Arama Sonu&ccedil;lar&#305; - Daralt&#305;lm&#305;&#351;: Electronic books. - 2008 - Computer networks -- Security measures. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Electronic$002bbooks.$002509Electronic$002bbooks.$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092008$0025092008$0026qf$003dSUBJECT$002509Konu$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300;jsessionid=1B59EBDE57D9C24F23E56ED0A5471576? 2024-06-04T05:38:48Z Securing information and communications systems principles, technologies, and applications ent://SD_ILS/0/SD_ILS:956326 2024-06-04T05:38:48Z 2024-06-04T05:38:48Z by&#160;Furnell, Steven, 1970-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456881">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Fuzzing for software security testing and quality assurance ent://SD_ILS/0/SD_ILS:956329 2024-06-04T05:38:48Z 2024-06-04T05:38:48Z by&#160;Takanen, Ari.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456884">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Practical embedded security building secure resource-constrained systems ent://SD_ILS/0/SD_ILS:942507 2024-06-04T05:38:48Z 2024-06-04T05:38:48Z by&#160;Stapko, Timothy John.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=312846">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information assurance dependability and security in networked systems ent://SD_ILS/0/SD_ILS:944016 2024-06-04T05:38:48Z 2024-06-04T05:38:48Z by&#160;Qian, Yi, 1962-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328312">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IT compliance and controls best practices for implementation ent://SD_ILS/0/SD_ILS:945051 2024-06-04T05:38:48Z 2024-06-04T05:38:48Z by&#160;DeLuccia, James J., 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=335724">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Secure computer and network systems modeling, analysis and design ent://SD_ILS/0/SD_ILS:946385 2024-06-04T05:38:48Z 2024-06-04T05:38:48Z by&#160;Ye, Nong.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=351427">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Implementing NAP and NAC security technologies the complete guide to network access control ent://SD_ILS/0/SD_ILS:946583 2024-06-04T05:38:48Z 2024-06-04T05:38:48Z by&#160;Hoffman, Daniel (Daniel V.), 1972-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=353459">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Implementing 802.1X security solutions for wired and wireless networks ent://SD_ILS/0/SD_ILS:946579 2024-06-04T05:38:48Z 2024-06-04T05:38:48Z by&#160;Geier, James T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=353449">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Aspects of network and information security ent://SD_ILS/0/SD_ILS:947147 2024-06-04T05:38:48Z 2024-06-04T05:38:48Z by&#160;NATO Advanced Study Institute on Network Security and Intrusion Detection (2005 : Yerevan, Armenia)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=363205">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Practical embedded security : building secure resource-constrained systems ent://SD_ILS/0/SD_ILS:1189168 2024-06-04T05:38:48Z 2024-06-04T05:38:48Z by&#160;Stapko, Timothy John.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780750682152">https://www.sciencedirect.com/science/book/9780750682152</a><br/>Format:&#160;Elektronik Kaynak<br/> Information assurance : dependability and security in networked systems ent://SD_ILS/0/SD_ILS:1189195 2024-06-04T05:38:48Z 2024-06-04T05:38:48Z by&#160;Qian, Yi, 1962-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123735669">https://www.sciencedirect.com/science/book/9780123735669</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security : know it all ent://SD_ILS/0/SD_ILS:1189257 2024-06-04T05:38:48Z 2024-06-04T05:38:48Z by&#160;Joshi, James B. D.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123744630">http://www.sciencedirect.com/science/book/9780123744630</a><br/>Format:&#160;Elektronik Kaynak<br/> OSSEC host-based intrusion detection guide ent://SD_ILS/0/SD_ILS:1189620 2024-06-04T05:38:48Z 2024-06-04T05:38:48Z by&#160;Hay, Andrew.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492409">http://www.sciencedirect.com/science/book/9781597492409</a><br/>Format:&#160;Elektronik Kaynak<br/> Integrating ISA Server 2006 with Microsoft Exchange 2007 ent://SD_ILS/0/SD_ILS:1189650 2024-06-04T05:38:48Z 2024-06-04T05:38:48Z by&#160;Strachan, Fergus.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492751">http://www.sciencedirect.com/science/book/9781597492751</a><br/>Format:&#160;Elektronik Kaynak<br/> Kismet hacking ent://SD_ILS/0/SD_ILS:1189651 2024-06-04T05:38:48Z 2024-06-04T05:38:48Z by&#160;Haines, Brad.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491174">http://www.sciencedirect.com/science/book/9781597491174</a><br/>Format:&#160;Elektronik Kaynak<br/> Scene of the cybercrime. ent://SD_ILS/0/SD_ILS:1189665 2024-06-04T05:38:48Z 2024-06-04T05:38:48Z by&#160;Cross, Michael, 1965-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492768">https://www.sciencedirect.com/science/book/9781597492768</a><br/>Format:&#160;Elektronik Kaynak<br/> Netcat power tools ent://SD_ILS/0/SD_ILS:1189704 2024-06-04T05:38:48Z 2024-06-04T05:38:48Z by&#160;Kanclirz, Jan.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492577">https://www.sciencedirect.com/science/book/9781597492577</a><br/>Format:&#160;Elektronik Kaynak<br/> Joomla! web security secure your Joomla! website from common security threats with this easy-to-use guide ent://SD_ILS/0/SD_ILS:998781 2024-06-04T05:38:48Z 2024-06-04T05:38:48Z by&#160;Canavan, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=978105">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking the art of exploitation ent://SD_ILS/0/SD_ILS:1009955 2024-06-04T05:38:48Z 2024-06-04T05:38:48Z by&#160;Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137538">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Trust and security in collaborative computing ent://SD_ILS/0/SD_ILS:1030255 2024-06-04T05:38:48Z 2024-06-04T05:38:48Z by&#160;Zou, Xukai, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1679354">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/>