Arama Sonu&ccedil;lar&#305; - Daralt&#305;lm&#305;&#351;: Electronic books. - 2006 - Computer networks -- Security measures. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Electronic$002bbooks.$002509Electronic$002bbooks.$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092006$0025092006$0026qf$003dSUBJECT$002509Konu$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300? 2024-06-05T02:47:29Z How to cheat at designing security for a Windows Server 2003 network ent://SD_ILS/0/SD_ILS:933856 2024-06-05T02:47:29Z 2024-06-05T02:47:29Z by&#160;Amini, Rob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254832">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security log management identifying patterns in the chaos ent://SD_ILS/0/SD_ILS:933857 2024-06-05T02:47:29Z 2024-06-05T02:47:29Z by&#160;Babbin, Jacob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254833">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:933858 2024-06-05T02:47:29Z 2024-06-05T02:47:29Z by&#160;Long, Johnny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254834">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing IM and P2P applications for the enterprise ent://SD_ILS/0/SD_ILS:933871 2024-06-05T02:47:29Z 2024-06-05T02:47:29Z by&#160;Piccard, Paul L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254847">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Insider threat protecting the enterprise from sabotage, spying, and theft ent://SD_ILS/0/SD_ILS:933873 2024-06-05T02:47:29Z 2024-06-05T02:47:29Z by&#160;Cole, Eric.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254849">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Configuring SonicWALL firewalls ent://SD_ILS/0/SD_ILS:934073 2024-06-05T02:47:29Z 2024-06-05T02:47:29Z by&#160;Lathem, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=256369">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at managing information security ent://SD_ILS/0/SD_ILS:934742 2024-06-05T02:47:29Z 2024-06-05T02:47:29Z by&#160;Osborne, Mark.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=266207">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasures ent://SD_ILS/0/SD_ILS:939483 2024-06-05T02:47:29Z 2024-06-05T02:47:29Z by&#160;Contos, Brian T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294116">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Designing and building enterprise DMZs ent://SD_ILS/0/SD_ILS:943348 2024-06-05T02:47:29Z 2024-06-05T02:47:29Z by&#160;Flynn, Hal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=319198">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security for mobile networks and platforms ent://SD_ILS/0/SD_ILS:945204 2024-06-05T02:47:29Z 2024-06-05T02:47:29Z by&#160;Aissi, Selim.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338731">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Firewall policies and VPN configurations ent://SD_ILS/0/SD_ILS:935986 2024-06-05T02:47:29Z 2024-06-05T02:47:29Z by&#160;Cantrell, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=272100">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security log management : identifying patterns in the chaos ent://SD_ILS/0/SD_ILS:1188257 2024-06-05T02:47:29Z 2024-06-05T02:47:29Z by&#160;Babbin, Jacob.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490429">http://www.sciencedirect.com/science/book/9781597490429</a><br/>Format:&#160;Elektronik Kaynak<br/> Insider threat : protecting the enterprise from sabotage, spying, and theft ent://SD_ILS/0/SD_ILS:1188259 2024-06-05T02:47:29Z 2024-06-05T02:47:29Z by&#160;Cole, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at configuring ISA server 2004 ent://SD_ILS/0/SD_ILS:1188261 2024-06-05T02:47:29Z 2024-06-05T02:47:29Z by&#160;Shinder, Thomas W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490573">http://www.sciencedirect.com/science/book/9781597490573</a><br/>Format:&#160;Elektronik Kaynak<br/> Practical VoIP security ent://SD_ILS/0/SD_ILS:1188263 2024-06-05T02:47:29Z 2024-06-05T02:47:29Z by&#160;Porter, Thomas.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490603">https://www.sciencedirect.com/science/book/9781597490603</a><br/>Format:&#160;Elektronik Kaynak<br/> Syngress IT security project management handbook ent://SD_ILS/0/SD_ILS:1188265 2024-06-05T02:47:29Z 2024-06-05T02:47:29Z by&#160;Snedaker, Susan.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490764">http://www.sciencedirect.com/science/book/9781597490764</a><br/>Format:&#160;Elektronik Kaynak<br/> Firewall policies and VPN configurations ent://SD_ILS/0/SD_ILS:1188270 2024-06-05T02:47:29Z 2024-06-05T02:47:29Z by&#160;Henmi, Anne.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490887">https://www.sciencedirect.com/science/book/9781597490887</a><br/>Format:&#160;Elektronik Kaynak<br/> Designing and building enterprise DMZs ent://SD_ILS/0/SD_ILS:1188272 2024-06-05T02:47:29Z 2024-06-05T02:47:29Z by&#160;Dubrawsky, Ido.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491006">http://www.sciencedirect.com/science/book/9781597491006</a><br/>Format:&#160;Elektronik Kaynak<br/> Secure your network for free : using NMAP, wireshark, snort, nessus, and MRTG ent://SD_ILS/0/SD_ILS:1188278 2024-06-05T02:47:29Z 2024-06-05T02:47:29Z by&#160;Seagren, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491235">http://www.sciencedirect.com/science/book/9781597491235</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at designing security for a Windows Server 2003 network ent://SD_ILS/0/SD_ILS:1188281 2024-06-05T02:47:29Z 2024-06-05T02:47:29Z by&#160;Amini, Rob.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492430">https://www.sciencedirect.com/science/book/9781597492430</a><br/>Format:&#160;Elektronik Kaynak<br/> Configuring SonicWALL firewalls ent://SD_ILS/0/SD_ILS:1188282 2024-06-05T02:47:29Z 2024-06-05T02:47:29Z by&#160;Bendell, Dan.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492508">http://www.sciencedirect.com/science/book/9781597492508</a><br/>Format:&#160;Elektronik Kaynak<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:1188248 2024-06-05T02:47:29Z 2024-06-05T02:47:29Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490214">https://www.sciencedirect.com/science/book/9781597490214</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at Windows system administration using command line scripts ent://SD_ILS/0/SD_ILS:1186425 2024-06-05T02:47:29Z 2024-06-05T02:47:29Z by&#160;Bhardwaj, Pawan K.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491051">http://www.sciencedirect.com/science/book/9781597491051</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack the stack : using snort and ethereal to master the 8 layers of an insecure network ent://SD_ILS/0/SD_ILS:1186427 2024-06-05T02:47:29Z 2024-06-05T02:47:29Z by&#160;Gregg, Michael (Michael C.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">http://www.sciencedirect.com/science/book/9781597491099</a><br/>Format:&#160;Elektronik Kaynak<br/> Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures ent://SD_ILS/0/SD_ILS:1186439 2024-06-05T02:47:29Z 2024-06-05T02:47:29Z by&#160;Contos, Brian T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491297">https://www.sciencedirect.com/science/book/9781597491297</a><br/>Format:&#160;Elektronik Kaynak<br/> Syngress force emerging threat analysis : from mischief to malicious ent://SD_ILS/0/SD_ILS:1186339 2024-06-05T02:47:29Z 2024-06-05T02:47:29Z by&#160;Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">http://www.sciencedirect.com/science/book/9781597490566</a><br/>Format:&#160;Elektronik Kaynak<br/>