Arama Sonu&ccedil;lar&#305; - Daralt&#305;lm&#305;&#351;: Electronic books. - 2004 - COMPUTERS -- Networking -- Security. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Electronic$002bbooks.$002509Electronic$002bbooks.$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092004$0025092004$0026qf$003dSUBJECT$002509Konu$002509COMPUTERS$002b--$002bNetworking$002b--$002bSecurity.$002509COMPUTERS$002b--$002bNetworking$002b--$002bSecurity.$0026ps$003d300? 2024-06-05T12:09:43Z Security sage's guide to hardening the network infrastructure ent://SD_ILS/0/SD_ILS:1188364 2024-06-05T12:09:43Z 2024-06-05T12:09:43Z by&#160;Andr&eacute;s, Steven.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836012">https://www.sciencedirect.com/science/book/9781931836012</a><br/>Format:&#160;Elektronik Kaynak<br/> WarDriving : drive, detect, defend : a guide to wireless security ent://SD_ILS/0/SD_ILS:1188365 2024-06-05T12:09:43Z 2024-06-05T12:09:43Z by&#160;Hurley, Chris.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836036">https://www.sciencedirect.com/science/book/9781931836036</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber adversary characterization : auditing the hacker mind ent://SD_ILS/0/SD_ILS:1188369 2024-06-05T12:09:43Z 2024-06-05T12:09:43Z by&#160;Parker, Tom.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836111">http://www.sciencedirect.com/science/book/9781931836111</a><br/>Format:&#160;Elektronik Kaynak<br/> CYA : securing Exchange Server 2003 and Outlook Web Access : cover your a** by getting it right the first time ent://SD_ILS/0/SD_ILS:1188372 2024-06-05T12:09:43Z 2024-06-05T12:09:43Z by&#160;Walther, Henrik.<br/><a href="http://www.sciencedirect.com/science/book/9781931836258">Available from ScienceDirect. Online version available for university members only. This requires an institutional login off-campus</a> ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836241">http://www.sciencedirect.com/science/book/9781931836241</a><br/>Format:&#160;Elektronik Kaynak<br/> Programmer's ultimate security deskref ent://SD_ILS/0/SD_ILS:1188409 2024-06-05T12:09:43Z 2024-06-05T12:09:43Z by&#160;Foster, James C.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781932266726">https://www.sciencedirect.com/science/book/9781932266726</a><br/>Format:&#160;Elektronik Kaynak<br/> Ethereal : packet sniffing ent://SD_ILS/0/SD_ILS:1188411 2024-06-05T12:09:43Z 2024-06-05T12:09:43Z by&#160;Orebaugh, Angela.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266825">http://www.sciencedirect.com/science/book/9781932266825</a><br/>Format:&#160;Elektronik Kaynak<br/> Check Point Next Generation with application intelligence security administration ent://SD_ILS/0/SD_ILS:1188414 2024-06-05T12:09:43Z 2024-06-05T12:09:43Z by&#160;Tobkin, Chris.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781932266894">https://www.sciencedirect.com/science/book/9781932266894</a><br/>Format:&#160;Elektronik Kaynak<br/> Managing and securing a Cisco structured wireless-aware network ent://SD_ILS/0/SD_ILS:1188415 2024-06-05T12:09:43Z 2024-06-05T12:09:43Z by&#160;Wall, David.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781932266917">https://www.sciencedirect.com/science/book/9781932266917</a><br/>Format:&#160;Elektronik Kaynak<br/> Implementing homeland security for enterprise IT ent://SD_ILS/0/SD_ILS:1188099 2024-06-05T12:09:43Z 2024-06-05T12:09:43Z by&#160;Erbschloe, Michael.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">http://www.sciencedirect.com/science/book/9781555583125</a><br/>Format:&#160;Elektronik Kaynak<br/> HP Nonstop server security : a practical handbook ent://SD_ILS/0/SD_ILS:1188101 2024-06-05T12:09:43Z 2024-06-05T12:09:43Z by&#160;Hill, Terri.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583149">http://www.sciencedirect.com/science/book/9781555583149</a><br/>Format:&#160;Elektronik Kaynak<br/> Wireless operational security ent://SD_ILS/0/SD_ILS:1188104 2024-06-05T12:09:43Z 2024-06-05T12:09:43Z by&#160;Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583170">http://www.sciencedirect.com/science/book/9781555583170</a> ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583170">https://www.sciencedirect.com/science/book/9781555583170</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security ent://SD_ILS/0/SD_ILS:1185399 2024-06-05T12:09:43Z 2024-06-05T12:09:43Z by&#160;Zelkowitz, Marvin V., 1945-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780120121601">https://www.sciencedirect.com/science/book/9780120121601</a> ScienceDirect <a href="https://www.sciencedirect.com/science/bookseries/00652458/60">https://www.sciencedirect.com/science/bookseries/00652458/60</a> ScienceDirect <a href="https://www.sciencedirect.com/science/publication?issn=00652458&volume=60">https://www.sciencedirect.com/science/publication?issn=00652458&volume=60</a><br/>Format:&#160;Elektronik Kaynak<br/>