Arama Sonuçları Computer networks -- Security measures. - Daraltılmış: 2006SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dComputer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092006$0025092006$0026ps$003d300;jsessionid=A682AA0DF4134FA160F7FDCF9347D952?2026-01-17T08:40:39ZSecure your network for free : using NMAP, wireshark, snort, nessus, and MRTGent://SD_ILS/0/SD_ILS:11882782026-01-17T08:40:39Z2026-01-17T08:40:39Zby Seagren, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491235">http://www.sciencedirect.com/science/book/9781597491235</a><br/>Format: Elektronik Kaynak<br/>Syngress IT security project management handbookent://SD_ILS/0/SD_ILS:11882652026-01-17T08:40:39Z2026-01-17T08:40:39Zby Snedaker, Susan.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490764">http://www.sciencedirect.com/science/book/9781597490764</a><br/>Format: Elektronik Kaynak<br/>Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasuresent://SD_ILS/0/SD_ILS:9394832026-01-17T08:40:39Z2026-01-17T08:40:39Zby Contos, Brian T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294116">Click to View</a><br/>Format: Elektronik Kaynak<br/>Configuring SonicWALL firewallsent://SD_ILS/0/SD_ILS:9340732026-01-17T08:40:39Z2026-01-17T08:40:39Zby Lathem, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=256369">Click to View</a><br/>Format: Elektronik Kaynak<br/>How to cheat at managing information securityent://SD_ILS/0/SD_ILS:9347422026-01-17T08:40:39Z2026-01-17T08:40:39Zby Osborne, Mark.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=266207">Click to View</a><br/>Format: Elektronik Kaynak<br/>Firewall policies and VPN configurationsent://SD_ILS/0/SD_ILS:9359862026-01-17T08:40:39Z2026-01-17T08:40:39Zby Cantrell, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=272100">Click to View</a><br/>Format: Elektronik Kaynak<br/>Designing and building enterprise DMZsent://SD_ILS/0/SD_ILS:9433482026-01-17T08:40:39Z2026-01-17T08:40:39Zby Flynn, Hal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=319198">Click to View</a><br/>Format: Elektronik Kaynak<br/>How to cheat at designing security for a Windows Server 2003 networkent://SD_ILS/0/SD_ILS:9338562026-01-17T08:40:39Z2026-01-17T08:40:39Zby Amini, Rob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254832">Click to View</a><br/>Format: Elektronik Kaynak<br/>Securing IM and P2P applications for the enterpriseent://SD_ILS/0/SD_ILS:9338712026-01-17T08:40:39Z2026-01-17T08:40:39Zby Piccard, Paul L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254847">Click to View</a><br/>Format: Elektronik Kaynak<br/>Firewall policies and VPN configurationsent://SD_ILS/0/SD_ILS:11882702026-01-17T08:40:39Z2026-01-17T08:40:39Zby Henmi, Anne.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490887">https://www.sciencedirect.com/science/book/9781597490887</a><br/>Format: Elektronik Kaynak<br/>Insider threat : protecting the enterprise from sabotage, spying, and theftent://SD_ILS/0/SD_ILS:11882592026-01-17T08:40:39Z2026-01-17T08:40:39Zby Cole, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format: Elektronik Kaynak<br/>How to cheat at designing security for a Windows Server 2003 networkent://SD_ILS/0/SD_ILS:11882812026-01-17T08:40:39Z2026-01-17T08:40:39Zby Amini, Rob.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492430">https://www.sciencedirect.com/science/book/9781597492430</a><br/>Format: Elektronik Kaynak<br/>Designing and building enterprise DMZsent://SD_ILS/0/SD_ILS:11882722026-01-17T08:40:39Z2026-01-17T08:40:39Zby Dubrawsky, Ido.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491006">http://www.sciencedirect.com/science/book/9781597491006</a><br/>Format: Elektronik Kaynak<br/>Security log management : identifying patterns in the chaosent://SD_ILS/0/SD_ILS:11882572026-01-17T08:40:39Z2026-01-17T08:40:39Zby Babbin, Jacob.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490429">http://www.sciencedirect.com/science/book/9781597490429</a><br/>Format: Elektronik Kaynak<br/>Hack the stack : using snort and ethereal to master the 8 layers of an insecure networkent://SD_ILS/0/SD_ILS:11864272026-01-17T08:40:39Z2026-01-17T08:40:39Zby Gregg, Michael (Michael C.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">http://www.sciencedirect.com/science/book/9781597491099</a><br/>Format: Elektronik Kaynak<br/>Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasuresent://SD_ILS/0/SD_ILS:11864392026-01-17T08:40:39Z2026-01-17T08:40:39Zby Contos, Brian T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491297">https://www.sciencedirect.com/science/book/9781597491297</a><br/>Format: Elektronik Kaynak<br/>Information security and employee behaviour how to reduce risk through employee education, training and awarenessent://SD_ILS/0/SD_ILS:9518692026-01-17T08:40:39Z2026-01-17T08:40:39Zby McIlwraith, Angus.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=429792">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security for mobile networks and platformsent://SD_ILS/0/SD_ILS:9452042026-01-17T08:40:39Z2026-01-17T08:40:39Zby Aissi, Selim.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338731">Click to View</a><br/>Format: Elektronik Kaynak<br/>Configuring SonicWALL firewallsent://SD_ILS/0/SD_ILS:11882822026-01-17T08:40:39Z2026-01-17T08:40:39Zby Bendell, Dan.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492508">http://www.sciencedirect.com/science/book/9781597492508</a><br/>Format: Elektronik Kaynak<br/>Cyberwar-Netwar security in the information ageent://SD_ILS/0/SD_ILS:9352162026-01-17T08:40:39Z2026-01-17T08:40:39Zby NATO Advanced Research Workshop on Cyberwar-Netwar: Security in the Information Age (2003 : Lisbon, Portugal)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=267716">Click to View</a><br/>Format: Elektronik Kaynak<br/>How to cheat at securing a wireless networkent://SD_ILS/0/SD_ILS:9366442026-01-17T08:40:39Z2026-01-17T08:40:39Zby Hurley, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=274288">Click to View</a><br/>Format: Elektronik Kaynak<br/>Syngress IT security project management handbookent://SD_ILS/0/SD_ILS:9346042026-01-17T08:40:39Z2026-01-17T08:40:39Zby Snedaker, Susan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=261283">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security log management identifying patterns in the chaosent://SD_ILS/0/SD_ILS:9338572026-01-17T08:40:39Z2026-01-17T08:40:39Zby Babbin, Jacob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254833">Click to View</a><br/>Format: Elektronik Kaynak<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:9338582026-01-17T08:40:39Z2026-01-17T08:40:39Zby Long, Johnny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254834">Click to View</a><br/>Format: Elektronik Kaynak<br/>Insider threat protecting the enterprise from sabotage, spying, and theftent://SD_ILS/0/SD_ILS:9338732026-01-17T08:40:39Z2026-01-17T08:40:39Zby Cole, Eric.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254849">Click to View</a><br/>Format: Elektronik Kaynak<br/>Bilgisayar ağları ve ağ güvenliğient://SD_ILS/0/SD_ILS:11628622026-01-17T08:40:39Z2026-01-17T08:40:39Zby Uçan, Osman Nuri, 1960-.<br/>Format: Kitap<br/>How to cheat at Windows system administration using command line scriptsent://SD_ILS/0/SD_ILS:11864252026-01-17T08:40:39Z2026-01-17T08:40:39Zby Bhardwaj, Pawan K.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491051">http://www.sciencedirect.com/science/book/9781597491051</a><br/>Format: Elektronik Kaynak<br/>Practical VoIP securityent://SD_ILS/0/SD_ILS:11882632026-01-17T08:40:39Z2026-01-17T08:40:39Zby Porter, Thomas.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490603">https://www.sciencedirect.com/science/book/9781597490603</a><br/>Format: Elektronik Kaynak<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:11882482026-01-17T08:40:39Z2026-01-17T08:40:39Zby Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490214">https://www.sciencedirect.com/science/book/9781597490214</a><br/>Format: Elektronik Kaynak<br/>How to cheat at configuring ISA server 2004ent://SD_ILS/0/SD_ILS:11882612026-01-17T08:40:39Z2026-01-17T08:40:39Zby Shinder, Thomas W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490573">http://www.sciencedirect.com/science/book/9781597490573</a><br/>Format: Elektronik Kaynak<br/>Syngress force emerging threat analysis : from mischief to maliciousent://SD_ILS/0/SD_ILS:11863392026-01-17T08:40:39Z2026-01-17T08:40:39Zby Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">http://www.sciencedirect.com/science/book/9781597490566</a><br/>Format: Elektronik Kaynak<br/>