Arama Sonuçları - Daraltılmış: Electronic books. - Computer security.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Electronic$002bbooks.$002509Electronic$002bbooks.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?dt=list2024-10-31T23:48:59ZSecurity controls evaluation, testing, and assessment handbookent://SD_ILS/0/SD_ILS:11489862024-10-31T23:48:59Z2024-10-31T23:48:59Zby Johnson, Leighton, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5986757">Click to View</a><br/>Format: Elektronik Kaynak<br/>An introduction to cyber modeling and simulationent://SD_ILS/0/SD_ILS:11421232024-10-31T23:48:59Z2024-10-31T23:48:59Zby Couretas, Jerry M., 1966- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5520841">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber smart : five habits to protect your family, money, and identity from cyber criminalsent://SD_ILS/0/SD_ILS:11439062024-10-31T23:48:59Z2024-10-31T23:48:59Zby McDonough, Bart, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5612908">Click to View</a><br/>Format: Elektronik Kaynak<br/>Solving cyber risk : protecting your company and societyent://SD_ILS/0/SD_ILS:11439482024-10-31T23:48:59Z2024-10-31T23:48:59Zby Coburn, Andrew (Andrew W.), author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5614240">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity law : protect yourself and your customersent://SD_ILS/0/SD_ILS:11452282024-10-31T23:48:59Z2024-10-31T23:48:59Zby Brathwaite, Shimon, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5719658">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber security in parallel and distributed computing : concepts, techniques, applications and case studiesent://SD_ILS/0/SD_ILS:11456862024-10-31T23:48:59Z2024-10-31T23:48:59Zby Le, Dac-Nhuong, 1983- editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5741215">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity blue team toolkitent://SD_ILS/0/SD_ILS:11458412024-10-31T23:48:59Z2024-10-31T23:48:59Zby Tanner, Nadean, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5747366">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hardware security : a hands-on learning approachent://SD_ILS/0/SD_ILS:11460412024-10-31T23:48:59Z2024-10-31T23:48:59Zby Bhunia, Swarup, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5754491">Click to View</a><br/>Format: Elektronik Kaynak<br/>Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviorsent://SD_ILS/0/SD_ILS:11462142024-10-31T23:48:59Z2024-10-31T23:48:59Zby Carpenter, Perry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5763515">Click to View</a><br/>Format: Elektronik Kaynak<br/>The business of cybersecurity : foundations and ideologiesent://SD_ILS/0/SD_ILS:11463812024-10-31T23:48:59Z2024-10-31T23:48:59Zby Sathnur, Ashwini, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5770273">Click to View</a><br/>Format: Elektronik Kaynak<br/>Digital asset valuation and cyber risk measurement : principles of cybernomicsent://SD_ILS/0/SD_ILS:11466032024-10-31T23:48:59Z2024-10-31T23:48:59Zby Ruan, Keyun, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5780982">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information security risk management for ISO 27001/ISO 27002ent://SD_ILS/0/SD_ILS:11481972024-10-31T23:48:59Z2024-10-31T23:48:59Zby Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5894007">Click to View</a><br/>Format: Elektronik Kaynak<br/>Engineering secure and dependable software systemsent://SD_ILS/0/SD_ILS:11483372024-10-31T23:48:59Z2024-10-31T23:48:59Zby Pretschner, Alexander, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5899580">Click to View</a><br/>Format: Elektronik Kaynak<br/>How cyber security can protect your business : a guide for all stakeholdersent://SD_ILS/0/SD_ILS:11488872024-10-31T23:48:59Z2024-10-31T23:48:59Zby Wright, Christopher, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5979597">Click to View</a><br/>Format: Elektronik Kaynak<br/>Understanding security issuesent://SD_ILS/0/SD_ILS:11325292024-10-31T23:48:59Z2024-10-31T23:48:59Zby Donaldson, Scott E., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5157542">Click to View</a><br/>Format: Elektronik Kaynak<br/>The five technological forces disrupting security : how social, mobile, cloud and iot are fundamentally changing the practice of physical securityent://SD_ILS/0/SD_ILS:11288832024-10-31T23:48:59Z2024-10-31T23:48:59Zby Van Till, Steve, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4981408">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security and resilience in intelligent data-centric systems and communication networksent://SD_ILS/0/SD_ILS:11301612024-10-31T23:48:59Z2024-10-31T23:48:59Zby Ficco, Massimo, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5090270">Click to View</a><br/>Format: Elektronik Kaynak<br/>NIST cybersecurity framework : a pocket guideent://SD_ILS/0/SD_ILS:11470752024-10-31T23:48:59Z2024-10-31T23:48:59Zby Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5796954">Click to View</a><br/>Format: Elektronik Kaynak<br/>Data protection and the cloud-are you really managing the risks?ent://SD_ILS/0/SD_ILS:11470762024-10-31T23:48:59Z2024-10-31T23:48:59Zby Ticher, Paul, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5796955">Click to View</a><br/>Format: Elektronik Kaynak<br/>Online danger : how to protect yourself and your loved ones from the evil side of the internetent://SD_ILS/0/SD_ILS:11481392024-10-31T23:48:59Z2024-10-31T23:48:59Zby Cole, Eric, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5893451">Click to View</a><br/>Format: Elektronik Kaynak<br/>Port cybersecurity : securing critical information infrastructures and supply chainsent://SD_ILS/0/SD_ILS:11309292024-10-31T23:48:59Z2024-10-31T23:48:59Zby Polemi, Nineta, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5118465">Click to View</a><br/>Format: Elektronik Kaynak<br/>Empirical research for software security : foundations and experienceent://SD_ILS/0/SD_ILS:11329732024-10-31T23:48:59Z2024-10-31T23:48:59Zby ben Othmane, Lotfi, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5164090">Click to View</a><br/>Format: Elektronik Kaynak<br/>Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate Windows malwareent://SD_ILS/0/SD_ILS:11404712024-10-31T23:48:59Z2024-10-31T23:48:59Zby Monnappa K A, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5446050">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersécurité et RGPD : protégez votre PME : guide pratique pour sécuriser votre système informatique et vous conformer au RGPDent://SD_ILS/0/SD_ILS:11415122024-10-31T23:48:59Z2024-10-31T23:48:59Zby Ejzyn, Alain, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5496488">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybercrime and business : strategies for global corporate securityent://SD_ILS/0/SD_ILS:11265202024-10-31T23:48:59Z2024-10-31T23:48:59Zby Moskowitz, Sanford, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4863624">Click to View</a><br/>Format: Elektronik Kaynak<br/>From corporate security to commercial force : a business leader's guide to security economicsent://SD_ILS/0/SD_ILS:11265922024-10-31T23:48:59Z2024-10-31T23:48:59Zby Cabric, Marko, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4865431">Click to View</a><br/>Format: Elektronik Kaynak<br/>Kali Linux network scanning cookbook : take your penetration-testing skills to the next levelent://SD_ILS/0/SD_ILS:11267622024-10-31T23:48:59Z2024-10-31T23:48:59Zby Hixon, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4867412">Click to View</a><br/>Format: Elektronik Kaynak<br/>Wireshark for security professionals : using wireshark and the metasploit frameworkent://SD_ILS/0/SD_ILS:11239252024-10-31T23:48:59Z2024-10-31T23:48:59Zby Bullock, Jessey, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4816492">Click to View</a><br/>Format: Elektronik Kaynak<br/>IT-Sicherheitsanalysen : Ein prozessorientiertes Vorgehensmodellent://SD_ILS/0/SD_ILS:11247972024-10-31T23:48:59Z2024-10-31T23:48:59Zby Simić, Daniela, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4830572">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking the hackerent://SD_ILS/0/SD_ILS:11255252024-10-31T23:48:59Z2024-10-31T23:48:59Zby Grimes, Roger A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4845208">Click to View</a><br/>Format: Elektronik Kaynak<br/>Data hiding techniques in Windows OS : a practical approach to investigation and defenseent://SD_ILS/0/SD_ILS:11177642024-10-31T23:48:59Z2024-10-31T23:48:59Zby Hassan, Nihad Ahmad, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4676113">Click to View</a><br/>Format: Elektronik Kaynak<br/>RIoT control : understanding and managing risks and the internet of thingsent://SD_ILS/0/SD_ILS:11182632024-10-31T23:48:59Z2024-10-31T23:48:59Zby Macaulay, Tyson, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4691335">Click to View</a><br/>Format: Elektronik Kaynak<br/>Securing the internet of thingsent://SD_ILS/0/SD_ILS:11223712024-10-31T23:48:59Z2024-10-31T23:48:59Zby Li, Shancang, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4786871">Click to View</a><br/>Format: Elektronik Kaynak<br/>Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutionsent://SD_ILS/0/SD_ILS:11305882024-10-31T23:48:59Z2024-10-31T23:48:59Zby Sharma, Himanshu, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5108416">Click to View</a><br/>Format: Elektronik Kaynak<br/>IoT penetration testing cookbook : identify vulnerabilities and secure your smart devices.ent://SD_ILS/0/SD_ILS:11330492024-10-31T23:48:59Z2024-10-31T23:48:59Zby Guzman, Aaron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5165736">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security in the digital world : for the home user, parent, consumer and home officeent://SD_ILS/0/SD_ILS:11337122024-10-31T23:48:59Z2024-10-31T23:48:59Zby Day, Graham, 1945- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5211340">Click to View</a><br/>Format: Elektronik Kaynak<br/>Kali Linux wireless penetration testing : beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attackent://SD_ILS/0/SD_ILS:11370502024-10-31T23:48:59Z2024-10-31T23:48:59Zby Buchanan, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5340668">Click to View</a><br/>Format: Elektronik Kaynak<br/>Building a corporate culture of security : strategies for strengthening organizational resiliencyent://SD_ILS/0/SD_ILS:11083492024-10-31T23:48:59Z2024-10-31T23:48:59Zby Sullivant, John, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4425984">Click to View</a><br/>Format: Elektronik Kaynak<br/>Windows registry forensics : advanced digital forensic analysis of the windows registryent://SD_ILS/0/SD_ILS:11086862024-10-31T23:48:59Z2024-10-31T23:48:59Zby Carvey, Harlan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4438754">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hiding behind the keyboard : uncovering covert communication methods with forensic analysisent://SD_ILS/0/SD_ILS:11090622024-10-31T23:48:59Z2024-10-31T23:48:59Zby Shavers, Brett, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4452264">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network performance and security : testing and analyzing using open source and low-cost toolsent://SD_ILS/0/SD_ILS:11090632024-10-31T23:48:59Z2024-10-31T23:48:59Zby Chapman, Chris, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4452265">Click to View</a><br/>Format: Elektronik Kaynak<br/>Nine steps to succes : an ISO 27001: 2013 implementation overviewent://SD_ILS/0/SD_ILS:11111892024-10-31T23:48:59Z2024-10-31T23:48:59Zby Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4519667">Click to View</a><br/>Format: Elektronik Kaynak<br/>Linux server security : hack and defendent://SD_ILS/0/SD_ILS:11111792024-10-31T23:48:59Z2024-10-31T23:48:59Zby Binnie, Christopher, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4519259">Click to View</a><br/>Format: Elektronik Kaynak<br/>Selling information security to the board : a primerent://SD_ILS/0/SD_ILS:11111862024-10-31T23:48:59Z2024-10-31T23:48:59Zby Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4519662">Click to View</a><br/>Format: Elektronik Kaynak<br/>OS X incident response : scripting and analysisent://SD_ILS/0/SD_ILS:11113342024-10-31T23:48:59Z2024-10-31T23:48:59Zby Bradley, Jaron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4526010">Click to View</a><br/>Format: Elektronik Kaynak<br/>Dns security : defending the domain name systement://SD_ILS/0/SD_ILS:11132152024-10-31T23:48:59Z2024-10-31T23:48:59Zby Liska, Allan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4556898">Click to View</a><br/>Format: Elektronik Kaynak<br/>Data breach preparation and response : breaches are certain, impact is notent://SD_ILS/0/SD_ILS:11132162024-10-31T23:48:59Z2024-10-31T23:48:59Zby Fowler, Kevvie, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4556899">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information security science : measuring the vulnerability to data compromisesent://SD_ILS/0/SD_ILS:11135002024-10-31T23:48:59Z2024-10-31T23:48:59Zby Young, Carl S., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4567434">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security and privacy in the digital era. Volume 1ent://SD_ILS/0/SD_ILS:11152702024-10-31T23:48:59Z2024-10-31T23:48:59Zby Guerrier, Claudine, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4648717">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information technology security fundamentalsent://SD_ILS/0/SD_ILS:11026972024-10-31T23:48:59Z2024-10-31T23:48:59Zby Sagers, Glen., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4009415">Click to View</a><br/>Format: Elektronik Kaynak<br/>Breaking into information security : crafting a custom career path to get the job you really wantent://SD_ILS/0/SD_ILS:11044422024-10-31T23:48:59Z2024-10-31T23:48:59Zby More, Josh, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4187289">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber security awareness for CEOs and managementent://SD_ILS/0/SD_ILS:11045662024-10-31T23:48:59Z2024-10-31T23:48:59Zby Willson, David, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4189279">Click to View</a><br/>Format: Elektronik Kaynak<br/>Meeting people via WiFi and Bluetoothent://SD_ILS/0/SD_ILS:11045672024-10-31T23:48:59Z2024-10-31T23:48:59Zby Schroeder, Joshua, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4189280">Click to View</a><br/>Format: Elektronik Kaynak<br/>Essential skills for hackersent://SD_ILS/0/SD_ILS:11045682024-10-31T23:48:59Z2024-10-31T23:48:59Zby Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4189281">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security in fixed and wireless networksent://SD_ILS/0/SD_ILS:11155852024-10-31T23:48:59Z2024-10-31T23:48:59Zby Schäfer, Günter, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4658592">Click to View</a><br/>Format: Elektronik Kaynak<br/>The information systems security officer's guide : establishing and managing a cyber security programent://SD_ILS/0/SD_ILS:11055802024-10-31T23:48:59Z2024-10-31T23:48:59Zby Kovacich, Gerald L., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4334673">Click to View</a><br/>Format: Elektronik Kaynak<br/>Chaotic secure communication : principles and technologiesent://SD_ILS/0/SD_ILS:11192542024-10-31T23:48:59Z2024-10-31T23:48:59Zby Sun, Kehui, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4707910">Click to View</a><br/>Format: Elektronik Kaynak<br/>Critical infrastructure protection against hybrid warfare security related challengesent://SD_ILS/0/SD_ILS:11211662024-10-31T23:48:59Z2024-10-31T23:48:59Zby Niglia, Alessandro, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4753392">Click to View</a><br/>Format: Elektronik Kaynak<br/>You : for sale protecting your personal data and privacy onlineent://SD_ILS/0/SD_ILS:10537572024-10-31T23:48:59Z2024-10-31T23:48:59Zby Sumner, Stuart, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2187472">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network attacks & exploitation : a frameworkent://SD_ILS/0/SD_ILS:11031442024-10-31T23:48:59Z2024-10-31T23:48:59Zby Monte, Matthew, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040351">Click to View</a><br/>Format: Elektronik Kaynak<br/>Group policy : fundamentals, security, and the managed desktopent://SD_ILS/0/SD_ILS:11031672024-10-31T23:48:59Z2024-10-31T23:48:59Zby Moskowitz, Jeremy, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040685">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber resilience best practicesent://SD_ILS/0/SD_ILS:11044672024-10-31T23:48:59Z2024-10-31T23:48:59Zby AXELOS Limited, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4187569">Click to View</a><br/>Format: Elektronik Kaynak<br/>Application security in the ISO 27001:2013 environmentent://SD_ILS/0/SD_ILS:11069872024-10-31T23:48:59Z2024-10-31T23:48:59Zby Vasudevan, Vinod, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4395800">Click to View</a><br/>Format: Elektronik Kaynak<br/>Digital privacy in the marketplace : perspectives on the information exchangeent://SD_ILS/0/SD_ILS:10449122024-10-31T23:48:59Z2024-10-31T23:48:59Zby Milne, George R., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1920895">Click to View</a><br/>Format: Elektronik Kaynak<br/>Black hat Python : Python programming for hackers and pentestersent://SD_ILS/0/SD_ILS:10451962024-10-31T23:48:59Z2024-10-31T23:48:59Zby Seitz, Justin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1931622">Click to View</a><br/>Format: Elektronik Kaynak<br/>Zabbix network monitoring essentials : your one-stop solution to efficient network monitoring with zabbixent://SD_ILS/0/SD_ILS:10460482024-10-31T23:48:59Z2024-10-31T23:48:59Zby Vacche, Andrea Dalle, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1973849">Click to View</a><br/>Format: Elektronik Kaynak<br/>Kali Linux wireless penetration testing beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linuxent://SD_ILS/0/SD_ILS:10470892024-10-31T23:48:59Z2024-10-31T23:48:59Zby Ramachandran, Vivek, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2005211">Click to View</a><br/>Format: Elektronik Kaynak<br/>Designing and building a security operations centerent://SD_ILS/0/SD_ILS:10406152024-10-31T23:48:59Z2024-10-31T23:48:59Zby Nathans, David, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1834659">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information security analytics : finding security insights, patterns and anomalies in big dataent://SD_ILS/0/SD_ILS:10416292024-10-31T23:48:59Z2024-10-31T23:48:59Zby Mark, Talabis, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1873129">Click to View</a><br/>Format: Elektronik Kaynak<br/>Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systemsent://SD_ILS/0/SD_ILS:10424692024-10-31T23:48:59Z2024-10-31T23:48:59Zby Knapp, Eric D., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1887712">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security intelligence : a practitioner's guide to solving enterprise security challengesent://SD_ILS/0/SD_ILS:10427352024-10-31T23:48:59Z2024-10-31T23:48:59Zby Li, Qing, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1895130">Click to View</a><br/>Format: Elektronik Kaynak<br/>Online safetyent://SD_ILS/0/SD_ILS:10432702024-10-31T23:48:59Z2024-10-31T23:48:59Zby Healey, Justin, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1899260">Click to View</a><br/>Format: Elektronik Kaynak<br/>The defendeŕs dilemma : charting a course toward cybersecurityent://SD_ILS/0/SD_ILS:10508522024-10-31T23:48:59Z2024-10-31T23:48:59Zby Libicki, Martin C., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2075897">Click to View</a><br/>Format: Elektronik Kaynak<br/>CSA guide to cloud computing : implementing cloud privacy and securityent://SD_ILS/0/SD_ILS:10381032024-10-31T23:48:59Z2024-10-31T23:48:59Zby Samani, Raj, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1793946">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computational network science : an algorithmic approachent://SD_ILS/0/SD_ILS:10381842024-10-31T23:48:59Z2024-10-31T23:48:59Zby Hexmoor, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1798312">Click to View</a><br/>Format: Elektronik Kaynak<br/>Understanding bitcoin : cryptography, engineering and economics.ent://SD_ILS/0/SD_ILS:10401802024-10-31T23:48:59Z2024-10-31T23:48:59Zby Franco, Pedro, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1823060">Click to View</a><br/>Format: Elektronik Kaynak<br/>Dissecting the hack : the V3rb0ten networkent://SD_ILS/0/SD_ILS:10530002024-10-31T23:48:59Z2024-10-31T23:48:59Zby Street, Jayson E., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2098440">Click to View</a><br/>Format: Elektronik Kaynak<br/>Securing social media in the enterpriseent://SD_ILS/0/SD_ILS:10535852024-10-31T23:48:59Z2024-10-31T23:48:59Zby Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2146009">Click to View</a><br/>Format: Elektronik Kaynak<br/>Infosec management fundamentalsent://SD_ILS/0/SD_ILS:10535832024-10-31T23:48:59Z2024-10-31T23:48:59Zby Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2146007">Click to View</a><br/>Format: Elektronik Kaynak<br/>Smart grid security : innovative solutions for a modernized grident://SD_ILS/0/SD_ILS:10536282024-10-31T23:48:59Z2024-10-31T23:48:59Zby Skopik, Florian, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2146995">Click to View</a><br/>Format: Elektronik Kaynak<br/>Bent functions : results and applications to cryptographyent://SD_ILS/0/SD_ILS:10538312024-10-31T23:48:59Z2024-10-31T23:48:59Zby Tokareva, Natalia, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192079">Click to View</a><br/>Format: Elektronik Kaynak<br/>Data protection and the cloud : are the risks too great?ent://SD_ILS/0/SD_ILS:10538352024-10-31T23:48:59Z2024-10-31T23:48:59Zby Ticher, Paul, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192125">Click to View</a><br/>Format: Elektronik Kaynak<br/>Web application security is a stack : how to CYA (Cover Your Apps) completelyent://SD_ILS/0/SD_ILS:10538362024-10-31T23:48:59Z2024-10-31T23:48:59Zby Vittie, Lori Mac, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192126">Click to View</a><br/>Format: Elektronik Kaynak<br/>The science and technology of counterterrorism : measuring physical and electronic security riskent://SD_ILS/0/SD_ILS:10279872024-10-31T23:48:59Z2024-10-31T23:48:59Zby Young, Carl S., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1641934">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersécurité des installations industrielles : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450602024-10-31T23:48:59Z2024-10-31T23:48:59Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709810">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersécurité des installations industrielles. Chapitre XIII, État des Lieux des Référentiels en Sécurité des Systèmes Numériques Industriels : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450612024-10-31T23:48:59Z2024-10-31T23:48:59Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709811">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersécurité des installations industrielles : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450622024-10-31T23:48:59Z2024-10-31T23:48:59Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709812">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersécurité des Installations Industrielles. Chapter V, Des bus de terrain a l'Industrial Ethernetent://SD_ILS/0/SD_ILS:11450702024-10-31T23:48:59Z2024-10-31T23:48:59Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709821">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersécurité des installations industrielles. Chapitre X, Sécurité des Réseaux Industriels étendus : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450732024-10-31T23:48:59Z2024-10-31T23:48:59Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709824">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersécurité des installations industrielles. Chapitre XIV, Réglementation de la Cybersécurité et Régime Juridique des Systèmes Numériques Industriels : une étude des Dispositions Réglementaires en Cybersécurité en France et Aux États-Unis : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450742024-10-31T23:48:59Z2024-10-31T23:48:59Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709825">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersécurité des installations industrielles. Chapitre II, Typologie des installations industrielles : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450772024-10-31T23:48:59Z2024-10-31T23:48:59Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709828">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersécurité des installations industrielles. Chapitre II, Typologie des installations industrielles : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450782024-10-31T23:48:59Z2024-10-31T23:48:59Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709829">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersécurité des installations industrielles. Chapter IV, Malveillance numérique sur les systèmes industriels : histoire de la menace, événements emblématiques, tendances et perspectives : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450792024-10-31T23:48:59Z2024-10-31T23:48:59Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709831">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersécurité des installations industrielles. Chapter VI, Analyse des risques : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450822024-10-31T23:48:59Z2024-10-31T23:48:59Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709834">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersécurité des Installations Industrielles : Chapitre XII Panorama de l'offre Technologique Pour la Cybersécurité Industrielleent://SD_ILS/0/SD_ILS:11450912024-10-31T23:48:59Z2024-10-31T23:48:59Zby Fourastier, Yannick, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709845">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersécurité des installations industrielles. Chapitre I, Mythes et réalités de la cybersécurité des systèmes numériques industriels : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450832024-10-31T23:48:59Z2024-10-31T23:48:59Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709836">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersécurité des Installations Industriellesent://SD_ILS/0/SD_ILS:11450962024-10-31T23:48:59Z2024-10-31T23:48:59Zby Fourastier, Yannick, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709851">Click to View</a><br/>Format: Elektronik Kaynak<br/>Applications of secure multiparty computationent://SD_ILS/0/SD_ILS:11329142024-10-31T23:48:59Z2024-10-31T23:48:59Zby Laud, Peeter, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5161932">Click to View</a><br/>Format: Elektronik Kaynak<br/>Using security patterns in web-applicationent://SD_ILS/0/SD_ILS:11356212024-10-31T23:48:59Z2024-10-31T23:48:59Zby Alam, Shahnawaz, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5291824">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer security : awareness for the homeent://SD_ILS/0/SD_ILS:11271612024-10-31T23:48:59Z2024-10-31T23:48:59Zby Cyborski, Shannon, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4876967">Click to View</a><br/>Format: Elektronik Kaynak<br/>The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac Memoryent://SD_ILS/0/SD_ILS:10341002024-10-31T23:48:59Z2024-10-31T23:48:59Zby Ligh, Michael Hale, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1740753">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber threat! : how to manage the growing risk of cyber attacksent://SD_ILS/0/SD_ILS:10342962024-10-31T23:48:59Z2024-10-31T23:48:59Zby Ulsch, N. MacDonnell, 1951- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1742833">Click to View</a><br/>Format: Elektronik Kaynak<br/>Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013ent://SD_ILS/0/SD_ILS:10350102024-10-31T23:48:59Z2024-10-31T23:48:59Zby Ginodman, Veniamin, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1752831">Click to View</a><br/>Format: Elektronik Kaynak<br/>Chinese cybersecurity and defenseent://SD_ILS/0/SD_ILS:10358412024-10-31T23:48:59Z2024-10-31T23:48:59Zby Ventre, Daniel, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1765106">Click to View</a><br/>Format: Elektronik Kaynak<br/>Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanningent://SD_ILS/0/SD_ILS:10361782024-10-31T23:48:59Z2024-10-31T23:48:59Zby Hutchens, Justin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1771381">Click to View</a><br/>Format: Elektronik Kaynak<br/>Implementing NetScaler VPX : leverage the features of NetScaler VPX to optimize and deploy responsive web services and applications on multiple virtualization platformsent://SD_ILS/0/SD_ILS:10299022024-10-31T23:48:59Z2024-10-31T23:48:59Zby Sandbu, Marius, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1674868">Click to View</a><br/>Format: Elektronik Kaynak<br/>Collaboration with cloud computing : security, social media, and unified communicationsent://SD_ILS/0/SD_ILS:10299612024-10-31T23:48:59Z2024-10-31T23:48:59Zby Messier, Ric, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1675198">Click to View</a><br/>Format: Elektronik Kaynak<br/>Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linuxent://SD_ILS/0/SD_ILS:10317372024-10-31T23:48:59Z2024-10-31T23:48:59Zby Buchanan, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1688607">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security leader insights for information protection : lessons and strategies from leading security professionalsent://SD_ILS/0/SD_ILS:10322652024-10-31T23:48:59Z2024-10-31T23:48:59Zby Fahy, Bob, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1699254">Click to View</a><br/>Format: Elektronik Kaynak<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:10322662024-10-31T23:48:59Z2024-10-31T23:48:59Zby Andress, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1699255">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cloud management and securityent://SD_ILS/0/SD_ILS:10323382024-10-31T23:48:59Z2024-10-31T23:48:59Zby Abbadi, Imad M., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1701403">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber essentials : a pocket guideent://SD_ILS/0/SD_ILS:10370882024-10-31T23:48:59Z2024-10-31T23:48:59Zby Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778769">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber blockadesent://SD_ILS/0/SD_ILS:10394232024-10-31T23:48:59Z2024-10-31T23:48:59Zby Russell, Alison Lawlor, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1810129">Click to View</a><br/>Format: Elektronik Kaynak<br/>Datennutzungs- und datenschutzverträge : muster, klauseln, erläuterungenent://SD_ILS/0/SD_ILS:10534912024-10-31T23:48:59Z2024-10-31T23:48:59Zby Moos, Flemming, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2129586">Click to View</a><br/>Format: Elektronik Kaynak<br/>Assessing information security : strategies, tactics, logic and frameworkent://SD_ILS/0/SD_ILS:10538342024-10-31T23:48:59Z2024-10-31T23:48:59Zby Vladimirov, A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192124">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking point of sale : payment application secrets, threats, and solutionsent://SD_ILS/0/SD_ILS:10270462024-10-31T23:48:59Z2024-10-31T23:48:59Zby Gomzin, Slava.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629175">Click to View</a><br/>Format: Elektronik Kaynak<br/>Threat modeling : designing for securityent://SD_ILS/0/SD_ILS:10270482024-10-31T23:48:59Z2024-10-31T23:48:59Zby Shostack, Adam.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629177">Click to View</a><br/>Format: Elektronik Kaynak<br/>Best practices in computer network defense : incident detection and responseent://SD_ILS/0/SD_ILS:10276412024-10-31T23:48:59Z2024-10-31T23:48:59Zby Hathaway, Melissa E., editor of compilation.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1637648">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer forensics with FTK : enhance your computer forensics knowledge through illustrations, tips, tricks, and practical real-world scenariosent://SD_ILS/0/SD_ILS:10291072024-10-31T23:48:59Z2024-10-31T23:48:59Zby Carbone, Fernando, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1657797">Click to View</a><br/>Format: Elektronik Kaynak<br/>Windows forensic analysis toolkit : advanced analysis techniques for Windows 8ent://SD_ILS/0/SD_ILS:10291622024-10-31T23:48:59Z2024-10-31T23:48:59Zby Carvey, Harlan A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1659012">Click to View</a><br/>Format: Elektronik Kaynak<br/>Core software security : security at the sourceent://SD_ILS/0/SD_ILS:10227052024-10-31T23:48:59Z2024-10-31T23:48:59Zby Ransome, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1547083">Click to View</a><br/>Format: Elektronik Kaynak<br/>The basics of IT audit : purposes, processes, and practical informationent://SD_ILS/0/SD_ILS:10227292024-10-31T23:48:59Z2024-10-31T23:48:59Zby Gantz, Stephen D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1550527">Click to View</a><br/>Format: Elektronik Kaynak<br/>The basics of digital privacy : simple tools to protect your personal information and your identity onlineent://SD_ILS/0/SD_ILS:10235692024-10-31T23:48:59Z2024-10-31T23:48:59Zby Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1573362">Click to View</a><br/>Format: Elektronik Kaynak<br/>Applied network security monitoring : collection, detection, and analysisent://SD_ILS/0/SD_ILS:10236592024-10-31T23:48:59Z2024-10-31T23:48:59Zby Sanders, Chris, 1986-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1574451">Click to View</a><br/>Format: Elektronik Kaynak<br/>Detection and intelligent systems for homeland security.ent://SD_ILS/0/SD_ILS:10257272024-10-31T23:48:59Z2024-10-31T23:48:59Zby Voeller, John G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1598817">Click to View</a><br/>Format: Elektronik Kaynak<br/>Data-driven security : analysis, visualization and dashboardsent://SD_ILS/0/SD_ILS:10258192024-10-31T23:48:59Z2024-10-31T23:48:59Zby Jacobs, Jay.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1599321">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber security and IT infrastructure protectionent://SD_ILS/0/SD_ILS:10189412024-10-31T23:48:59Z2024-10-31T23:48:59Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1377640">Click to View</a><br/>Format: Elektronik Kaynak<br/>Biohackers the politics of open scienceent://SD_ILS/0/SD_ILS:10882072024-10-31T23:48:59Z2024-10-31T23:48:59Zby Delfanti, Alessandro.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3386719">Click to View</a><br/>Format: Elektronik Kaynak<br/>Convergence : illicit networks and national security in the age of globalizationent://SD_ILS/0/SD_ILS:11020332024-10-31T23:48:59Z2024-10-31T23:48:59Zby Miklaucic, Michael, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3571653">Click to View</a><br/>Format: Elektronik Kaynak<br/>Getting started with FortiGateent://SD_ILS/0/SD_ILS:10234742024-10-31T23:48:59Z2024-10-31T23:48:59Zby Fabbri, Rosato.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572901">Click to View</a><br/>Format: Elektronik Kaynak<br/>Instant Java password and authentication securityent://SD_ILS/0/SD_ILS:10234862024-10-31T23:48:59Z2024-10-31T23:48:59Zby Mayoral, Fernando.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572913">Click to View</a><br/>Format: Elektronik Kaynak<br/>OAuth 2.0 identity and access management patternsent://SD_ILS/0/SD_ILS:10234802024-10-31T23:48:59Z2024-10-31T23:48:59Zby Spasovski, Martin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572907">Click to View</a><br/>Format: Elektronik Kaynak<br/>Data visualization. Part 2ent://SD_ILS/0/SD_ILS:10242062024-10-31T23:48:59Z2024-10-31T23:48:59Zby Assam, Tarek.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1579356">Click to View</a><br/>Format: Elektronik Kaynak<br/>Technocrime, policing and surveillanceent://SD_ILS/0/SD_ILS:10005672024-10-31T23:48:59Z2024-10-31T23:48:59Zby Leman-Langlois, Stéphane, 1965-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1016143">Click to View</a><br/>Format: Elektronik Kaynak<br/>Investigative computer forensics the practical guide for lawyers, accountants, investigators, and business executivesent://SD_ILS/0/SD_ILS:9864922024-10-31T23:48:59Z2024-10-31T23:48:59Zby Laykin, Erik.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=817953">Click to View</a><br/>Format: Elektronik Kaynak<br/>Enterprise security a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterpriseent://SD_ILS/0/SD_ILS:10059952024-10-31T23:48:59Z2024-10-31T23:48:59Zby Woody, Aaron.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1103988">Click to View</a><br/>Format: Elektronik Kaynak<br/>Group policy fundamentals, security, and the managed desktopent://SD_ILS/0/SD_ILS:10060892024-10-31T23:48:59Z2024-10-31T23:48:59Zby Moskowitz, Jeremy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1104500">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking for dummiesent://SD_ILS/0/SD_ILS:10062512024-10-31T23:48:59Z2024-10-31T23:48:59Zby Beaver, Kevin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1106542">Click to View</a><br/>Format: Elektronik Kaynak<br/>Web application defender's cookbook battling hackers and protecting usersent://SD_ILS/0/SD_ILS:10066272024-10-31T23:48:59Z2024-10-31T23:48:59Zby Barnett, Ryan C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108733">Click to View</a><br/>Format: Elektronik Kaynak<br/>The complete guide to physical securityent://SD_ILS/0/SD_ILS:10070022024-10-31T23:48:59Z2024-10-31T23:48:59Zby Baker, Paul R., 1958-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1112600">Click to View</a><br/>Format: Elektronik Kaynak<br/>Windows server 2012 security from end to edge and beyond architecting, designing, planning, and deploying Windows server 2012 security solutionsent://SD_ILS/0/SD_ILS:10076122024-10-31T23:48:59Z2024-10-31T23:48:59Zby Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115164">Click to View</a><br/>Format: Elektronik Kaynak<br/>Practical anonymity hiding in plain sight onlineent://SD_ILS/0/SD_ILS:10076142024-10-31T23:48:59Z2024-10-31T23:48:59Zby Loshin, Peter.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115167">Click to View</a><br/>Format: Elektronik Kaynak<br/>Social media security : leveraging social networking while mitigating riskent://SD_ILS/0/SD_ILS:10076172024-10-31T23:48:59Z2024-10-31T23:48:59Zby Cross, Michael, 1965-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115173">Click to View</a><br/>Format: Elektronik Kaynak<br/>Simple steps to data encryption a practical guide to secure computingent://SD_ILS/0/SD_ILS:10076232024-10-31T23:48:59Z2024-10-31T23:48:59Zby Loshin, Pete.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115182">Click to View</a><br/>Format: Elektronik Kaynak<br/>Linux malware incident response : a practitioner's guide to forensic collection and examination of volatile data : an excerpt from Malware forensics field guide for Linux systemsent://SD_ILS/0/SD_ILS:10076252024-10-31T23:48:59Z2024-10-31T23:48:59Zby Malin, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115185">Click to View</a><br/>Format: Elektronik Kaynak<br/>Using social media for global securityent://SD_ILS/0/SD_ILS:10078452024-10-31T23:48:59Z2024-10-31T23:48:59Zby Gupta, Ravi.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1118756">Click to View</a><br/>Format: Elektronik Kaynak<br/>Citrix Access Gateway VPX 5.04 essentials a practical step-by-step guide to provide secure remote access using the Citrix Access Gateway VPXent://SD_ILS/0/SD_ILS:10080152024-10-31T23:48:59Z2024-10-31T23:48:59Zby Mallett, Andrew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1119760">Click to View</a><br/>Format: Elektronik Kaynak<br/>Safety management for software-based equipmentent://SD_ILS/0/SD_ILS:10134392024-10-31T23:48:59Z2024-10-31T23:48:59Zby Boulanger, Jean-Louis.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1187169">Click to View</a><br/>Format: Elektronik Kaynak<br/>IBM mainframe security beyond the basics : a practical guide from a z/OS and RACF perspectiveent://SD_ILS/0/SD_ILS:10198782024-10-31T23:48:59Z2024-10-31T23:48:59Zby Dattani, Dinesh D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1411689">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information protection playbookent://SD_ILS/0/SD_ILS:10199902024-10-31T23:48:59Z2024-10-31T23:48:59Zby Kane, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1418381">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyberspace and cybersecurityent://SD_ILS/0/SD_ILS:10206952024-10-31T23:48:59Z2024-10-31T23:48:59Zby Kostopoulos, George K., 1939- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1446799">Click to View</a><br/>Format: Elektronik Kaynak<br/>An introduction to information security and ISO27001:2013 : a pocket guideent://SD_ILS/0/SD_ILS:10209922024-10-31T23:48:59Z2024-10-31T23:48:59Zby Watkins, Steve G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1463578">Click to View</a><br/>Format: Elektronik Kaynak<br/>ISO27001 / ISO27002 : a pocket guideent://SD_ILS/0/SD_ILS:10209932024-10-31T23:48:59Z2024-10-31T23:48:59Zby Calder, Alan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1463579">Click to View</a><br/>Format: Elektronik Kaynak<br/>Sicherheit in kommunikationsnetzenent://SD_ILS/0/SD_ILS:10220912024-10-31T23:48:59Z2024-10-31T23:48:59Zby Sorge, Christoph.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1524463">Click to View</a><br/>Format: Elektronik Kaynak<br/>Intelligent systems for security informaticsent://SD_ILS/0/SD_ILS:10094932024-10-31T23:48:59Z2024-10-31T23:48:59Zby Yang, Christopher.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1133729">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber security for educational leaders a guide to understanding and implementing technology policiesent://SD_ILS/0/SD_ILS:10106562024-10-31T23:48:59Z2024-10-31T23:48:59Zby Sianjina, Rayton R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1143733">Click to View</a><br/>Format: Elektronik Kaynak<br/>Pragmatic security metrics applying metametrics to information securityent://SD_ILS/0/SD_ILS:10109722024-10-31T23:48:59Z2024-10-31T23:48:59Zby Brotby, W. Krag.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1153198">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information security risk assessment toolkit practical assessments through data collection and data analysisent://SD_ILS/0/SD_ILS:10028372024-10-31T23:48:59Z2024-10-31T23:48:59Zby Talabis, Mark Ryan N.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1047930">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network intrusion analysis methodologies, tools, and techniques for incident analysis and responseent://SD_ILS/0/SD_ILS:10033762024-10-31T23:48:59Z2024-10-31T23:48:59Zby Fichera, Joe, 1966-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1058152">Click to View</a><br/>Format: Elektronik Kaynak<br/>Data hiding exposing concealed data in multimedia, operating systems, mobile devices, and network protocolsent://SD_ILS/0/SD_ILS:10039162024-10-31T23:48:59Z2024-10-31T23:48:59Zby Raggo, Michael T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073014">Click to View</a><br/>Format: Elektronik Kaynak<br/>Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineersent://SD_ILS/0/SD_ILS:10039222024-10-31T23:48:59Z2024-10-31T23:48:59Zby O'Connor, T. J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073021">Click to View</a><br/>Format: Elektronik Kaynak<br/>Logging and log management the authoritative guide to understanding the concepts surrounding logging and log managementent://SD_ILS/0/SD_ILS:10044582024-10-31T23:48:59Z2024-10-31T23:48:59Zby Chuvakin, Anton A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1077419">Click to View</a><br/>Format: Elektronik Kaynak<br/>Windows forensic analysis toolkit advanced analysis techniques for Windows 7ent://SD_ILS/0/SD_ILS:9899252024-10-31T23:48:59Z2024-10-31T23:48:59Zby Carvey, Harlan A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=850700">Click to View</a><br/>Format: Elektronik Kaynak<br/>A multidisciplinary introduction to information securityent://SD_ILS/0/SD_ILS:10284162024-10-31T23:48:59Z2024-10-31T23:48:59Zby Mjølsnes, Stig F., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1648315">Click to View</a><br/>Format: Elektronik Kaynak<br/>Securing SQL servers protecting your database from attackersent://SD_ILS/0/SD_ILS:9989532024-10-31T23:48:59Z2024-10-31T23:48:59Zby Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=980013">Click to View</a><br/>Format: Elektronik Kaynak<br/>Getting started with Citrix XenApp 6.5 design and implement Citrix farms based on XenApp 6.5ent://SD_ILS/0/SD_ILS:9998702024-10-31T23:48:59Z2024-10-31T23:48:59Zby Musumeci, Guillermo.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=995550">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking web apps detecting and preventing web application security problemsent://SD_ILS/0/SD_ILS:10003712024-10-31T23:48:59Z2024-10-31T23:48:59Zby Shema, Mike.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1012529">Click to View</a><br/>Format: Elektronik Kaynak<br/>Microsoft Forefront Identity Manager 2010 R2 handbookent://SD_ILS/0/SD_ILS:10006802024-10-31T23:48:59Z2024-10-31T23:48:59Zby Nordström, Kent.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1019543">Click to View</a><br/>Format: Elektronik Kaynak<br/>Microsoft SQL Server 2012 security cookbookent://SD_ILS/0/SD_ILS:10018912024-10-31T23:48:59Z2024-10-31T23:48:59Zby Bruchez, Rudi.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1036251">Click to View</a><br/>Format: Elektronik Kaynak<br/>Safeguarding critical e-documents implementing a program for securing confidential information assetsent://SD_ILS/0/SD_ILS:9871482024-10-31T23:48:59Z2024-10-31T23:48:59Zby Smallwood, Robert F., 1959-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=821999">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity for industrial control systems SCADA, DCS, PLC, HMI, and SISent://SD_ILS/0/SD_ILS:9874492024-10-31T23:48:59Z2024-10-31T23:48:59Zby Macaulay, Tyson.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826923">Click to View</a><br/>Format: Elektronik Kaynak<br/>Data mining tools for malware detectionent://SD_ILS/0/SD_ILS:9874612024-10-31T23:48:59Z2024-10-31T23:48:59Zby Masud, Mehedy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826949">Click to View</a><br/>Format: Elektronik Kaynak<br/>Low tech hacking street smarts for security professionalsent://SD_ILS/0/SD_ILS:9877872024-10-31T23:48:59Z2024-10-31T23:48:59Zby Wiles, Jack.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=829964">Click to View</a><br/>Format: Elektronik Kaynak<br/>Embedded systems security practical methods for safe and secure software and systems developmentent://SD_ILS/0/SD_ILS:9925552024-10-31T23:48:59Z2024-10-31T23:48:59Zby Kleidermacher, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=886256">Click to View</a><br/>Format: Elektronik Kaynak<br/>Advances in intelligence and security informaticsent://SD_ILS/0/SD_ILS:9930232024-10-31T23:48:59Z2024-10-31T23:48:59Zby Mao, Wenji.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=892251">Click to View</a><br/>Format: Elektronik Kaynak<br/>IBM i security administration and complianceent://SD_ILS/0/SD_ILS:9937152024-10-31T23:48:59Z2024-10-31T23:48:59Zby Woodbury, Carol.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=906259">Click to View</a><br/>Format: Elektronik Kaynak<br/>Malware forensics field guide for Windows systems digital forensics field guidesent://SD_ILS/0/SD_ILS:9951892024-10-31T23:48:59Z2024-10-31T23:48:59Zby Malin, Cameron H.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=921016">Click to View</a><br/>Format: Elektronik Kaynak<br/>Spring Security 3.1 secure your web applications from hackers with the step-by-step guideent://SD_ILS/0/SD_ILS:10065082024-10-31T23:48:59Z2024-10-31T23:48:59Zby Winch, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108351">Click to View</a><br/>Format: Elektronik Kaynak<br/>SQL injection attacks and defenseent://SD_ILS/0/SD_ILS:9972872024-10-31T23:48:59Z2024-10-31T23:48:59Zby Clarke, Justin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=953188">Click to View</a><br/>Format: Elektronik Kaynak<br/>Practical malware analysis the hands-on guide to dissecting malicious softwareent://SD_ILS/0/SD_ILS:10099722024-10-31T23:48:59Z2024-10-31T23:48:59Zby Sikorski, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137570">Click to View</a><br/>Format: Elektronik Kaynak<br/>The tangled Web a guide to securing modern Web applicationsent://SD_ILS/0/SD_ILS:10099762024-10-31T23:48:59Z2024-10-31T23:48:59Zby Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137574">Click to View</a><br/>Format: Elektronik Kaynak<br/>Oracle 11g anti-hacker's cookbookent://SD_ILS/0/SD_ILS:10033492024-10-31T23:48:59Z2024-10-31T23:48:59Zby Neagu, Adrian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1057945">Click to View</a><br/>Format: Elektronik Kaynak<br/>Securing WebLogic Server 12c learn to develop, administer, and troubleshot your WebLogic Serverent://SD_ILS/0/SD_ILS:10049592024-10-31T23:48:59Z2024-10-31T23:48:59Zby Masini, Luca.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1085228">Click to View</a><br/>Format: Elektronik Kaynak<br/>Nmap 6 network exploration and security auditing cookbook ; a complete guide to mastering Nmap 6 and its scripting engine, covering practical tasks for penetration testers and system administratorsent://SD_ILS/0/SD_ILS:10049612024-10-31T23:48:59Z2024-10-31T23:48:59Zby Calderon Pale, Paulino.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1085230">Click to View</a><br/>Format: Elektronik Kaynak<br/>Embedded systems security practical methods for safe and secure software and systems developmentent://SD_ILS/0/SD_ILS:1333762024-10-31T23:48:59Z2024-10-31T23:48:59Zby Kleidermacher, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123868862">http://www.sciencedirect.com/science/book/9780123868862</a><br/>Format: Elektronik Kaynak<br/>Advances in intelligence and security informaticsent://SD_ILS/0/SD_ILS:1333812024-10-31T23:48:59Z2024-10-31T23:48:59Zby Mao, Wenji.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123972002">http://www.sciencedirect.com/science/book/9780123972002</a><br/>Format: Elektronik Kaynak<br/>Low tech hacking street smarts for security professionalsent://SD_ILS/0/SD_ILS:1371062024-10-31T23:48:59Z2024-10-31T23:48:59Zby Wiles, Jack.<br/><a href="http://ezproxy.lb.polyu.edu.hk/login?url=http://www.sciencedirect.com/science/book/9781597496650">ScienceDirect e-book</a>
ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496650">http://www.sciencedirect.com/science/book/9781597496650</a><br/>Format: Elektronik Kaynak<br/>Security 2020 reduce security risks this decadeent://SD_ILS/0/SD_ILS:9784162024-10-31T23:48:59Z2024-10-31T23:48:59Zby Howard, Doug.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=694289">Click to View</a><br/>Format: Elektronik Kaynak<br/>Web commerce security design and developmentent://SD_ILS/0/SD_ILS:9789752024-10-31T23:48:59Z2024-10-31T23:48:59Zby Nahari, Hadi.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706729">Click to View</a><br/>Format: Elektronik Kaynak<br/>Social engineering the art of human hackingent://SD_ILS/0/SD_ILS:9789802024-10-31T23:48:59Z2024-10-31T23:48:59Zby Hadnagy, Christopher.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706746">Click to View</a><br/>Format: Elektronik Kaynak<br/>Identity management concepts, technologies, and systemsent://SD_ILS/0/SD_ILS:9725072024-10-31T23:48:59Z2024-10-31T23:48:59Zby Bertino, Elisa.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=634511">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer Forensics jumpstartent://SD_ILS/0/SD_ILS:9736802024-10-31T23:48:59Z2024-10-31T23:48:59Zby Solomon, Michael R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=661659">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security risk management building an information security risk management program from the ground upent://SD_ILS/0/SD_ILS:9768042024-10-31T23:48:59Z2024-10-31T23:48:59Zby Wheeler, Evan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=685406">Click to View</a><br/>Format: Elektronik Kaynak<br/>Securing the cloud cloud computer security techniques and tacticsent://SD_ILS/0/SD_ILS:9770552024-10-31T23:48:59Z2024-10-31T23:48:59Zby Winkler, J. R. (Joachim R.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=686827">Click to View</a><br/>Format: Elektronik Kaynak<br/>Introduction to cryptography with open-source softwareent://SD_ILS/0/SD_ILS:10273122024-10-31T23:48:59Z2024-10-31T23:48:59Zby McAndrew, Alasdair, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1633743">Click to View</a><br/>Format: Elektronik Kaynak<br/>Formal models and techniques for analyzing security protocolsent://SD_ILS/0/SD_ILS:9843592024-10-31T23:48:59Z2024-10-31T23:48:59Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=784604">Click to View</a><br/>Format: Elektronik Kaynak<br/>The web application hacker's handbook finding and exploiting security flawsent://SD_ILS/0/SD_ILS:9867732024-10-31T23:48:59Z2024-10-31T23:48:59Zby Stuttard, Dafydd.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=819008">Click to View</a><br/>Format: Elektronik Kaynak<br/>The Cloud understanding the security, privacy and trust challengesent://SD_ILS/0/SD_ILS:9873972024-10-31T23:48:59Z2024-10-31T23:48:59Zby Robinson, Neil, 1964-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=825129">Click to View</a><br/>Format: Elektronik Kaynak<br/>Oracle Identity and Access Manager 11g for administrators administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasksent://SD_ILS/0/SD_ILS:9968352024-10-31T23:48:59Z2024-10-31T23:48:59Zby Kumar, Atul.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948559">Click to View</a><br/>Format: Elektronik Kaynak<br/>Microsoft Forefront UAG 2010 administrator's handbook take full command of Microsoft Forefront Unified Access Gateway to secure your business applications and provide dynamic remote access with DirectAccessent://SD_ILS/0/SD_ILS:9968442024-10-31T23:48:59Z2024-10-31T23:48:59Zby Ben-Ari, Erez.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948568">Click to View</a><br/>Format: Elektronik Kaynak<br/>A bug hunter's diary a guided tour through the wilds of software securityent://SD_ILS/0/SD_ILS:10099452024-10-31T23:48:59Z2024-10-31T23:48:59Zby Klein, Tobias.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137526">Click to View</a><br/>Format: Elektronik Kaynak<br/>The basics of information security understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:1335922024-10-31T23:48:59Z2024-10-31T23:48:59Zby Andress, Jason.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Elektronik Kaynak<br/>Industrial network security securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systemsent://SD_ILS/0/SD_ILS:1372082024-10-31T23:48:59Z2024-10-31T23:48:59Zby Knapp, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496452">http://www.sciencedirect.com/science/book/9781597496452</a><br/>Format: Elektronik Kaynak<br/>Web application obfuscation -/WAFs..Evasion..Filters//alert (/Obfuscation/)-ent://SD_ILS/0/SD_ILS:1372092024-10-31T23:48:59Z2024-10-31T23:48:59Zby Heiderich, Mario.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496049">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektronik Kaynak<br/>Securing SQL server protecting your database from attackersent://SD_ILS/0/SD_ILS:1371912024-10-31T23:48:59Z2024-10-31T23:48:59Zby Cherry, Denny.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496254">http://www.sciencedirect.com/science/book/9781597496254</a><br/>Format: Elektronik Kaynak<br/>Securing the cloud cloud computer security techniques and tacticsent://SD_ILS/0/SD_ILS:1372012024-10-31T23:48:59Z2024-10-31T23:48:59Zby Winkler, J. R. (Joachim R.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format: Elektronik Kaynak<br/>Securing SQL server : protecting your database from attackersent://SD_ILS/0/SD_ILS:11835102024-10-31T23:48:59Z2024-10-31T23:48:59Zby Cherry, Denny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496254">https://www.sciencedirect.com/science/book/9781597496254</a><br/>Format: Elektronik Kaynak<br/>Windows Registry Forensics : Advanced Digital Forensic Analysis of the Windows Registry.ent://SD_ILS/0/SD_ILS:11835262024-10-31T23:48:59Z2024-10-31T23:48:59Zby Carvey, Harlan.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495806">https://www.sciencedirect.com/science/book/9781597495806</a><br/>Format: Elektronik Kaynak<br/>Advances in computers. Volume 83ent://SD_ILS/0/SD_ILS:11837822024-10-31T23:48:59Z2024-10-31T23:48:59Zby Zelkowitz, Marvin V., 1945-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123855107">http://www.sciencedirect.com/science/book/9780123855107</a><br/>Format: Elektronik Kaynak<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:11838152024-10-31T23:48:59Z2024-10-31T23:48:59Zby Andress, Jason.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496537">https://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Elektronik Kaynak<br/>Securing the cloud : cloud computer security techniques and tacticsent://SD_ILS/0/SD_ILS:11837432024-10-31T23:48:59Z2024-10-31T23:48:59Zby Winkler, J. R. (Joachim R.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format: Elektronik Kaynak<br/>Thor's Microsoft security bible : a collection of practical security techniquesent://SD_ILS/0/SD_ILS:11839722024-10-31T23:48:59Z2024-10-31T23:48:59Zby Mullen, Timothy M.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495721">http://www.sciencedirect.com/science/book/9781597495721</a><br/>Format: Elektronik Kaynak<br/>Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systemsent://SD_ILS/0/SD_ILS:11840112024-10-31T23:48:59Z2024-10-31T23:48:59Zby Knapp, Eric.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496452">https://www.sciencedirect.com/science/book/9781597496452</a><br/>Format: Elektronik Kaynak<br/>Cyber attacks : protecting national infrastructureent://SD_ILS/0/SD_ILS:11818252024-10-31T23:48:59Z2024-10-31T23:48:59Zby Amoroso, Edward G.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123849175">https://www.sciencedirect.com/science/book/9780123849175</a><br/>Format: Elektronik Kaynak<br/>Group policy fundamentals, security, and the managed desktopent://SD_ILS/0/SD_ILS:9634792024-10-31T23:48:59Z2024-10-31T23:48:59Zby Moskowitz, Jeremy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=530009">Click to View</a><br/>Format: Elektronik Kaynak<br/>Dear hacker letters to the editor of 2600ent://SD_ILS/0/SD_ILS:9648672024-10-31T23:48:59Z2024-10-31T23:48:59Zby Goldstein, Emmanuel J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537340">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hashing in computer science fifty years of slicing and dicingent://SD_ILS/0/SD_ILS:9648692024-10-31T23:48:59Z2024-10-31T23:48:59Zby Konheim, Alan G., 1934-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537352">Click to View</a><br/>Format: Elektronik Kaynak<br/>Professional Cocoa application securityent://SD_ILS/0/SD_ILS:9648702024-10-31T23:48:59Z2024-10-31T23:48:59Zby Lee, Graham J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537355">Click to View</a><br/>Format: Elektronik Kaynak<br/>Logics and languages for reliability and securityent://SD_ILS/0/SD_ILS:9666272024-10-31T23:48:59Z2024-10-31T23:48:59Zby Esparza, Javier.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=557042">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cloud security a comprehensive guide to secure cloud computingent://SD_ILS/0/SD_ILS:9684032024-10-31T23:48:59Z2024-10-31T23:48:59Zby Krutz, Ronald L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=589027">Click to View</a><br/>Format: Elektronik Kaynak<br/>IT audit, control, and securityent://SD_ILS/0/SD_ILS:9721352024-10-31T23:48:59Z2024-10-31T23:48:59Zby Moeller, Robert R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=624573">Click to View</a><br/>Format: Elektronik Kaynak<br/>Adaptive security management architectureent://SD_ILS/0/SD_ILS:9722382024-10-31T23:48:59Z2024-10-31T23:48:59Zby Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=625004">Click to View</a><br/>Format: Elektronik Kaynak<br/>Mac security bibleent://SD_ILS/0/SD_ILS:9603772024-10-31T23:48:59Z2024-10-31T23:48:59Zby Kissell, Joe.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=477803">Click to View</a><br/>Format: Elektronik Kaynak<br/>Advances in artificial intelligence for privacy protection and securityent://SD_ILS/0/SD_ILS:10302722024-10-31T23:48:59Z2024-10-31T23:48:59Zby Solanas, Agusti.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1679374">Click to View</a><br/>Format: Elektronik Kaynak<br/>Relation based access controlent://SD_ILS/0/SD_ILS:10251322024-10-31T23:48:59Z2024-10-31T23:48:59Zby Zhang, Rui.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1589007">Click to View</a><br/>Format: Elektronik Kaynak<br/>Safety of computer architecturesent://SD_ILS/0/SD_ILS:10081532024-10-31T23:48:59Z2024-10-31T23:48:59Zby Boulanger, Jean-Louis.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1120753">Click to View</a><br/>Format: Elektronik Kaynak<br/>Least privilege security for Windows 7, Vista, And XP secure desktops for regulatory compliance and business agilityent://SD_ILS/0/SD_ILS:9963142024-10-31T23:48:59Z2024-10-31T23:48:59Zby Smith, Russell.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=944038">Click to View</a><br/>Format: Elektronik Kaynak<br/>GlassFish security secure your GlassFish installation, web applications, EJB applications, application client module, and web services using Java EE and GlassFish security measuresent://SD_ILS/0/SD_ILS:9964052024-10-31T23:48:59Z2024-10-31T23:48:59Zby Kalali, Masoud.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=944941">Click to View</a><br/>Format: Elektronik Kaynak<br/>Secure and resilient software developmentent://SD_ILS/0/SD_ILS:10206922024-10-31T23:48:59Z2024-10-31T23:48:59Zby Merkow, Mark S., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1446770">Click to View</a><br/>Format: Elektronik Kaynak<br/>Risk factors in computer-crime victimizationent://SD_ILS/0/SD_ILS:10032442024-10-31T23:48:59Z2024-10-31T23:48:59Zby Choi, Kyung-shick, 1973-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1057793">Click to View</a><br/>Format: Elektronik Kaynak<br/>The basics of hacking and penetration testing ethical hacking and penetration testing made easyent://SD_ILS/0/SD_ILS:1335942024-10-31T23:48:59Z2024-10-31T23:48:59Zby Engebretson, Pat (Patrick Henry), 1974-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496551">http://www.sciencedirect.com/science/book/9781597496551</a><br/>Format: Elektronik Kaynak<br/>Seven deadliest Microsoft attacksent://SD_ILS/0/SD_ILS:11774792024-10-31T23:48:59Z2024-10-31T23:48:59Zby Kraus, Rob.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495516">https://www.sciencedirect.com/science/book/9781597495516</a><br/>Format: Elektronik Kaynak<br/>Seven deadliest wireless technologies attacksent://SD_ILS/0/SD_ILS:11780192024-10-31T23:48:59Z2024-10-31T23:48:59Zby Haines, Brad.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495417">https://www.sciencedirect.com/science/book/9781597495417</a><br/>Format: Elektronik Kaynak<br/>Seven deadliest USB attacksent://SD_ILS/0/SD_ILS:11780202024-10-31T23:48:59Z2024-10-31T23:48:59Zby Anderson, Brian (Brian James)<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495530">https://www.sciencedirect.com/science/book/9781597495530</a><br/>Format: Elektronik Kaynak<br/>Seven deadliest social network attacksent://SD_ILS/0/SD_ILS:11780312024-10-31T23:48:59Z2024-10-31T23:48:59Zby Timm, Carl.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495455">https://www.sciencedirect.com/science/book/9781597495455</a><br/>Format: Elektronik Kaynak<br/>Virtualization and forensics : a digital forensic investigator's guide to virtual environmentsent://SD_ILS/0/SD_ILS:11784292024-10-31T23:48:59Z2024-10-31T23:48:59Zby Barrett, Diane.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format: Elektronik Kaynak<br/>System assurance : beyond detecting vulnerabilitiesent://SD_ILS/0/SD_ILS:11832662024-10-31T23:48:59Z2024-10-31T23:48:59Zby Mansourov, Nikolai.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123814142">https://www.sciencedirect.com/science/book/9780123814142</a><br/>Format: Elektronik Kaynak<br/>The basics of hacking and penetration testing : ethical hacking and penetration testing made easyent://SD_ILS/0/SD_ILS:11839502024-10-31T23:48:59Z2024-10-31T23:48:59Zby Engebretson, Pat (Patrick Henry), 1974-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496551">https://www.sciencedirect.com/science/book/9781597496551</a><br/>Format: Elektronik Kaynak<br/>Dissecting the hack : the forb1dd3n networkent://SD_ILS/0/SD_ILS:11813792024-10-31T23:48:59Z2024-10-31T23:48:59Zby Street, Jayson E.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495684">https://www.sciencedirect.com/science/book/9781597495684</a><br/>Format: Elektronik Kaynak<br/>A guide to kernel exploitation : attacking the coreent://SD_ILS/0/SD_ILS:11817702024-10-31T23:48:59Z2024-10-31T23:48:59Zby Perla, Enrico.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494861">https://www.sciencedirect.com/science/book/9781597494861</a><br/>Format: Elektronik Kaynak<br/>Managed code rootkits : hooking into runtime environmentsent://SD_ILS/0/SD_ILS:11818272024-10-31T23:48:59Z2024-10-31T23:48:59Zby Metula, Erez.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495745">http://www.sciencedirect.com/science/book/9781597495745</a><br/>Format: Elektronik Kaynak<br/>The definitive guide to the C&A transformation the first publication of a comprehensive view of the C&A transformationent://SD_ILS/0/SD_ILS:9654532024-10-31T23:48:59Z2024-10-31T23:48:59Zby Mehan, Julie E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=547041">Click to View</a><br/>Format: Elektronik Kaynak<br/>Distributed systems security issues, processes, and solutionsent://SD_ILS/0/SD_ILS:9541832024-10-31T23:48:59Z2024-10-31T23:48:59Zby Belapurkar, Abhijit.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=437429">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:9556372024-10-31T23:48:59Z2024-10-31T23:48:59Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=453166">Click to View</a><br/>Format: Elektronik Kaynak<br/>Enterprise information security and privacyent://SD_ILS/0/SD_ILS:9563312024-10-31T23:48:59Z2024-10-31T23:48:59Zby Axelrod, C. Warren.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456886">Click to View</a><br/>Format: Elektronik Kaynak<br/>Gray hat Python Python programming for hackers and reverse engineersent://SD_ILS/0/SD_ILS:10099522024-10-31T23:48:59Z2024-10-31T23:48:59Zby Seitz, Justin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137535">Click to View</a><br/>Format: Elektronik Kaynak<br/>Next generation SSH2 implementation : securing data in motionent://SD_ILS/0/SD_ILS:11917632024-10-31T23:48:59Z2024-10-31T23:48:59Zby Liu, Dale.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492836">https://www.sciencedirect.com/science/book/9781597492836</a><br/>Format: Elektronik Kaynak<br/>SQL injection attacks and defenseent://SD_ILS/0/SD_ILS:11928192024-10-31T23:48:59Z2024-10-31T23:48:59Zby Clarke, Justin.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494243">https://www.sciencedirect.com/science/book/9781597494243</a><br/>Format: Elektronik Kaynak<br/>Information security policy, processes, and practicesent://SD_ILS/0/SD_ILS:9532972024-10-31T23:48:59Z2024-10-31T23:48:59Zby Straub, Detmar W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=435197">Click to View</a><br/>Format: Elektronik Kaynak<br/>Securing information and communications systems principles, technologies, and applicationsent://SD_ILS/0/SD_ILS:9563262024-10-31T23:48:59Z2024-10-31T23:48:59Zby Furnell, Steven, 1970-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456881">Click to View</a><br/>Format: Elektronik Kaynak<br/>Fuzzing for software security testing and quality assuranceent://SD_ILS/0/SD_ILS:9563292024-10-31T23:48:59Z2024-10-31T23:48:59Zby Takanen, Ari.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456884">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information security a manager's guide to thwarting data thieves and hackersent://SD_ILS/0/SD_ILS:9452882024-10-31T23:48:59Z2024-10-31T23:48:59Zby Alexander, Philip, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=339307">Click to View</a><br/>Format: Elektronik Kaynak<br/>Secure computer and network systems modeling, analysis and designent://SD_ILS/0/SD_ILS:9463852024-10-31T23:48:59Z2024-10-31T23:48:59Zby Ye, Nong.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=351427">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer forensics for dummiesent://SD_ILS/0/SD_ILS:9477742024-10-31T23:48:59Z2024-10-31T23:48:59Zby Volonino, Linda.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=380503">Click to View</a><br/>Format: Elektronik Kaynak<br/>Practical embedded security building secure resource-constrained systemsent://SD_ILS/0/SD_ILS:9425072024-10-31T23:48:59Z2024-10-31T23:48:59Zby Stapko, Timothy John.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=312846">Click to View</a><br/>Format: Elektronik Kaynak<br/>Digital watermarking and steganographyent://SD_ILS/0/SD_ILS:9440152024-10-31T23:48:59Z2024-10-31T23:48:59Zby Cox, I. J. (Ingemar J.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328311">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information assurance dependability and security in networked systemsent://SD_ILS/0/SD_ILS:9440162024-10-31T23:48:59Z2024-10-31T23:48:59Zby Qian, Yi, 1962-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328312">Click to View</a><br/>Format: Elektronik Kaynak<br/>Trust and security in collaborative computingent://SD_ILS/0/SD_ILS:10302552024-10-31T23:48:59Z2024-10-31T23:48:59Zby Zou, Xukai, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1679354">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking the art of exploitationent://SD_ILS/0/SD_ILS:10099552024-10-31T23:48:59Z2024-10-31T23:48:59Zby Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137538">Click to View</a><br/>Format: Elektronik Kaynak<br/>Practical embedded security : building secure resource-constrained systemsent://SD_ILS/0/SD_ILS:11891682024-10-31T23:48:59Z2024-10-31T23:48:59Zby Stapko, Timothy John.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780750682152">https://www.sciencedirect.com/science/book/9780750682152</a><br/>Format: Elektronik Kaynak<br/>Google hacking for penetration testers. Volume 2ent://SD_ILS/0/SD_ILS:11891022024-10-31T23:48:59Z2024-10-31T23:48:59Zby Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491761">https://www.sciencedirect.com/science/book/9781597491761</a><br/>Format: Elektronik Kaynak<br/>Information assurance : dependability and security in networked systemsent://SD_ILS/0/SD_ILS:11891952024-10-31T23:48:59Z2024-10-31T23:48:59Zby Qian, Yi, 1962-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123735669">https://www.sciencedirect.com/science/book/9780123735669</a><br/>Format: Elektronik Kaynak<br/>Digital watermarking and steganographyent://SD_ILS/0/SD_ILS:11891962024-10-31T23:48:59Z2024-10-31T23:48:59Zby Cox, I. J. (Ingemar J.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123725851">http://www.sciencedirect.com/science/book/9780123725851</a><br/>Format: Elektronik Kaynak<br/>Microsoft forefront security administration guideent://SD_ILS/0/SD_ILS:11891202024-10-31T23:48:59Z2024-10-31T23:48:59Zby Varsalone, Jesse.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492447">https://www.sciencedirect.com/science/book/9781597492447</a><br/>Format: Elektronik Kaynak<br/>Check Point NGX R65 security administrationent://SD_ILS/0/SD_ILS:11891222024-10-31T23:48:59Z2024-10-31T23:48:59Zby Bonnell, Ralph.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492454">http://www.sciencedirect.com/science/book/9781597492454</a><br/>Format: Elektronik Kaynak<br/>OSSEC host-based intrusion detection guideent://SD_ILS/0/SD_ILS:11896202024-10-31T23:48:59Z2024-10-31T23:48:59Zby Hay, Andrew.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492409">http://www.sciencedirect.com/science/book/9781597492409</a><br/>Format: Elektronik Kaynak<br/>Securing Windows server 2008 : prevent attacks from outside and inside your organization.ent://SD_ILS/0/SD_ILS:11896212024-10-31T23:48:59Z2024-10-31T23:48:59ZScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492805">https://www.sciencedirect.com/science/book/9781597492805</a><br/>Format: Elektronik Kaynak<br/>No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfingent://SD_ILS/0/SD_ILS:11896352024-10-31T23:48:59Z2024-10-31T23:48:59Zby Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492157">https://www.sciencedirect.com/science/book/9781597492157</a><br/>Format: Elektronik Kaynak<br/>Scene of the cybercrime.ent://SD_ILS/0/SD_ILS:11896652024-10-31T23:48:59Z2024-10-31T23:48:59Zby Cross, Michael, 1965-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492768">https://www.sciencedirect.com/science/book/9781597492768</a><br/>Format: Elektronik Kaynak<br/>Malware forensics : investigating and analyzing malicious codeent://SD_ILS/0/SD_ILS:11896362024-10-31T23:48:59Z2024-10-31T23:48:59Zby Aquilina, James M.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492683">http://www.sciencedirect.com/science/book/9781597492683</a><br/>Format: Elektronik Kaynak<br/>Securing Citrix XenApp Server in the enterpriseent://SD_ILS/0/SD_ILS:11896372024-10-31T23:48:59Z2024-10-31T23:48:59Zby Bin Azad, Tariq.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492812">http://www.sciencedirect.com/science/book/9781597492812</a><br/>Format: Elektronik Kaynak<br/>OS X exploits and defenseent://SD_ILS/0/SD_ILS:11897052024-10-31T23:48:59Z2024-10-31T23:48:59Zby Baccas, Paul.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492546">http://www.sciencedirect.com/science/book/9781597492546</a><br/>Format: Elektronik Kaynak<br/>Infosecurity 2008 threat analysisent://SD_ILS/0/SD_ILS:11900002024-10-31T23:48:59Z2024-10-31T23:48:59Zby Clark, Champ, III.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492249">https://www.sciencedirect.com/science/book/9781597492249</a><br/>Format: Elektronik Kaynak<br/>Toward a safer and more secure cyberspaceent://SD_ILS/0/SD_ILS:10854522024-10-31T23:48:59Z2024-10-31T23:48:59Zby Goodman, Seymour E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3378311">Click to View</a><br/>Format: Elektronik Kaynak<br/>Role-based access controlent://SD_ILS/0/SD_ILS:9452212024-10-31T23:48:59Z2024-10-31T23:48:59Zby Ferraiolo, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338751">Click to View</a><br/>Format: Elektronik Kaynak<br/>Techno security's guide to e-discovery and digital forensicsent://SD_ILS/0/SD_ILS:9480152024-10-31T23:48:59Z2024-10-31T23:48:59Zby Wiles, Jack.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=405426">Click to View</a><br/>Format: Elektronik Kaynak<br/>Developer's guide to web application securityent://SD_ILS/0/SD_ILS:9385212024-10-31T23:48:59Z2024-10-31T23:48:59Zby Cross, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=289735">Click to View</a><br/>Format: Elektronik Kaynak<br/>Papers from the first European workshop on technological & security issues in digital rights management (EuDiRights)ent://SD_ILS/0/SD_ILS:9391602024-10-31T23:48:59Z2024-10-31T23:48:59Zby Yagüe, Mariemma.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=291585">Click to View</a><br/>Format: Elektronik Kaynak<br/>Microsoft windows security fundamentalsent://SD_ILS/0/SD_ILS:9396472024-10-31T23:48:59Z2024-10-31T23:48:59Zby Clercq, Jan de, 1968-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294637">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security convergence managing enterprise security riskent://SD_ILS/0/SD_ILS:9404342024-10-31T23:48:59Z2024-10-31T23:48:59Zby Tyson, Dave.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=299507">Click to View</a><br/>Format: Elektronik Kaynak<br/>A process for developing a common vocabulary in the information security areaent://SD_ILS/0/SD_ILS:9434782024-10-31T23:48:59Z2024-10-31T23:48:59Zby NATO Advanced Research Workshop on a Process for Developing a Common Vocabulary in the Information Security Area (2006 : Moscow, Russia)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=320313">Click to View</a><br/>Format: Elektronik Kaynak<br/>Microsoft Vista for IT security professionalsent://SD_ILS/0/SD_ILS:9440752024-10-31T23:48:59Z2024-10-31T23:48:59Zby Piltzecker, Tony, 1975-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328623">Click to View</a><br/>Format: Elektronik Kaynak<br/>Windows forensic analysis DVD toolkit,ent://SD_ILS/0/SD_ILS:9440762024-10-31T23:48:59Z2024-10-31T23:48:59Zby Carvey, Harlan A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328624">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information management & computer security. Volume 15, Number 5, Papers from the HAISA 2007 Symposiument://SD_ILS/0/SD_ILS:9441192024-10-31T23:48:59Z2024-10-31T23:48:59Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328737">Click to View</a><br/>Format: Elektronik Kaynak<br/>Best damn firewall book periodent://SD_ILS/0/SD_ILS:9442602024-10-31T23:48:59Z2024-10-31T23:48:59Zby Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=330100">Click to View</a><br/>Format: Elektronik Kaynak<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:9442822024-10-31T23:48:59Z2024-10-31T23:48:59Zby Winkler, Ira.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=330200">Click to View</a><br/>Format: Elektronik Kaynak<br/>The misuse of information systems the impact of security countermeasuresent://SD_ILS/0/SD_ILS:10580442024-10-31T23:48:59Z2024-10-31T23:48:59Zby D'Arcy, John P., 1975-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3016826">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security data visualization graphical techniques for network analysisent://SD_ILS/0/SD_ILS:10584542024-10-31T23:48:59Z2024-10-31T23:48:59Zby Conti, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3017625">Click to View</a><br/>Format: Elektronik Kaynak<br/>Microsoft windows security fundamentalsent://SD_ILS/0/SD_ILS:11857032024-10-31T23:48:59Z2024-10-31T23:48:59Zby Clercq, Jan de, 1968-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583408">https://www.sciencedirect.com/science/book/9781555583408</a><br/>Format: Elektronik Kaynak<br/>Developer's guide to web application securityent://SD_ILS/0/SD_ILS:11863712024-10-31T23:48:59Z2024-10-31T23:48:59Zby Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format: Elektronik Kaynak<br/>Metasploit toolkit for penetration testing, exploit development, and vulnerability researchent://SD_ILS/0/SD_ILS:11863732024-10-31T23:48:59Z2024-10-31T23:48:59Zby Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">http://www.sciencedirect.com/science/book/9781597490740</a><br/>Format: Elektronik Kaynak<br/>Botnets : the killer web appent://SD_ILS/0/SD_ILS:11864442024-10-31T23:48:59Z2024-10-31T23:48:59Zby Schiller, Craig A.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491358">https://www.sciencedirect.com/science/book/9781597491358</a><br/>Format: Elektronik Kaynak<br/>Security convergence : managing enterprise security riskent://SD_ILS/0/SD_ILS:11864462024-10-31T23:48:59Z2024-10-31T23:48:59Zby Tyson, Dave.<br/><a href="http://www.sciencedirect.com/science/book/9780750684255">Available from ScienceDirect. Online version available for university members only. This requires an institutional login off-campus</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780750684255">https://www.sciencedirect.com/science/book/9780750684255</a><br/>Format: Elektronik Kaynak<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:11864602024-10-31T23:48:59Z2024-10-31T23:48:59Zby Winkler, Ira.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491686">https://www.sciencedirect.com/science/book/9781597491686</a><br/>Format: Elektronik Kaynak<br/>Microsoft Vista for IT security professionalsent://SD_ILS/0/SD_ILS:11864532024-10-31T23:48:59Z2024-10-31T23:48:59Zby Piltzecker, Tony, 1975-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491396">http://www.sciencedirect.com/science/book/9781597491396</a><br/>Format: Elektronik Kaynak<br/>Windows forensic analysis : DVD toolkitent://SD_ILS/0/SD_ILS:11864552024-10-31T23:48:59Z2024-10-31T23:48:59Zby Carvey, Harlan A.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491563">http://www.sciencedirect.com/science/book/9781597491563</a><br/>Format: Elektronik Kaynak<br/>Open source fuzzing tools.ent://SD_ILS/0/SD_ILS:11864742024-10-31T23:48:59Z2024-10-31T23:48:59Zby Rathaus, Noam.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491952">http://www.sciencedirect.com/science/book/9781597491952</a><br/>Format: Elektronik Kaynak<br/>How to cheat at securing SQL server 2005.ent://SD_ILS/0/SD_ILS:11864752024-10-31T23:48:59Z2024-10-31T23:48:59ZScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491969">http://www.sciencedirect.com/science/book/9781597491969</a><br/>Format: Elektronik Kaynak<br/>The history of information security : a comprehensive handbookent://SD_ILS/0/SD_ILS:11865232024-10-31T23:48:59Z2024-10-31T23:48:59Zby Leeuw, Karl de.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444516084">http://www.sciencedirect.com/science/book/9780444516084</a><br/>Format: Elektronik Kaynak<br/>Physical and logical security convergence powered by enterprise security managementent://SD_ILS/0/SD_ILS:11890882024-10-31T23:48:59Z2024-10-31T23:48:59Zby Contos, Brian T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491228">https://www.sciencedirect.com/science/book/9781597491228</a><br/>Format: Elektronik Kaynak<br/>