ent://SD_ILS/0/SD_ILS:964870 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Lee, Graham J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537355">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IT audit, control, and security ent://SD_ILS/0/SD_ILS:972135 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Moeller, Robert R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=624573">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Adaptive security management architecture ent://SD_ILS/0/SD_ILS:972238 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=625004">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Logics and languages for reliability and security ent://SD_ILS/0/SD_ILS:966627 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Esparza, Javier.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=557042">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cloud security a comprehensive guide to secure cloud computing ent://SD_ILS/0/SD_ILS:968403 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Krutz, Ronald L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=589027">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Least privilege security for Windows 7, Vista, And XP secure desktops for regulatory compliance and business agility ent://SD_ILS/0/SD_ILS:996314 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Smith, Russell.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=944038">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> GlassFish security secure your GlassFish installation, web applications, EJB applications, application client module, and web services using Java EE and GlassFish security measures ent://SD_ILS/0/SD_ILS:996405 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Kalali, Masoud.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=944941">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Risk factors in computer-crime victimization ent://SD_ILS/0/SD_ILS:1003244 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Choi, Kyung-shick, 1973-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1057793">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Safety of computer architectures ent://SD_ILS/0/SD_ILS:1008153 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Boulanger, Jean-Louis.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1120753">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Advances in artificial intelligence for privacy protection and security ent://SD_ILS/0/SD_ILS:1030272 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Solanas, Agusti.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1679374">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:955637 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=453166">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Enterprise information security and privacy ent://SD_ILS/0/SD_ILS:956331 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Axelrod, C. Warren.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456886">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Distributed systems security issues, processes, and solutions ent://SD_ILS/0/SD_ILS:954183 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Belapurkar, Abhijit.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=437429">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The definitive guide to the C&amp;A transformation the first publication of a comprehensive view of the C&amp;A transformation ent://SD_ILS/0/SD_ILS:965453 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Mehan, Julie E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=547041">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Gray hat Python Python programming for hackers and reverse engineers ent://SD_ILS/0/SD_ILS:1009952 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Seitz, Justin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137535">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing information and communications systems principles, technologies, and applications ent://SD_ILS/0/SD_ILS:956326 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Furnell, Steven, 1970-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456881">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Fuzzing for software security testing and quality assurance ent://SD_ILS/0/SD_ILS:956329 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Takanen, Ari.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456884">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer forensics for dummies ent://SD_ILS/0/SD_ILS:947774 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Volonino, Linda.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=380503">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Practical embedded security building secure resource-constrained systems ent://SD_ILS/0/SD_ILS:942507 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Stapko, Timothy John.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=312846">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security policy, processes, and practices ent://SD_ILS/0/SD_ILS:953297 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Straub, Detmar W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=435197">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Digital watermarking and steganography ent://SD_ILS/0/SD_ILS:944015 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Cox, I. J. (Ingemar J.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328311">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information assurance dependability and security in networked systems ent://SD_ILS/0/SD_ILS:944016 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Qian, Yi, 1962-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328312">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security a manager's guide to thwarting data thieves and hackers ent://SD_ILS/0/SD_ILS:945288 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Alexander, Philip, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=339307">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Secure computer and network systems modeling, analysis and design ent://SD_ILS/0/SD_ILS:946385 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Ye, Nong.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=351427">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking the art of exploitation ent://SD_ILS/0/SD_ILS:1009955 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137538">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Trust and security in collaborative computing ent://SD_ILS/0/SD_ILS:1030255 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Zou, Xukai, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1679354">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Toward a safer and more secure cyberspace ent://SD_ILS/0/SD_ILS:1085452 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Goodman, Seymour E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3378311">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Developer's guide to web application security ent://SD_ILS/0/SD_ILS:938521 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Cross, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=289735">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Papers from the first European workshop on technological &amp; security issues in digital rights management (EuDiRights) ent://SD_ILS/0/SD_ILS:939160 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Yag&uuml;e, Mariemma.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=291585">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Microsoft windows security fundamentals ent://SD_ILS/0/SD_ILS:939647 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Clercq, Jan de, 1968-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294637">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Techno security's guide to e-discovery and digital forensics ent://SD_ILS/0/SD_ILS:948015 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Wiles, Jack.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=405426">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security convergence managing enterprise security risk ent://SD_ILS/0/SD_ILS:940434 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Tyson, Dave.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=299507">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> A process for developing a common vocabulary in the information security area ent://SD_ILS/0/SD_ILS:943478 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;NATO Advanced Research Workshop on a Process for Developing a Common Vocabulary in the Information Security Area (2006 : Moscow, Russia)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=320313">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Microsoft Vista for IT security professionals ent://SD_ILS/0/SD_ILS:944075 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Piltzecker, Tony, 1975-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328623">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows forensic analysis DVD toolkit, ent://SD_ILS/0/SD_ILS:944076 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Carvey, Harlan A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328624">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information management &amp; computer security. Volume 15, Number 5, Papers from the HAISA 2007 Symposium ent://SD_ILS/0/SD_ILS:944119 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328737">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Zen and the art of information security ent://SD_ILS/0/SD_ILS:944282 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Winkler, Ira.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=330200">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Best damn firewall book period ent://SD_ILS/0/SD_ILS:944260 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=330100">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Role-based access control ent://SD_ILS/0/SD_ILS:945221 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Ferraiolo, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338751">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The misuse of information systems the impact of security countermeasures ent://SD_ILS/0/SD_ILS:1058044 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;D'Arcy, John P., 1975-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3016826">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security data visualization graphical techniques for network analysis ent://SD_ILS/0/SD_ILS:1058454 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Conti, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3017625">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Multimedia security technologies for digital rights management ent://SD_ILS/0/SD_ILS:936640 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Zeng, Wenjun, 1967-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=274233">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Combating spyware in the enterprise ent://SD_ILS/0/SD_ILS:936645 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Baskin, Brian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=274289">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Trusted platform module basics using TPM in embedded systems ent://SD_ILS/0/SD_ILS:936705 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Kinney, Steven.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=274719">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Part-themed issue on internet security ent://SD_ILS/0/SD_ILS:937989 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Yague, Mariemma.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=285507">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security issues of IT outsourcing ent://SD_ILS/0/SD_ILS:938018 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Gritzalis, Stefanos.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=285536">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information assurance and computer security ent://SD_ILS/0/SD_ILS:938176 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;NATO Advanced Research Workshop on Information Assurance and Computer Security (2005 : T?etouan, Morocco)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=287000">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing HP NonStop servers in an open systems world TCP/IP, OSS &amp; SQL ent://SD_ILS/0/SD_ILS:939197 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;XYPRO Technology Corporation.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=291716">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasures ent://SD_ILS/0/SD_ILS:939483 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Contos, Brian T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294116">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at designing security for a Windows Server 2003 network ent://SD_ILS/0/SD_ILS:933856 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Amini, Rob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254832">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:933858 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Long, Johnny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254834">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing IM and P2P applications for the enterprise ent://SD_ILS/0/SD_ILS:933871 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Piccard, Paul L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254847">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Insider threat protecting the enterprise from sabotage, spying, and theft ent://SD_ILS/0/SD_ILS:933873 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Cole, Eric.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254849">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Perfect passwords selection, protection, authentication ent://SD_ILS/0/SD_ILS:933875 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Burnett, Mark.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254851">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> BigNum math implementing cryptographic multiple precision arithmetic ent://SD_ILS/0/SD_ILS:934605 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;St. Denis, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=261284">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Essential computer security everyone's guide to e-mail, internet, and wireless security ent://SD_ILS/0/SD_ILS:943350 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Bradley, Tony.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=319200">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Click, click, who's really there? protect your family from online predators, pedophiles, privacy loss, and more ent://SD_ILS/0/SD_ILS:945276 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Koh.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338853">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Multilevel security and DB2 row-level security revealed ent://SD_ILS/0/SD_ILS:1075159 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306464">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Federated identity management and web services security with IBM tivoli security solutions ent://SD_ILS/0/SD_ILS:1075216 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;B&uuml;cker, Axel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306521">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IBM rational application developer V6 portlet application development and portal tools ent://SD_ILS/0/SD_ILS:1075242 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Rodriguez, Juan R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306547">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Silence on the wire a field guide to passive reconnaissance and indirect attacks ent://SD_ILS/0/SD_ILS:936579 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273504">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Implementing database security and auditing ent://SD_ILS/0/SD_ILS:938079 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Ben-Natan, Ron.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=286701">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Google Hacking for Penetration Testers ent://SD_ILS/0/SD_ILS:939497 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Long, Johnny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294147">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Dr. Tom Shinder's configuring ISA Server 2004 ent://SD_ILS/0/SD_ILS:939479 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294094">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Risk management for computer security Protecting your network and information assets ent://SD_ILS/0/SD_ILS:939658 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Jones, Andy, 1952-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294671">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Nessus, Snort, &amp; Ethereal power tools customizing open source security applications ent://SD_ILS/0/SD_ILS:933863 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Archibald, Neil.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254839">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Software piracy exposed ent://SD_ILS/0/SD_ILS:933864 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Honick, Ron.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254840">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security evaluation using the NSA IEM ent://SD_ILS/0/SD_ILS:933866 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Fuller, Ed.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254842">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Basics of contemporary cryptography for IT practitioners ent://SD_ILS/0/SD_ILS:939979 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Ryabko, Boris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=296069">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Buffer overflow attacks detect, exploit, prevent ent://SD_ILS/0/SD_ILS:930207 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Foster, James C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=222803">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Black hat physical device security exploiting hardware and software ent://SD_ILS/0/SD_ILS:930209 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Miller, Drew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=222851">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber spying tracking your family's (sometimes) secret online lives ent://SD_ILS/0/SD_ILS:930210 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Fair, Ted.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=222853">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Aggressive network self-defense ent://SD_ILS/0/SD_ILS:930656 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Wyler, Neil R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=225321">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Sockets, shellcode, porting &amp; coding reverse engineering exploits and tool coding for security professionals ent://SD_ILS/0/SD_ILS:930713 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Foster, James C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=226568">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Intrusion prevention and active response deploying network and host IPS ent://SD_ILS/0/SD_ILS:930714 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Henmi, Anne.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=226578">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> InfoSec career hacking sell your skillz, not your soul ent://SD_ILS/0/SD_ILS:930810 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Bayles, Aaron W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227231">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Reversing secrets of reverse engineering ent://SD_ILS/0/SD_ILS:930876 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Eilam, Eldad.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227440">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> User's guide to cryptography and standards ent://SD_ILS/0/SD_ILS:931017 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Dent, Alexander W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227658">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Contemporary cryptography ent://SD_ILS/0/SD_ILS:931287 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Oppliger, Rolf.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=231638">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Host integrity monitoring using Osiris and Samhain ent://SD_ILS/0/SD_ILS:931606 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Wotring, Brian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=233599">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> zSeries Trusted Key Entry (TKE) version 4.2 update ent://SD_ILS/0/SD_ILS:1075371 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Kappeler, Patrick.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306676">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> iSeries Access for Windows V5R2 hot topics tailored images, application administration, SSL, and Kerberos ent://SD_ILS/0/SD_ILS:1075394 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Schulz, Jeremy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306699">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IBM eserver zSeries 990 (z990) cryptography implementation ent://SD_ILS/0/SD_ILS:1075486 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306791">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Linux on IBM e-server zSeries and S/390 best security practices ent://SD_ILS/0/SD_ILS:1075530 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Geiselhart, Gregory.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306835">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Ethereal packet sniffing ent://SD_ILS/0/SD_ILS:939485 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Orebaugh, Angela.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294122">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking the code ASP. NET web application security ent://SD_ILS/0/SD_ILS:939506 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Burnett, Mark (Mark M.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294160">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> MCSE designing security for a Windows Server 2003 network : exam 70-298 study guide &amp; DVD training system ent://SD_ILS/0/SD_ILS:939533 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Khnaser, Elias N.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294253">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Programmer's ultimate security deskref ent://SD_ILS/0/SD_ILS:939559 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Foster, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294328">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber adversary characterization auditing the hacker mind ent://SD_ILS/0/SD_ILS:939469 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Parker, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294071">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security sage's guide to hardening the network infrastructure ent://SD_ILS/0/SD_ILS:939571 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Andr&eacute;s, Steven.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294359">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Stealing the network how to own a continent ent://SD_ILS/0/SD_ILS:939580 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Rogers, Russ.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294377">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> WarDriving drive, detect, defend: a guide to wireless security ent://SD_ILS/0/SD_ILS:939600 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Hurley, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294441">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at Configuring ISA Server 2004 ent://SD_ILS/0/SD_ILS:933877 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Shinder, Dr. Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254853">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security foundations ent://SD_ILS/0/SD_ILS:935040 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Strebe, Matthew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=267332">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Innocent code a security wake-up call for Web programmers ent://SD_ILS/0/SD_ILS:929474 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Huseby, Sverre H.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=210558">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Protecting your library's digital sources the essential guide to planning and preservation ent://SD_ILS/0/SD_ILS:930096 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Kahn, Miriam (Miriam B.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=218937">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Bluetooth security ent://SD_ILS/0/SD_ILS:931009 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Gehrmann, Christian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227650">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Defense and detection strategies against Internet worms ent://SD_ILS/0/SD_ILS:931019 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Nazario, Jose.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227660">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Privacy protection and computer forensics ent://SD_ILS/0/SD_ILS:931051 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Caloyannides, Michael A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227692">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Intelligent watermarking techniques ent://SD_ILS/0/SD_ILS:931269 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Pan, Jeng-Shyang.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=231561">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Click, click, who's there? a family-based non-technical approach to help parents protect their children online ent://SD_ILS/0/SD_ILS:945275 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Koh.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338852">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Finding and fixing vulnerabilities in information systems the vulnerability assessment &amp; mitigation methodology ent://SD_ILS/0/SD_ILS:927792 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Ant&oacute;n, Philip S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=197482">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> zSeries crypto guide update ent://SD_ILS/0/SD_ILS:1075400 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306705">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information getting, protecting and using data. ent://SD_ILS/0/SD_ILS:1092016 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411420">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information getting, protecting and using data. ent://SD_ILS/0/SD_ILS:1092032 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411436">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security secrets, intruders and ID tags. ent://SD_ILS/0/SD_ILS:1092043 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411447">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking the art of exploitation ent://SD_ILS/0/SD_ILS:936567 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273488">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Configuring Symantec Antivirus, Corporate Edition ent://SD_ILS/0/SD_ILS:939462 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Hunter, Laura E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294056">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Snort 2.0 intrusion detection ent://SD_ILS/0/SD_ILS:939575 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Beale, Jay.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294371">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> SSCP study guide and &amp; DVD training system ent://SD_ILS/0/SD_ILS:939578 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Jacobs, Josh.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294375">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security a practical guide ent://SD_ILS/0/SD_ILS:940334 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Poole, Owen.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=298471">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity operations handbook ent://SD_ILS/0/SD_ILS:942613 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Rittinghouse, John W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=313612">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Techniques and applications of digital watermarking and content protection ent://SD_ILS/0/SD_ILS:930949 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Arnold, Michael (Michael Konrad), 1964-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227587">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Role-based access control ent://SD_ILS/0/SD_ILS:930991 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Ferraiolo, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227631">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security technologies for the World Wide Web ent://SD_ILS/0/SD_ILS:930980 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Oppliger, Rolf.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227620">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Mission-critical network planning ent://SD_ILS/0/SD_ILS:931011 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Liotine, Matthew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227652">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity today and tomorrow pay now or pay later ent://SD_ILS/0/SD_ILS:1082583 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3375180">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Putting the latest z/OS security features to work ent://SD_ILS/0/SD_ILS:1075358 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306663">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> An introduction to security in a CSM 1.3 for AIX 5L environment ent://SD_ILS/0/SD_ILS:1075407 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Lascu, Octavian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306712">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Crackproof your software the best ways to protect your software against crackers ent://SD_ILS/0/SD_ILS:936564 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;C&#774;erv&#277;n, Pavol.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273482">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing ColdFusion ent://SD_ILS/0/SD_ILS:939498 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Meyer, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294151">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing XML ent://SD_ILS/0/SD_ILS:939502 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;O'Farrell, Neal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294155">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Check Point NG next generation security administration ent://SD_ILS/0/SD_ILS:939447 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Simonis, Drew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294029">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Analysis, design, and implementation of secure and interoperable distributed health information systems ent://SD_ILS/0/SD_ILS:935101 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Blobel, Bernd.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=267473">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Developing secure distributed systems with CORBA ent://SD_ILS/0/SD_ILS:930964 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Lang, Ulrich.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227602">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Special issue on internet security ent://SD_ILS/0/SD_ILS:931530 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Dhillon, Gurpreet.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=232281">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing Linux: a guide to open source security the only way to stop a hacker is to think like one ent://SD_ILS/0/SD_ILS:939499 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Stanger, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294152">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing Sun Solaris 8 ent://SD_ILS/0/SD_ILS:939500 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Vincent, Thomas.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294153">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing Windows 2000 ent://SD_ILS/0/SD_ILS:939501 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Todd, Chad.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294154">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing your e-commerce site the only way to stop a hacker is to think like one ent://SD_ILS/0/SD_ILS:939503 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Russell, Ryan, 1969-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294156">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing your Web applications the only way to stop a hacker is to think like one ent://SD_ILS/0/SD_ILS:939505 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Forristal, Jeff.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294159">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Configuring ISA server 2000 building firewalls for windows 2000 ent://SD_ILS/0/SD_ILS:939460 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294054">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Summary of discussions at a planning meeting on cyber-security and the insider threat to classified information ent://SD_ILS/0/SD_ILS:1084889 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;National Research Council (U.S.). Computer Science and Telecommunications Board.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3377658">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security and control in information systems a guide for business and accounting ent://SD_ILS/0/SD_ILS:932451 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Hawker, Andrew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=240531">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Technology and privacy the new landscape ent://SD_ILS/0/SD_ILS:1081109 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;Agre, Philip.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3338469">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computers at risk safe computing in the information age ent://SD_ILS/0/SD_ILS:1083859 2024-06-04T16:40:08Z 2024-06-04T16:40:08Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3376465">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/>