Arama Sonuçları Computer networks -- Security measures.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dComputer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ic$003dtrue$0026ps$003d300?dt=list2025-12-24T14:19:06ZIdentity management concepts, technologies, and systemsent://SD_ILS/0/SD_ILS:9725072025-12-24T14:19:06Z2025-12-24T14:19:06Zby Bertino, Elisa.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=634511">Click to View</a><br/>Format: Elektronik Kaynak<br/>Unauthorised access physical penetration testing for IT security teamsent://SD_ILS/0/SD_ILS:9587762025-12-24T14:19:06Z2025-12-24T14:19:06Zby Allsopp, Wil.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=470412">Click to View</a><br/>Format: Elektronik Kaynak<br/>Applied network security : master the art of detecting and averting advanced network security attacks and techniquesent://SD_ILS/0/SD_ILS:11258302025-12-24T14:19:06Z2025-12-24T14:19:06Zby Salmon, Arthur, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4853051">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:11925942025-12-24T14:19:06Z2025-12-24T14:19:06Zby Vacca, John R.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123743541">https://www.sciencedirect.com/science/book/9780123743541</a><br/>Format: Elektronik Kaynak<br/>Secure your network for free : using NMAP, wireshark, snort, nessus, and MRTGent://SD_ILS/0/SD_ILS:11882782025-12-24T14:19:06Z2025-12-24T14:19:06Zby Seagren, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491235">http://www.sciencedirect.com/science/book/9781597491235</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity today and tomorrow pay now or pay laterent://SD_ILS/0/SD_ILS:10825832025-12-24T14:19:06Z2025-12-24T14:19:06Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3375180">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security+ study guide and DVD training systement://SD_ILS/0/SD_ILS:9395692025-12-24T14:19:06Z2025-12-24T14:19:06Zby Cross, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294357">Click to View</a><br/>Format: Elektronik Kaynak<br/>Eleventh hour CISSP : study guideent://SD_ILS/0/SD_ILS:11831382025-12-24T14:19:06Z2025-12-24T14:19:06Zby Conrad, Eric, 1967-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495660">https://www.sciencedirect.com/science/book/9781597495660</a><br/>Format: Elektronik Kaynak<br/>Syngress IT security project management handbookent://SD_ILS/0/SD_ILS:11882652025-12-24T14:19:06Z2025-12-24T14:19:06Zby Snedaker, Susan.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490764">http://www.sciencedirect.com/science/book/9781597490764</a><br/>Format: Elektronik Kaynak<br/>Security+ study guide & DVD training systement://SD_ILS/0/SD_ILS:11864622025-12-24T14:19:06Z2025-12-24T14:19:06Zby Cross, Michael, 1965-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491532">https://www.sciencedirect.com/science/book/9781597491532</a><br/>Format: Elektronik Kaynak<br/>GFI network security and PCI compliance power toolsent://SD_ILS/0/SD_ILS:11918272025-12-24T14:19:06Z2025-12-24T14:19:06Zby Posey, Brien.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492850">https://www.sciencedirect.com/science/book/9781597492850</a><br/>Format: Elektronik Kaynak<br/>Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilitiesent://SD_ILS/0/SD_ILS:10856922025-12-24T14:19:06Z2025-12-24T14:19:06Zby Dam, Kenneth W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3378552">Click to View</a><br/>Format: Elektronik Kaynak<br/>Kendi siteni kendin koruent://SD_ILS/0/SD_ILS:11965542025-12-24T14:19:06Z2025-12-24T14:19:06Zby Büyükgöze, Selma.<br/>Format: Kitap<br/>Kendi siteni kendin koruent://SD_ILS/0/SD_ILS:11957522025-12-24T14:19:06Z2025-12-24T14:19:06Zby Büyükgöze, Selma.<br/>Format: Kitap<br/>Two-factor authenticationent://SD_ILS/0/SD_ILS:10495352025-12-24T14:19:06Z2025-12-24T14:19:06Zby Stanislav, Mark, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2048577">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network securityent://SD_ILS/0/SD_ILS:10385512025-12-24T14:19:06Z2025-12-24T14:19:06Zby Perez, Andre, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1800888">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber securityent://SD_ILS/0/SD_ILS:10257192025-12-24T14:19:06Z2025-12-24T14:19:06Zby Voeller, John G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1598809">Click to View</a><br/>Format: Elektronik Kaynak<br/>Communications and information infrastructure securityent://SD_ILS/0/SD_ILS:10257202025-12-24T14:19:06Z2025-12-24T14:19:06Zby Voeller, John G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1598810">Click to View</a><br/>Format: Elektronik Kaynak<br/>IV. Ağ ve Bilgi Güvenliği Sempozyumu : bildiriler kitabı, 25-26 Kasım 2011, Ankara.ent://SD_ILS/0/SD_ILS:11639772025-12-24T14:19:06Z2025-12-24T14:19:06Zby Ağ ve Bilgi Güvenliği Sempozyumu (4th : 2011 : Ankara, Turkey)<br/>Format: Kitap<br/>Network security jumpstartent://SD_ILS/0/SD_ILS:9360082025-12-24T14:19:06Z2025-12-24T14:19:06Zby Strebe, Matthew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=272216">Click to View</a><br/>Format: Elektronik Kaynak<br/>Teknik, teorik bilgilerle, akademiye uygun siber güvenlik : Türkiye'nin siber gücü ve dünyadan örneklerent://SD_ILS/0/SD_ILS:12251132025-12-24T14:19:06Z2025-12-24T14:19:06Zby Paltacı, Bahtiyar M., yazar.<br/>Format: Kitap<br/>Cyber smart : five habits to protect your family, money, and identity from cyber criminalsent://SD_ILS/0/SD_ILS:11439062025-12-24T14:19:06Z2025-12-24T14:19:06Zby McDonough, Bart, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5612908">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security and privacy in cyber-physical systems : foundations, principles, and applicationsent://SD_ILS/0/SD_ILS:11290492025-12-24T14:19:06Z2025-12-24T14:19:06Zby Song, Houbing, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4987646">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network vulnerability assessment : identify security loopholes in your network's infrastructureent://SD_ILS/0/SD_ILS:11417442025-12-24T14:19:06Z2025-12-24T14:19:06Zby Rahalkar, Sagar, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5507753">Click to View</a><br/>Format: Elektronik Kaynak<br/>Practical cyber intelligence : how action-based intelligence can be an effective response to incidentsent://SD_ILS/0/SD_ILS:11366932025-12-24T14:19:06Z2025-12-24T14:19:06Zby Bautista, Wilson, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5332127">Click to View</a><br/>Format: Elektronik Kaynak<br/>Learn social engineering : learn the art of human hacking with an internationally renowned expertent://SD_ILS/0/SD_ILS:11375602025-12-24T14:19:06Z2025-12-24T14:19:06Zby Ozkaya, Erdal, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5379705">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network security and cryptography : a self-teaching introductionent://SD_ILS/0/SD_ILS:11378042025-12-24T14:19:06Z2025-12-24T14:19:06Zby Musa, Sarhan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5389089">Click to View</a><br/>Format: Elektronik Kaynak<br/>.NET Standard 2.0 Cookbook : develop high quality, fast and portable applications by leveraging the power of .NET Standard Libraryent://SD_ILS/0/SD_ILS:11381412025-12-24T14:19:06Z2025-12-24T14:19:06Zby Ismail, Fiqri, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5400395">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security in network functions virtualizationent://SD_ILS/0/SD_ILS:11319052025-12-24T14:19:06Z2025-12-24T14:19:06Zby Zhang, Zonghua, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5152998">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information security handbook : develop a threat model and incident response strategy to build a strong information security frameworkent://SD_ILS/0/SD_ILS:11333812025-12-24T14:19:06Z2025-12-24T14:19:06Zby Death, Darren, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5183382">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network forensicsent://SD_ILS/0/SD_ILS:11282472025-12-24T14:19:06Z2025-12-24T14:19:06Zby Messier, Ric, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4917496">Click to View</a><br/>Format: Elektronik Kaynak<br/>Advanced persistent threat : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategiesent://SD_ILS/0/SD_ILS:11200822025-12-24T14:19:06Z2025-12-24T14:19:06Zby Winkler, Ira, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4730826">Click to View</a><br/>Format: Elektronik Kaynak<br/>Safety of web applications : risks, encryption and handling vulnerabilities with PHPent://SD_ILS/0/SD_ILS:11253102025-12-24T14:19:06Z2025-12-24T14:19:06Zby Quinton, Eric, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4840953">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:11262122025-12-24T14:19:06Z2025-12-24T14:19:06Zby Vacca, John R., editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4858374">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security operations center guidebook : a practical guide for a successful SOCent://SD_ILS/0/SD_ILS:11264572025-12-24T14:19:06Z2025-12-24T14:19:06Zby Jarpey, Gregory , author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4862661">Click to View</a><br/>Format: Elektronik Kaynak<br/>Loseless information : hiding in imagesent://SD_ILS/0/SD_ILS:11206462025-12-24T14:19:06Z2025-12-24T14:19:06Zby Lu, Zhe-Ming, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4743573">Click to View</a><br/>Format: Elektronik Kaynak<br/>Building a corporate culture of security : strategies for strengthening organizational resiliencyent://SD_ILS/0/SD_ILS:11083492025-12-24T14:19:06Z2025-12-24T14:19:06Zby Sullivant, John, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4425984">Click to View</a><br/>Format: Elektronik Kaynak<br/>Dns security : defending the domain name systement://SD_ILS/0/SD_ILS:11132152025-12-24T14:19:06Z2025-12-24T14:19:06Zby Liska, Allan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4556898">Click to View</a><br/>Format: Elektronik Kaynak<br/>Data breach preparation and response : breaches are certain, impact is notent://SD_ILS/0/SD_ILS:11132162025-12-24T14:19:06Z2025-12-24T14:19:06Zby Fowler, Kevvie, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4556899">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber guerillaent://SD_ILS/0/SD_ILS:11132622025-12-24T14:19:06Z2025-12-24T14:19:06Zby Haaster, Jelle van, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4557157">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security in fixed and wireless networksent://SD_ILS/0/SD_ILS:11155852025-12-24T14:19:06Z2025-12-24T14:19:06Zby Schäfer, Günter, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4658592">Click to View</a><br/>Format: Elektronik Kaynak<br/>Managing online risk : apps, mobile, and social media securityent://SD_ILS/0/SD_ILS:10381762025-12-24T14:19:06Z2025-12-24T14:19:06Zby Gonzalez, Deborah, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1798304">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computational network science : an algorithmic approachent://SD_ILS/0/SD_ILS:10381842025-12-24T14:19:06Z2025-12-24T14:19:06Zby Hexmoor, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1798312">Click to View</a><br/>Format: Elektronik Kaynak<br/>Python passive network mapping : P2NMAPent://SD_ILS/0/SD_ILS:10505042025-12-24T14:19:06Z2025-12-24T14:19:06Zby Hosmer, Chet, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2068785">Click to View</a><br/>Format: Elektronik Kaynak<br/>Web application security is a stack : how to CYA (Cover Your Apps) completelyent://SD_ILS/0/SD_ILS:10538362025-12-24T14:19:06Z2025-12-24T14:19:06Zby Vittie, Lori Mac, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192126">Click to View</a><br/>Format: Elektronik Kaynak<br/>Building an intelligence-led security programent://SD_ILS/0/SD_ILS:10425612025-12-24T14:19:06Z2025-12-24T14:19:06Zby Liska, Allan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1888751">Click to View</a><br/>Format: Elektronik Kaynak<br/>How to define and build an effective cyber threat intelligence capabilityent://SD_ILS/0/SD_ILS:10425652025-12-24T14:19:06Z2025-12-24T14:19:06Zby Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1888755">Click to View</a><br/>Format: Elektronik Kaynak<br/>How to defeat advanced malware : new tools for protection and forensicsent://SD_ILS/0/SD_ILS:10425662025-12-24T14:19:06Z2025-12-24T14:19:06Zby Dalziel, Max, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1888756">Click to View</a><br/>Format: Elektronik Kaynak<br/>Beyond cybersecurity : protecting your digital businessent://SD_ILS/0/SD_ILS:10427752025-12-24T14:19:06Z2025-12-24T14:19:06Zby Kaplan, James M., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1895275">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security technology convergence insightsent://SD_ILS/0/SD_ILS:10475052025-12-24T14:19:06Z2025-12-24T14:19:06Zby Bernard, Ray, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2008287">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking web intelligence : open source intelligence and web reconnaissance concepts and techniquesent://SD_ILS/0/SD_ILS:10478512025-12-24T14:19:06Z2025-12-24T14:19:06Zby Chauhan, Sudhanshu, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2025500">Click to View</a><br/>Format: Elektronik Kaynak<br/>Introduction to network security : theory and practiceent://SD_ILS/0/SD_ILS:11031222025-12-24T14:19:06Z2025-12-24T14:19:06Zby Wang, Jie, 1961- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040040">Click to View</a><br/>Format: Elektronik Kaynak<br/>The network security test lab : a step-by-step guideent://SD_ILS/0/SD_ILS:11031432025-12-24T14:19:06Z2025-12-24T14:19:06Zby Gregg, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040350">Click to View</a><br/>Format: Elektronik Kaynak<br/>Targeted cyber attacks : multi-staged attacks driven by exploits and malwareent://SD_ILS/0/SD_ILS:10297842025-12-24T14:19:06Z2025-12-24T14:19:06Zby Sood, Aditya K., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1673591">Click to View</a><br/>Format: Elektronik Kaynak<br/>Procuring penetration testing services.ent://SD_ILS/0/SD_ILS:10370852025-12-24T14:19:06Z2025-12-24T14:19:06Z<a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778766">Click to View</a><br/>Format: Elektronik Kaynak<br/>Integrated security systems design : a complete reference for building enterprise-wide digital security systemsent://SD_ILS/0/SD_ILS:10373432025-12-24T14:19:06Z2025-12-24T14:19:06Zby Norman, Thomas, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1781681">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity for executives : a practical guideent://SD_ILS/0/SD_ILS:10325942025-12-24T14:19:06Z2025-12-24T14:19:06Zby Touhill, Gregory J., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1707094">Click to View</a><br/>Format: Elektronik Kaynak<br/>Assessing information security : strategies, tactics, logic and frameworkent://SD_ILS/0/SD_ILS:10538342025-12-24T14:19:06Z2025-12-24T14:19:06Zby Vladimirov, A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192124">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity : managing systems, conducting testing, and investigating intrusionsent://SD_ILS/0/SD_ILS:10215162025-12-24T14:19:06Z2025-12-24T14:19:06Zby Mowbray, Thomas J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1481185">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network and system securityent://SD_ILS/0/SD_ILS:10185012025-12-24T14:19:06Z2025-12-24T14:19:06Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1364061">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:10141912025-12-24T14:19:06Z2025-12-24T14:19:06Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1195617">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security patterns in practice : designing secure architectures using software patternsent://SD_ILS/0/SD_ILS:10158112025-12-24T14:19:06Z2025-12-24T14:19:06Zby Fernandez, Eduardo B., 1936- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1245159">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security risks in social media technologies : safe practices in public service applicationsent://SD_ILS/0/SD_ILS:10237762025-12-24T14:19:06Z2025-12-24T14:19:06Zby Oxley, Alan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1574994">Click to View</a><br/>Format: Elektronik Kaynak<br/>Data visualization. Part 2ent://SD_ILS/0/SD_ILS:10242062025-12-24T14:19:06Z2025-12-24T14:19:06Zby Assam, Tarek.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1579356">Click to View</a><br/>Format: Elektronik Kaynak<br/>UTM security with Fortinet Mastering FortiOSent://SD_ILS/0/SD_ILS:10034962025-12-24T14:19:06Z2025-12-24T14:19:06Zby Tam, Kenneth.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1068442">Click to View</a><br/>Format: Elektronik Kaynak<br/>Advanced persistent threat understanding the danger and how to protect your organizationent://SD_ILS/0/SD_ILS:10039212025-12-24T14:19:06Z2025-12-24T14:19:06Zby Cole, Eric.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073020">Click to View</a><br/>Format: Elektronik Kaynak<br/>Federated identity primerent://SD_ILS/0/SD_ILS:10046722025-12-24T14:19:06Z2025-12-24T14:19:06Zby Rountree, Derrick.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1081145">Click to View</a><br/>Format: Elektronik Kaynak<br/>Practical anonymity hiding in plain sight onlineent://SD_ILS/0/SD_ILS:10076142025-12-24T14:19:06Z2025-12-24T14:19:06Zby Loshin, Peter.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115167">Click to View</a><br/>Format: Elektronik Kaynak<br/>What should go on the internet? : privacy, freedom, and security onlineent://SD_ILS/0/SD_ILS:11118342025-12-24T14:19:06Z2025-12-24T14:19:06Zby Engel, Mary, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4533280">Click to View</a><br/>Format: Elektronik Kaynak<br/>Client-side attacks and defenseent://SD_ILS/0/SD_ILS:10019052025-12-24T14:19:06Z2025-12-24T14:19:06Zby Shimonski, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1036349">Click to View</a><br/>Format: Elektronik Kaynak<br/>BackTrack 4 assuring security by penetration testing : master the art of penetration testing with BackTrackent://SD_ILS/0/SD_ILS:9969682025-12-24T14:19:06Z2025-12-24T14:19:06Zby Ali, Shakeel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=950518">Click to View</a><br/>Format: Elektronik Kaynak<br/>Implementing SSL/TLS using cryptography and PKIent://SD_ILS/0/SD_ILS:9790072025-12-24T14:19:06Z2025-12-24T14:19:06Zby Davies, Joshua Dennis.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706899">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security risk management building an information security risk management program from the ground upent://SD_ILS/0/SD_ILS:9768042025-12-24T14:19:06Z2025-12-24T14:19:06Zby Wheeler, Evan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=685406">Click to View</a><br/>Format: Elektronik Kaynak<br/>Client-Honeypots : exploring malicious websitesent://SD_ILS/0/SD_ILS:10177762025-12-24T14:19:06Z2025-12-24T14:19:06Zby Göbel, Jan Gerrit, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1348689">Click to View</a><br/>Format: Elektronik Kaynak<br/>Adaptive security management architectureent://SD_ILS/0/SD_ILS:9722382025-12-24T14:19:06Z2025-12-24T14:19:06Zby Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=625004">Click to View</a><br/>Format: Elektronik Kaynak<br/>Secure computer and network systems modeling, analysis and designent://SD_ILS/0/SD_ILS:9463852025-12-24T14:19:06Z2025-12-24T14:19:06Zby Ye, Nong.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=351427">Click to View</a><br/>Format: Elektronik Kaynak<br/>Implementing 802.1X security solutions for wired and wireless networksent://SD_ILS/0/SD_ILS:9465792025-12-24T14:19:06Z2025-12-24T14:19:06Zby Geier, James T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=353449">Click to View</a><br/>Format: Elektronik Kaynak<br/>IT compliance and controls best practices for implementationent://SD_ILS/0/SD_ILS:9450512025-12-24T14:19:06Z2025-12-24T14:19:06Zby DeLuccia, James J., 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=335724">Click to View</a><br/>Format: Elektronik Kaynak<br/>Integrated security systems design concepts, specifications, and implementationent://SD_ILS/0/SD_ILS:9382982025-12-24T14:19:06Z2025-12-24T14:19:06Zby Norman, Thomas L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=287955">Click to View</a><br/>Format: Elektronik Kaynak<br/>Developer's guide to web application securityent://SD_ILS/0/SD_ILS:9385212025-12-24T14:19:06Z2025-12-24T14:19:06Zby Cross, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=289735">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network security assessment from vulnerability to patchent://SD_ILS/0/SD_ILS:9370382025-12-24T14:19:06Z2025-12-24T14:19:06Zby Manzuik, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=280219">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security data visualization graphical techniques for network analysisent://SD_ILS/0/SD_ILS:10584542025-12-24T14:19:06Z2025-12-24T14:19:06Zby Conti, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3017625">Click to View</a><br/>Format: Elektronik Kaynak<br/>Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasuresent://SD_ILS/0/SD_ILS:9394832025-12-24T14:19:06Z2025-12-24T14:19:06Zby Contos, Brian T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294116">Click to View</a><br/>Format: Elektronik Kaynak<br/>Designing and building enterprise DMZsent://SD_ILS/0/SD_ILS:9433482025-12-24T14:19:06Z2025-12-24T14:19:06Zby Flynn, Hal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=319198">Click to View</a><br/>Format: Elektronik Kaynak<br/>Configuring SonicWALL firewallsent://SD_ILS/0/SD_ILS:9340732025-12-24T14:19:06Z2025-12-24T14:19:06Zby Lathem, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=256369">Click to View</a><br/>Format: Elektronik Kaynak<br/>How to cheat at managing information securityent://SD_ILS/0/SD_ILS:9347422025-12-24T14:19:06Z2025-12-24T14:19:06Zby Osborne, Mark.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=266207">Click to View</a><br/>Format: Elektronik Kaynak<br/>Firewall policies and VPN configurationsent://SD_ILS/0/SD_ILS:9359862025-12-24T14:19:06Z2025-12-24T14:19:06Zby Cantrell, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=272100">Click to View</a><br/>Format: Elektronik Kaynak<br/>Buffer overflow attacks detect, exploit, preventent://SD_ILS/0/SD_ILS:9302072025-12-24T14:19:06Z2025-12-24T14:19:06Zby Foster, James C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=222803">Click to View</a><br/>Format: Elektronik Kaynak<br/>Host integrity monitoring using Osiris and Samhainent://SD_ILS/0/SD_ILS:9316062025-12-24T14:19:06Z2025-12-24T14:19:06Zby Wotring, Brian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=233599">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cisco Pix firewalls configure, manage and troubleshootent://SD_ILS/0/SD_ILS:9338592025-12-24T14:19:06Z2025-12-24T14:19:06Zby Behrens, Thorsten.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254835">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network security evaluation using the NSA IEMent://SD_ILS/0/SD_ILS:9338662025-12-24T14:19:06Z2025-12-24T14:19:06Zby Fuller, Ed.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254842">Click to View</a><br/>Format: Elektronik Kaynak<br/>Silence on the wire a field guide to passive reconnaissance and indirect attacksent://SD_ILS/0/SD_ILS:9365792025-12-24T14:19:06Z2025-12-24T14:19:06Zby Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273504">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking the code ASP. NET web application securityent://SD_ILS/0/SD_ILS:9395062025-12-24T14:19:06Z2025-12-24T14:19:06Zby Burnett, Mark (Mark M.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294160">Click to View</a><br/>Format: Elektronik Kaynak<br/>Ethereal packet sniffingent://SD_ILS/0/SD_ILS:9394852025-12-24T14:19:06Z2025-12-24T14:19:06Zby Orebaugh, Angela.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294122">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security sage's guide to hardening the network infrastructureent://SD_ILS/0/SD_ILS:9395712025-12-24T14:19:06Z2025-12-24T14:19:06Zby Andrés, Steven.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294359">Click to View</a><br/>Format: Elektronik Kaynak<br/>How to cheat at Configuring ISA Server 2004ent://SD_ILS/0/SD_ILS:9338772025-12-24T14:19:06Z2025-12-24T14:19:06Zby Shinder, Dr. Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254853">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network security foundationsent://SD_ILS/0/SD_ILS:9350402025-12-24T14:19:06Z2025-12-24T14:19:06Zby Strebe, Matthew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=267332">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cisco security professional's guide to secure intrusion detection systemsent://SD_ILS/0/SD_ILS:9394512025-12-24T14:19:06Z2025-12-24T14:19:06Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294035">Click to View</a><br/>Format: Elektronik Kaynak<br/>Snort 2.0 intrusion detectionent://SD_ILS/0/SD_ILS:9395752025-12-24T14:19:06Z2025-12-24T14:19:06Zby Beale, Jay.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294371">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cisco security specialist's guide to PIX Firewallent://SD_ILS/0/SD_ILS:9394522025-12-24T14:19:06Z2025-12-24T14:19:06Zby Osipov, Vitaly.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294036">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hack proofing ColdFusionent://SD_ILS/0/SD_ILS:9394982025-12-24T14:19:06Z2025-12-24T14:19:06Zby Meyer, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294151">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hack proofing your networkent://SD_ILS/0/SD_ILS:9395042025-12-24T14:19:06Z2025-12-24T14:19:06Zby Ahmad, David R. Mirza.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294158">Click to View</a><br/>Format: Elektronik Kaynak<br/>Nokia Network security solutions handbookent://SD_ILS/0/SD_ILS:9395422025-12-24T14:19:06Z2025-12-24T14:19:06Zby Maxwell, Douglas D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294289">Click to View</a><br/>Format: Elektronik Kaynak<br/>Trust in cyberspaceent://SD_ILS/0/SD_ILS:10859602025-12-24T14:19:06Z2025-12-24T14:19:06Zby Schneider, Fred B.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3378820">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team tacticsent://SD_ILS/0/SD_ILS:11347222025-12-24T14:19:06Z2025-12-24T14:19:06Zby Diogenes, Yuri, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5259454">Click to View</a><br/>Format: Elektronik Kaynak<br/>The five technological forces disrupting security : how social, mobile, cloud and iot are fundamentally changing the practice of physical securityent://SD_ILS/0/SD_ILS:11288832025-12-24T14:19:06Z2025-12-24T14:19:06Zby Van Till, Steve, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4981408">Click to View</a><br/>Format: Elektronik Kaynak<br/>Fuzzing for software security testing and quality assuranceent://SD_ILS/0/SD_ILS:11392372025-12-24T14:19:06Z2025-12-24T14:19:06Zby Takanen, Ari, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5430720">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information hiding in communication networks : fundamentals, mechanisms, applications, and countermeasuresent://SD_ILS/0/SD_ILS:11076542025-12-24T14:19:06Z2025-12-24T14:19:06Zby Mazurczyk, Wojciech, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4405578">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security and privacy in the digital era. Volume 1ent://SD_ILS/0/SD_ILS:11152702025-12-24T14:19:06Z2025-12-24T14:19:06Zby Guerrier, Claudine, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4648717">Click to View</a><br/>Format: Elektronik Kaynak<br/>SSL and TLS : theory and practiceent://SD_ILS/0/SD_ILS:11243182025-12-24T14:19:06Z2025-12-24T14:19:06Zby Oppliger, Rolf, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4821279">Click to View</a><br/>Format: Elektronik Kaynak<br/>Zabbix network monitoring essentials : your one-stop solution to efficient network monitoring with zabbixent://SD_ILS/0/SD_ILS:10460482025-12-24T14:19:06Z2025-12-24T14:19:06Zby Vacche, Andrea Dalle, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1973849">Click to View</a><br/>Format: Elektronik Kaynak<br/>Learning iOS security : enhance the security of your iOS platform and applications using iOS-centric security techniquesent://SD_ILS/0/SD_ILS:10460592025-12-24T14:19:06Z2025-12-24T14:19:06Zby Banks, Allister, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1973863">Click to View</a><br/>Format: Elektronik Kaynak<br/>Understanding bitcoin : cryptography, engineering and economics.ent://SD_ILS/0/SD_ILS:10401802025-12-24T14:19:06Z2025-12-24T14:19:06Zby Franco, Pedro, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1823060">Click to View</a><br/>Format: Elektronik Kaynak<br/>Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtuallyent://SD_ILS/0/SD_ILS:10281452025-12-24T14:19:06Z2025-12-24T14:19:06Zby Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1644005">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer forensics with FTK : enhance your computer forensics knowledge through illustrations, tips, tricks, and practical real-world scenariosent://SD_ILS/0/SD_ILS:10291072025-12-24T14:19:06Z2025-12-24T14:19:06Zby Carbone, Fernando, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1657797">Click to View</a><br/>Format: Elektronik Kaynak<br/>Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanningent://SD_ILS/0/SD_ILS:10361782025-12-24T14:19:06Z2025-12-24T14:19:06Zby Hutchens, Justin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1771381">Click to View</a><br/>Format: Elektronik Kaynak<br/>Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013ent://SD_ILS/0/SD_ILS:10350102025-12-24T14:19:06Z2025-12-24T14:19:06Zby Ginodman, Veniamin, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1752831">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cryptography for security and privacy in cloud computingent://SD_ILS/0/SD_ILS:10209882025-12-24T14:19:06Z2025-12-24T14:19:06Zby Rass, Stefan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1463547">Click to View</a><br/>Format: Elektronik Kaynak<br/>SolarWinds Server & Application Monitor : deployment and administration : an intuitive guide to implementing and calibrating SolarWinds Server & Application Monitor with minimum hassleent://SD_ILS/0/SD_ILS:10246212025-12-24T14:19:06Z2025-12-24T14:19:06Zby Brant, Justin M.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1582950">Click to View</a><br/>Format: Elektronik Kaynak<br/>Instant Spring Security starter learn the fundamentals of web authentication and authorization using Spring Securityent://SD_ILS/0/SD_ILS:10162682025-12-24T14:19:06Z2025-12-24T14:19:06Zby Jagielski, Piotr.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1274894">Click to View</a><br/>Format: Elektronik Kaynak<br/>Windows 2012 server network security securing your windows network systems and infrastructureent://SD_ILS/0/SD_ILS:10076102025-12-24T14:19:06Z2025-12-24T14:19:06Zby Rountree, Derrick.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115160">Click to View</a><br/>Format: Elektronik Kaynak<br/>Professional penetration testing creating and learning in a hacking labent://SD_ILS/0/SD_ILS:10076162025-12-24T14:19:06Z2025-12-24T14:19:06Zby Wilhelm, Thomas.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115172">Click to View</a><br/>Format: Elektronik Kaynak<br/>Web penetration testing with Kali Linux : a practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linuxent://SD_ILS/0/SD_ILS:10200472025-12-24T14:19:06Z2025-12-24T14:19:06Zby Muniz, Joseph.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1420531">Click to View</a><br/>Format: Elektronik Kaynak<br/>IBM WebSphere application server V7.0 security secure your WebSphere applications with Java EE and JAAS security standardsent://SD_ILS/0/SD_ILS:9962602025-12-24T14:19:06Z2025-12-24T14:19:06Zby Siliceo, Omar.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=943983">Click to View</a><br/>Format: Elektronik Kaynak<br/>WordPress 3 ultimate security protect your WordPress site and its networkent://SD_ILS/0/SD_ILS:9967892025-12-24T14:19:06Z2025-12-24T14:19:06Zby Connelly, Olly.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948509">Click to View</a><br/>Format: Elektronik Kaynak<br/>CMS security handbook the comprehensive guide for WordPress, Joomla!, Drupal, and Ploneent://SD_ILS/0/SD_ILS:9790052025-12-24T14:19:06Z2025-12-24T14:19:06Zby Canavan, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706893">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:9556372025-12-24T14:19:06Z2025-12-24T14:19:06Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=453166">Click to View</a><br/>Format: Elektronik Kaynak<br/>Fuzzing for software security testing and quality assuranceent://SD_ILS/0/SD_ILS:9563292025-12-24T14:19:06Z2025-12-24T14:19:06Zby Takanen, Ari.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456884">Click to View</a><br/>Format: Elektronik Kaynak<br/>Toward a safer and more secure cyberspaceent://SD_ILS/0/SD_ILS:10854522025-12-24T14:19:06Z2025-12-24T14:19:06Zby Goodman, Seymour E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3378311">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security in distributed and networking systemsent://SD_ILS/0/SD_ILS:10138972025-12-24T14:19:06Z2025-12-24T14:19:06Zby Pan, Yi, 1960-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1193126">Click to View</a><br/>Format: Elektronik Kaynak<br/>How to cheat at designing security for a Windows Server 2003 networkent://SD_ILS/0/SD_ILS:9338562025-12-24T14:19:06Z2025-12-24T14:19:06Zby Amini, Rob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254832">Click to View</a><br/>Format: Elektronik Kaynak<br/>Securing IM and P2P applications for the enterpriseent://SD_ILS/0/SD_ILS:9338712025-12-24T14:19:06Z2025-12-24T14:19:06Zby Piccard, Paul L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254847">Click to View</a><br/>Format: Elektronik Kaynak<br/>z/OS 1.6 security services updateent://SD_ILS/0/SD_ILS:10751482025-12-24T14:19:06Z2025-12-24T14:19:06Zby Kappeler, Patrick.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306453">Click to View</a><br/>Format: Elektronik Kaynak<br/>WebSphere application server for z/OS V5 and J2EE 1.3 security handbookent://SD_ILS/0/SD_ILS:10750772025-12-24T14:19:06Z2025-12-24T14:19:06Zby Allison, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306382">Click to View</a><br/>Format: Elektronik Kaynak<br/>Distributed security and high availability with Tivoli Access Manager and WebSphere Application Server for z/OSent://SD_ILS/0/SD_ILS:10752972025-12-24T14:19:06Z2025-12-24T14:19:06Zby Davies, Saida.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306602">Click to View</a><br/>Format: Elektronik Kaynak<br/>IBM system z9 109 technical introductionent://SD_ILS/0/SD_ILS:10752772025-12-24T14:19:06Z2025-12-24T14:19:06Zby Ogden, Bill.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306582">Click to View</a><br/>Format: Elektronik Kaynak<br/>z/OS diagnostic data collection and analysisent://SD_ILS/0/SD_ILS:10754652025-12-24T14:19:06Z2025-12-24T14:19:06Zby Rogers, Paul.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306770">Click to View</a><br/>Format: Elektronik Kaynak<br/>Internet applications the emerging global computer.ent://SD_ILS/0/SD_ILS:10920462025-12-24T14:19:06Z2025-12-24T14:19:06Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411450">Click to View</a><br/>Format: Elektronik Kaynak<br/>Z/OS WebSphere and J2EE security handbookent://SD_ILS/0/SD_ILS:10753152025-12-24T14:19:06Z2025-12-24T14:19:06Zby Wunderlich, Holger.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306620">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security configuration in a TCP/IP Sysplex environmentent://SD_ILS/0/SD_ILS:10753562025-12-24T14:19:06Z2025-12-24T14:19:06Zby Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306661">Click to View</a><br/>Format: Elektronik Kaynak<br/>Enterprise business portals II with IBM tivoli access managerent://SD_ILS/0/SD_ILS:10754522025-12-24T14:19:06Z2025-12-24T14:19:06Zby Bücker, Axel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306757">Click to View</a><br/>Format: Elektronik Kaynak<br/>Special ops host and Network security for Microsoft, UNIX, and Oracleent://SD_ILS/0/SD_ILS:9395772025-12-24T14:19:06Z2025-12-24T14:19:06Zby Birkholz, Erik Pace.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294373">Click to View</a><br/>Format: Elektronik Kaynak<br/>The practice of network security monitoring : understanding incident detection and responseent://SD_ILS/0/SD_ILS:10234572025-12-24T14:19:06Z2025-12-24T14:19:06Zby Bejtlich, Richard.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572876">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking web apps detecting and preventing web application security problemsent://SD_ILS/0/SD_ILS:10003712025-12-24T14:19:06Z2025-12-24T14:19:06Zby Shema, Mike.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1012529">Click to View</a><br/>Format: Elektronik Kaynak<br/>Intrusion detection a machine learning approachent://SD_ILS/0/SD_ILS:9811612025-12-24T14:19:06Z2025-12-24T14:19:06Zby Tsai, Jeffrey J.-P.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=737642">Click to View</a><br/>Format: Elektronik Kaynak<br/>Use of risk analysis in computer-aided persuasionent://SD_ILS/0/SD_ILS:9883622025-12-24T14:19:06Z2025-12-24T14:19:06Zby Duman, Ekrem.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=836226">Click to View</a><br/>Format: Elektronik Kaynak<br/>Securing information and communications systems principles, technologies, and applicationsent://SD_ILS/0/SD_ILS:9563262025-12-24T14:19:06Z2025-12-24T14:19:06Zby Furnell, Steven, 1970-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456881">Click to View</a><br/>Format: Elektronik Kaynak<br/>Aspects of network and information securityent://SD_ILS/0/SD_ILS:9471472025-12-24T14:19:06Z2025-12-24T14:19:06Zby NATO Advanced Study Institute on Network Security and Intrusion Detection (2005 : Yerevan, Armenia)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=363205">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information assurance dependability and security in networked systemsent://SD_ILS/0/SD_ILS:9440162025-12-24T14:19:06Z2025-12-24T14:19:06Zby Qian, Yi, 1962-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328312">Click to View</a><br/>Format: Elektronik Kaynak<br/>Nessus, Snort, & Ethereal power tools customizing open source security applicationsent://SD_ILS/0/SD_ILS:9338632025-12-24T14:19:06Z2025-12-24T14:19:06Zby Archibald, Neil.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254839">Click to View</a><br/>Format: Elektronik Kaynak<br/>Implementing SSH strategies for optimizing the Secure Shellent://SD_ILS/0/SD_ILS:9297212025-12-24T14:19:06Z2025-12-24T14:19:06Zby Dwivedi, Himanshu.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=215119">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cisco security professional's guide to secure intrusion detection systemsent://SD_ILS/0/SD_ILS:11884082025-12-24T14:19:06Z2025-12-24T14:19:06Zby Burton, James.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266696">http://www.sciencedirect.com/science/book/9781932266696</a><br/>Format: Elektronik Kaynak<br/>Firewall policies and VPN configurationsent://SD_ILS/0/SD_ILS:11882702025-12-24T14:19:06Z2025-12-24T14:19:06Zby Henmi, Anne.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490887">https://www.sciencedirect.com/science/book/9781597490887</a><br/>Format: Elektronik Kaynak<br/>Insider threat : protecting the enterprise from sabotage, spying, and theftent://SD_ILS/0/SD_ILS:11882592025-12-24T14:19:06Z2025-12-24T14:19:06Zby Cole, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format: Elektronik Kaynak<br/>Security sage's guide to hardening the network infrastructureent://SD_ILS/0/SD_ILS:11883642025-12-24T14:19:06Z2025-12-24T14:19:06Zby Andrés, Steven.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836012">https://www.sciencedirect.com/science/book/9781931836012</a><br/>Format: Elektronik Kaynak<br/>Hack proofing your wireless networkent://SD_ILS/0/SD_ILS:11884872025-12-24T14:19:06Z2025-12-24T14:19:06Zby Barnes, Christian.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994596">http://www.sciencedirect.com/science/book/9781928994596</a><br/>Format: Elektronik Kaynak<br/>Asset protection through security awarenessent://SD_ILS/0/SD_ILS:9874512025-12-24T14:19:06Z2025-12-24T14:19:06Zby Speed, Tyler Justin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826927">Click to View</a><br/>Format: Elektronik Kaynak<br/>How to cheat at securing Linuxent://SD_ILS/0/SD_ILS:11891062025-12-24T14:19:06Z2025-12-24T14:19:06Zby Krishnamurthy Madwachar, Mohan.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492072">https://www.sciencedirect.com/science/book/9781597492072</a><br/>Format: Elektronik Kaynak<br/>Botnets : the killer web appent://SD_ILS/0/SD_ILS:11864442025-12-24T14:19:06Z2025-12-24T14:19:06Zby Schiller, Craig A.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491358">https://www.sciencedirect.com/science/book/9781597491358</a><br/>Format: Elektronik Kaynak<br/>How to cheat at designing security for a Windows Server 2003 networkent://SD_ILS/0/SD_ILS:11882812025-12-24T14:19:06Z2025-12-24T14:19:06Zby Amini, Rob.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492430">https://www.sciencedirect.com/science/book/9781597492430</a><br/>Format: Elektronik Kaynak<br/>Nessus, Snort, & Ethereal power tools : customizing open source security applicationsent://SD_ILS/0/SD_ILS:11882472025-12-24T14:19:06Z2025-12-24T14:19:06Zby Archibald, Neil.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490207">http://www.sciencedirect.com/science/book/9781597490207</a><br/>Format: Elektronik Kaynak<br/>Configuring Check Point NGX VPN-1/fire wall-ent://SD_ILS/0/SD_ILS:11882502025-12-24T14:19:06Z2025-12-24T14:19:06Zby Stephens, Robert.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490313">http://www.sciencedirect.com/science/book/9781597490313</a><br/>Format: Elektronik Kaynak<br/>Ethereal : packet sniffingent://SD_ILS/0/SD_ILS:11884112025-12-24T14:19:06Z2025-12-24T14:19:06Zby Orebaugh, Angela.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266825">http://www.sciencedirect.com/science/book/9781932266825</a><br/>Format: Elektronik Kaynak<br/>Managing and securing a Cisco structured wireless-aware networkent://SD_ILS/0/SD_ILS:11884152025-12-24T14:19:06Z2025-12-24T14:19:06Zby Wall, David.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781932266917">https://www.sciencedirect.com/science/book/9781932266917</a><br/>Format: Elektronik Kaynak<br/>The tangled Web a guide to securing modern Web applicationsent://SD_ILS/0/SD_ILS:10099762025-12-24T14:19:06Z2025-12-24T14:19:06Zby Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137574">Click to View</a><br/>Format: Elektronik Kaynak<br/>Disappearing cryptography : information hiding : steganography & watermarkingent://SD_ILS/0/SD_ILS:11920502025-12-24T14:19:06Z2025-12-24T14:19:06Zby Wayner, Peter, 1964-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123744791">https://www.sciencedirect.com/science/book/9780123744791</a><br/>Format: Elektronik Kaynak<br/>Network security : know it allent://SD_ILS/0/SD_ILS:11892572025-12-24T14:19:06Z2025-12-24T14:19:06Zby Joshi, James B. D.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123744630">http://www.sciencedirect.com/science/book/9780123744630</a><br/>Format: Elektronik Kaynak<br/>Information assurance : dependability and security in networked systemsent://SD_ILS/0/SD_ILS:11891952025-12-24T14:19:06Z2025-12-24T14:19:06Zby Qian, Yi, 1962-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123735669">https://www.sciencedirect.com/science/book/9780123735669</a><br/>Format: Elektronik Kaynak<br/>How to cheat at securing your networkent://SD_ILS/0/SD_ILS:11899832025-12-24T14:19:06Z2025-12-24T14:19:06Zby Dubrawsky, Ido.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492317">https://www.sciencedirect.com/science/book/9781597492317</a><br/>Format: Elektronik Kaynak<br/>Developer's guide to web application securityent://SD_ILS/0/SD_ILS:11863712025-12-24T14:19:06Z2025-12-24T14:19:06Zby Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format: Elektronik Kaynak<br/>How to cheat at configuring Open Source security toolsent://SD_ILS/0/SD_ILS:11864652025-12-24T14:19:06Z2025-12-24T14:19:06Zby Alder, Raven.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491709">http://www.sciencedirect.com/science/book/9781597491709</a><br/>Format: Elektronik Kaynak<br/>Integrated security systems design : concepts, specifications, and implementationent://SD_ILS/0/SD_ILS:11879972025-12-24T14:19:06Z2025-12-24T14:19:06Zby Norman, Thomas L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679091">http://www.sciencedirect.com/science/book/9780750679091</a><br/>Format: Elektronik Kaynak<br/>Designing and building enterprise DMZsent://SD_ILS/0/SD_ILS:11882722025-12-24T14:19:06Z2025-12-24T14:19:06Zby Dubrawsky, Ido.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491006">http://www.sciencedirect.com/science/book/9781597491006</a><br/>Format: Elektronik Kaynak<br/>Security log management : identifying patterns in the chaosent://SD_ILS/0/SD_ILS:11882572025-12-24T14:19:06Z2025-12-24T14:19:06Zby Babbin, Jacob.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490429">http://www.sciencedirect.com/science/book/9781597490429</a><br/>Format: Elektronik Kaynak<br/>Network security : a practical approachent://SD_ILS/0/SD_ILS:11853532025-12-24T14:19:06Z2025-12-24T14:19:06Zby Harrington, Jan L.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123116338">https://www.sciencedirect.com/science/book/9780123116338</a><br/>Format: Elektronik Kaynak<br/>Physical security for ITent://SD_ILS/0/SD_ILS:11881102025-12-24T14:19:06Z2025-12-24T14:19:06Zby Erbschloe, Michael, 1951-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583279">http://www.sciencedirect.com/science/book/9781555583279</a><br/>Format: Elektronik Kaynak<br/>Hacking a terror network : the silent threat of covert channelsent://SD_ILS/0/SD_ILS:11883632025-12-24T14:19:06Z2025-12-24T14:19:06Zby Rogers, Russ.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994985">https://www.sciencedirect.com/science/book/9781928994985</a><br/>Format: Elektronik Kaynak<br/>Snort 2.1 intrusion detectionent://SD_ILS/0/SD_ILS:11883662025-12-24T14:19:06Z2025-12-24T14:19:06Zby Beale, Jay.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836043">https://www.sciencedirect.com/science/book/9781931836043</a><br/>Format: Elektronik Kaynak<br/>Disappearing cryptography : information hiding : steganography & watermarkingent://SD_ILS/0/SD_ILS:11881692025-12-24T14:19:06Z2025-12-24T14:19:06Zby Wayner, Peter, 1964-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607699">http://www.sciencedirect.com/science/book/9781558607699</a><br/>Format: Elektronik Kaynak<br/>Nokia network security solutions handbookent://SD_ILS/0/SD_ILS:11883862025-12-24T14:19:06Z2025-12-24T14:19:06Zby Maxwell, Doug.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836708">http://www.sciencedirect.com/science/book/9781931836708</a><br/>Format: Elektronik Kaynak<br/>Managing Cisco network securityent://SD_ILS/0/SD_ILS:11884932025-12-24T14:19:06Z2025-12-24T14:19:06Zby Knipp, Eric.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836562">https://www.sciencedirect.com/science/book/9781931836562</a><br/>Format: Elektronik Kaynak<br/>Cisco router and switch forensics : investigating and analyzing malicious network activityent://SD_ILS/0/SD_ILS:11928002025-12-24T14:19:06Z2025-12-24T14:19:06Zby Liu, Dale.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494182">https://www.sciencedirect.com/science/book/9781597494182</a><br/>Format: Elektronik Kaynak<br/>Snort : IDS and IPS toolkitent://SD_ILS/0/SD_ILS:11882712025-12-24T14:19:06Z2025-12-24T14:19:06Zby Beale, Jay.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490993">https://www.sciencedirect.com/science/book/9781597490993</a><br/>Format: Elektronik Kaynak<br/>AVIEN malware defense guide for the Enterpriseent://SD_ILS/0/SD_ILS:11891042025-12-24T14:19:06Z2025-12-24T14:19:06Zby Harley, David.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491648">https://www.sciencedirect.com/science/book/9781597491648</a><br/>Format: Elektronik Kaynak<br/>ISA server and beyond : real world security solutions for Microsoft enterprise networksent://SD_ILS/0/SD_ILS:11884952025-12-24T14:19:06Z2025-12-24T14:19:06Zby Shinder, Thomas W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836661">http://www.sciencedirect.com/science/book/9781931836661</a><br/>Format: Elektronik Kaynak<br/>Hack the stack : using snort and ethereal to master the 8 layers of an insecure networkent://SD_ILS/0/SD_ILS:11864272025-12-24T14:19:06Z2025-12-24T14:19:06Zby Gregg, Michael (Michael C.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">http://www.sciencedirect.com/science/book/9781597491099</a><br/>Format: Elektronik Kaynak<br/>Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasuresent://SD_ILS/0/SD_ILS:11864392025-12-24T14:19:06Z2025-12-24T14:19:06Zby Contos, Brian T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491297">https://www.sciencedirect.com/science/book/9781597491297</a><br/>Format: Elektronik Kaynak<br/>Hack proofing your networkent://SD_ILS/0/SD_ILS:11883572025-12-24T14:19:06Z2025-12-24T14:19:06Zby Ahmad, David R. Mirza.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994701">https://www.sciencedirect.com/science/book/9781928994701</a><br/>Format: Elektronik Kaynak<br/>Learning Nessus for penetration testing.ent://SD_ILS/0/SD_ILS:10235072025-12-24T14:19:06Z2025-12-24T14:19:06Zby Kumar, Himanshu.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572937">Click to View</a><br/>Format: Elektronik Kaynak<br/>Understanding security issuesent://SD_ILS/0/SD_ILS:11325292025-12-24T14:19:06Z2025-12-24T14:19:06Zby Donaldson, Scott E., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5157542">Click to View</a><br/>Format: Elektronik Kaynak<br/>Smart cities cybersecurity and privacyent://SD_ILS/0/SD_ILS:11438492025-12-24T14:19:06Z2025-12-24T14:19:06Zby Kayhan Zrar Ghafoor, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5609779">Click to View</a><br/>Format: Elektronik Kaynak<br/>Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviorsent://SD_ILS/0/SD_ILS:11462142025-12-24T14:19:06Z2025-12-24T14:19:06Zby Carpenter, Perry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5763515">Click to View</a><br/>Format: Elektronik Kaynak<br/>The business of cybersecurity : foundations and ideologiesent://SD_ILS/0/SD_ILS:11463812025-12-24T14:19:06Z2025-12-24T14:19:06Zby Sathnur, Ashwini, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5770273">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security and resilience in intelligent data-centric systems and communication networksent://SD_ILS/0/SD_ILS:11301612025-12-24T14:19:06Z2025-12-24T14:19:06Zby Ficco, Massimo, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5090270">Click to View</a><br/>Format: Elektronik Kaynak<br/>Practical industrial internet of things security : a practitioner's guide to securing connected industriesent://SD_ILS/0/SD_ILS:11414742025-12-24T14:19:06Z2025-12-24T14:19:06Zby Bhattacharjee, Sravani, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5495617">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cloud security automation : get to grips with automating your cloud security on AWS and OpenStackent://SD_ILS/0/SD_ILS:11366912025-12-24T14:19:06Z2025-12-24T14:19:06Zby Priyam, Prashant, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5332125">Click to View</a><br/>Format: Elektronik Kaynak<br/>Enterprise cloud security and governance : efficiently set data protection and privacy principlesent://SD_ILS/0/SD_ILS:11338402025-12-24T14:19:06Z2025-12-24T14:19:06Zby Vora, Zeal, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5216128">Click to View</a><br/>Format: Elektronik Kaynak<br/>Mastering Kali Linux for web penetration testing : test and evaluate all aspects of the design and implentationent://SD_ILS/0/SD_ILS:11277352025-12-24T14:19:06Z2025-12-24T14:19:06Zby McPhee, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4891263">Click to View</a><br/>Format: Elektronik Kaynak<br/>Building a practical information security programent://SD_ILS/0/SD_ILS:11193582025-12-24T14:19:06Z2025-12-24T14:19:06Zby Andress, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4711748">Click to View</a><br/>Format: Elektronik Kaynak<br/>Troubleshooting OpenVPN : get the solutions you need to troubleshoot any issue you may face to keep your OpenVPN up and runningent://SD_ILS/0/SD_ILS:11245492025-12-24T14:19:06Z2025-12-24T14:19:06Zby Crist, Eric F., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4826446">Click to View</a><br/>Format: Elektronik Kaynak<br/>IT-Sicherheitsanalysen : Ein prozessorientiertes Vorgehensmodellent://SD_ILS/0/SD_ILS:11247972025-12-24T14:19:06Z2025-12-24T14:19:06Zby Simić, Daniela, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4830572">Click to View</a><br/>Format: Elektronik Kaynak<br/>IoT security issuesent://SD_ILS/0/SD_ILS:11235192025-12-24T14:19:06Z2025-12-24T14:19:06Zby Gilchrist, Alasdair, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4810138">Click to View</a><br/>Format: Elektronik Kaynak<br/>Advanced penetration testing : hacking the world's most secure networksent://SD_ILS/0/SD_ILS:11237222025-12-24T14:19:06Z2025-12-24T14:19:06Zby Allsopp, Wil, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4813145">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber security awareness for CEOs and managementent://SD_ILS/0/SD_ILS:11045662025-12-24T14:19:06Z2025-12-24T14:19:06Zby Willson, David, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4189279">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network performance and security : testing and analyzing using open source and low-cost toolsent://SD_ILS/0/SD_ILS:11090632025-12-24T14:19:06Z2025-12-24T14:19:06Zby Chapman, Chris, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4452265">Click to View</a><br/>Format: Elektronik Kaynak<br/>PCI compliance : understand and implement effective PCI data security standard complianceent://SD_ILS/0/SD_ILS:10405702025-12-24T14:19:06Z2025-12-24T14:19:06Zby Williams, Branden R., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1832710">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network attacks & exploitation : a frameworkent://SD_ILS/0/SD_ILS:11031442025-12-24T14:19:06Z2025-12-24T14:19:06Zby Monte, Matthew, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040351">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information security breaches : avoidance and treatment based on ISO27001ent://SD_ILS/0/SD_ILS:10370822025-12-24T14:19:06Z2025-12-24T14:19:06Zby Krausz, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778763">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking with Kali : practical penetration testing techniquesent://SD_ILS/0/SD_ILS:10076192025-12-24T14:19:06Z2025-12-24T14:19:06Zby Broad, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115177">Click to View</a><br/>Format: Elektronik Kaynak<br/>The benefits and security risks of web-based applications for business trend reportent://SD_ILS/0/SD_ILS:10147332025-12-24T14:19:06Z2025-12-24T14:19:06Zby Kotwica, Kathleen.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1210948">Click to View</a><br/>Format: Elektronik Kaynak<br/>Pragmatic security metrics applying metametrics to information securityent://SD_ILS/0/SD_ILS:10109722025-12-24T14:19:06Z2025-12-24T14:19:06Zby Brotby, W. Krag.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1153198">Click to View</a><br/>Format: Elektronik Kaynak<br/>Microsoft DirectAccess best practices and troubleshootingent://SD_ILS/0/SD_ILS:10192612025-12-24T14:19:06Z2025-12-24T14:19:06Zby Krause, Jordan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1389355">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security for service oriented systemsent://SD_ILS/0/SD_ILS:9723452025-12-24T14:19:06Z2025-12-24T14:19:06Zby Thuraisingham, Bhavani M.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=631696">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security the human factorent://SD_ILS/0/SD_ILS:9730592025-12-24T14:19:06Z2025-12-24T14:19:06Zby Kearney, Paul.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=647939">Click to View</a><br/>Format: Elektronik Kaynak<br/>Managing information securityent://SD_ILS/0/SD_ILS:10183422025-12-24T14:19:06Z2025-12-24T14:19:06Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1357643">Click to View</a><br/>Format: Elektronik Kaynak<br/>Build your own security lab a field guide for network testingent://SD_ILS/0/SD_ILS:9470742025-12-24T14:19:06Z2025-12-24T14:19:06Zby Gregg, Michael (Michael C.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=362050">Click to View</a><br/>Format: Elektronik Kaynak<br/>Configuring NetScreen Firewallsent://SD_ILS/0/SD_ILS:9394612025-12-24T14:19:06Z2025-12-24T14:19:06Zby Cameron, Rob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294055">Click to View</a><br/>Format: Elektronik Kaynak<br/>Virtual private networking a construction, operation and utilization guideent://SD_ILS/0/SD_ILS:9587982025-12-24T14:19:06Z2025-12-24T14:19:06Zby Held, Gilbert, 1943-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=470565">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber adversary characterization auditing the hacker mindent://SD_ILS/0/SD_ILS:9394692025-12-24T14:19:06Z2025-12-24T14:19:06Zby Parker, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294071">Click to View</a><br/>Format: Elektronik Kaynak<br/>Nessus network auditingent://SD_ILS/0/SD_ILS:9395402025-12-24T14:19:06Z2025-12-24T14:19:06Zby Beale, Jay.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294281">Click to View</a><br/>Format: Elektronik Kaynak<br/>Best damn firewall book periodent://SD_ILS/0/SD_ILS:9395852025-12-24T14:19:06Z2025-12-24T14:19:06Zby Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294396">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity operations handbookent://SD_ILS/0/SD_ILS:9426132025-12-24T14:19:06Z2025-12-24T14:19:06Zby Rittinghouse, John W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=313612">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hack proofing your wireless networkent://SD_ILS/0/SD_ILS:9395072025-12-24T14:19:06Z2025-12-24T14:19:06Zby Owens, Les.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294161">Click to View</a><br/>Format: Elektronik Kaynak<br/>A technical guide to IPSec virtual private networksent://SD_ILS/0/SD_ILS:10476252025-12-24T14:19:06Z2025-12-24T14:19:06Zby Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2010400">Click to View</a><br/>Format: Elektronik Kaynak<br/>Empirical research for software security : foundations and experienceent://SD_ILS/0/SD_ILS:11329732025-12-24T14:19:06Z2025-12-24T14:19:06Zby ben Othmane, Lotfi, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5164090">Click to View</a><br/>Format: Elektronik Kaynak<br/>Kali linux wireless penetration testing cookbook : identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless securityent://SD_ILS/0/SD_ILS:11334342025-12-24T14:19:06Z2025-12-24T14:19:06Zby Oriyano, Sean-Philip, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5188228">Click to View</a><br/>Format: Elektronik Kaynak<br/>Kali Linux intrusion and exploitation cookbook : over 70 recipes for system administrator or DevOps to master Kali Linux 2 and perform effective security assessmentent://SD_ILS/0/SD_ILS:11255492025-12-24T14:19:06Z2025-12-24T14:19:06Zby Shah, Dhruv, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4845574">Click to View</a><br/>Format: Elektronik Kaynak<br/>Critical infrastructure protection in homeland security : defending a networked nationent://SD_ILS/0/SD_ILS:10396662025-12-24T14:19:06Z2025-12-24T14:19:06Zby Lewis, T. G. (Theodore Gyle), 1941- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1813343">Click to View</a><br/>Format: Elektronik Kaynak<br/>Mastering metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approachent://SD_ILS/0/SD_ILS:10253642025-12-24T14:19:06Z2025-12-24T14:19:06Zby Jaswal, Nipun, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1593853">Click to View</a><br/>Format: Elektronik Kaynak<br/>Threat modeling : designing for securityent://SD_ILS/0/SD_ILS:10270482025-12-24T14:19:06Z2025-12-24T14:19:06Zby Shostack, Adam.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629177">Click to View</a><br/>Format: Elektronik Kaynak<br/>The true cost of information security breaches and cyber crimeent://SD_ILS/0/SD_ILS:10212732025-12-24T14:19:06Z2025-12-24T14:19:06Zby Krausz, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1477418">Click to View</a><br/>Format: Elektronik Kaynak<br/>Mobile access safety beyond BYODent://SD_ILS/0/SD_ILS:10084142025-12-24T14:19:06Z2025-12-24T14:19:06Zby Assing, Dominique.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1124007">Click to View</a><br/>Format: Elektronik Kaynak<br/>Enterprise information security and privacyent://SD_ILS/0/SD_ILS:9563312025-12-24T14:19:06Z2025-12-24T14:19:06Zby Axelrod, C. Warren.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456886">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information security and employee behaviour how to reduce risk through employee education, training and awarenessent://SD_ILS/0/SD_ILS:9518692025-12-24T14:19:06Z2025-12-24T14:19:06Zby McIlwraith, Angus.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=429792">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security for mobile networks and platformsent://SD_ILS/0/SD_ILS:9452042025-12-24T14:19:06Z2025-12-24T14:19:06Zby Aissi, Selim.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338731">Click to View</a><br/>Format: Elektronik Kaynak<br/>Configuring SonicWALL firewallsent://SD_ILS/0/SD_ILS:11882822025-12-24T14:19:06Z2025-12-24T14:19:06Zby Bendell, Dan.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492508">http://www.sciencedirect.com/science/book/9781597492508</a><br/>Format: Elektronik Kaynak<br/>Configuring Check Point NGX VPN-1/FireWall-1ent://SD_ILS/0/SD_ILS:9343582025-12-24T14:19:06Z2025-12-24T14:19:06Zby Stephens, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=258633">Click to View</a><br/>Format: Elektronik Kaynak<br/>Lotus security handbookent://SD_ILS/0/SD_ILS:10755332025-12-24T14:19:06Z2025-12-24T14:19:06Zby Tworek, William.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306838">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network and security issues for internet mobile entertainmentent://SD_ILS/0/SD_ILS:9385962025-12-24T14:19:06Z2025-12-24T14:19:06Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=289848">Click to View</a><br/>Format: Elektronik Kaynak<br/>Outsourcing information securityent://SD_ILS/0/SD_ILS:9310182025-12-24T14:19:06Z2025-12-24T14:19:06Zby Axelrod, C. Warren.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227659">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network security a practical guideent://SD_ILS/0/SD_ILS:9403342025-12-24T14:19:06Z2025-12-24T14:19:06Zby Poole, Owen.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=298471">Click to View</a><br/>Format: Elektronik Kaynak<br/>Comprehensive approach as 'sine qua non' for critical infrastructure protectionent://SD_ILS/0/SD_ILS:10448572025-12-24T14:19:06Z2025-12-24T14:19:06Zby Čaleta, Denis, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1920288">Click to View</a><br/>Format: Elektronik Kaynak<br/>Terrorist use of cyberspace and cyber terrorism : new challenges and reponsesent://SD_ILS/0/SD_ILS:11156412025-12-24T14:19:06Z2025-12-24T14:19:06Z<a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4659193">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber security and resiliency policy frameworkent://SD_ILS/0/SD_ILS:10398772025-12-24T14:19:06Z2025-12-24T14:19:06Zby Vaseashta, A. (Ashok), editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1818046">Click to View</a><br/>Format: Elektronik Kaynak<br/>Examining robustness and vulnerability of networked systemsent://SD_ILS/0/SD_ILS:10334292025-12-24T14:19:06Z2025-12-24T14:19:06Zby Butenko, Sergiy, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1720838">Click to View</a><br/>Format: Elektronik Kaynak<br/>Risk propagation assessment for network security application to airport communication network designent://SD_ILS/0/SD_ILS:10120962025-12-24T14:19:06Z2025-12-24T14:19:06Zby Ben Mahmoud, Mohamed Slim.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1168523">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information security a manager's guide to thwarting data thieves and hackersent://SD_ILS/0/SD_ILS:9452882025-12-24T14:19:06Z2025-12-24T14:19:06Zby Alexander, Philip, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=339307">Click to View</a><br/>Format: Elektronik Kaynak<br/>The misuse of information systems the impact of security countermeasuresent://SD_ILS/0/SD_ILS:10580442025-12-24T14:19:06Z2025-12-24T14:19:06Zby D'Arcy, John P., 1975-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3016826">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyberwar-Netwar security in the information ageent://SD_ILS/0/SD_ILS:9352162025-12-24T14:19:06Z2025-12-24T14:19:06Zby NATO Advanced Research Workshop on Cyberwar-Netwar: Security in the Information Age (2003 : Lisbon, Portugal)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=267716">Click to View</a><br/>Format: Elektronik Kaynak<br/>Advances in network and distributed systems security IFIP TC11 WG11.4 First Annual Working Conference on Network Security : November 26-27, 2001, Leuven, Belgiument://SD_ILS/0/SD_ILS:10623432025-12-24T14:19:06Z2025-12-24T14:19:06Zby IFIP TC11 WG11.4 Working Conference on Network Security (1st : 2001 : Louvain, Belgium)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3035322">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity public sector threats and responsesent://SD_ILS/0/SD_ILS:9874582025-12-24T14:19:06Z2025-12-24T14:19:06Zby Andreasson, Kim J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826942">Click to View</a><br/>Format: Elektronik Kaynak<br/>Applied cyber security and the smart grid implementing security controls into the modern power infrastructureent://SD_ILS/0/SD_ILS:10076262025-12-24T14:19:06Z2025-12-24T14:19:06Zby Knapp, Eric D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115187">Click to View</a><br/>Format: Elektronik Kaynak<br/>Asterisk hacking.ent://SD_ILS/0/SD_ILS:11885822025-12-24T14:19:06Z2025-12-24T14:19:06Zby Brashars, Joshua.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491518">http://www.sciencedirect.com/science/book/9781597491518</a><br/>Format: Elektronik Kaynak<br/>Ninja hacking : unconventional penetration testing tactics and techniquesent://SD_ILS/0/SD_ILS:11818282025-12-24T14:19:06Z2025-12-24T14:19:06Zby Wilhelm, Thomas.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495882">http://www.sciencedirect.com/science/book/9781597495882</a><br/>Format: Elektronik Kaynak<br/>Network security evaluation using the NSA IEMent://SD_ILS/0/SD_ILS:11882522025-12-24T14:19:06Z2025-12-24T14:19:06Zby Rogers, Russ.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490351">http://www.sciencedirect.com/science/book/9781597490351</a><br/>Format: Elektronik Kaynak<br/>Check Point Next Generation with application intelligence security administrationent://SD_ILS/0/SD_ILS:11884142025-12-24T14:19:06Z2025-12-24T14:19:06Zby Tobkin, Chris.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781932266894">https://www.sciencedirect.com/science/book/9781932266894</a><br/>Format: Elektronik Kaynak<br/>Information security best practices : 205 basic rulesent://SD_ILS/0/SD_ILS:11883182025-12-24T14:19:06Z2025-12-24T14:19:06Zby Stefanek, George L.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781878707963">https://www.sciencedirect.com/science/book/9781878707963</a><br/>Format: Elektronik Kaynak<br/>CCNA security study guide : exam 210-260ent://SD_ILS/0/SD_ILS:11338212025-12-24T14:19:06Z2025-12-24T14:19:06Zby McMillan, Troy, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5215616">Click to View</a><br/>Format: Elektronik Kaynak<br/>Puppet reporting and monitoring : create insightful reports for your server infrastructure using Puppetent://SD_ILS/0/SD_ILS:10281462025-12-24T14:19:06Z2025-12-24T14:19:06Zby Duffy, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1644006">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security of self-organizing networks MANET, WSN, WMN, VANETent://SD_ILS/0/SD_ILS:9691242025-12-24T14:19:06Z2025-12-24T14:19:06Zby Pathan, Al-Sakib Khan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=599718">Click to View</a><br/>Format: Elektronik Kaynak<br/>How to cheat at securing a wireless networkent://SD_ILS/0/SD_ILS:9366442025-12-24T14:19:06Z2025-12-24T14:19:06Zby Hurley, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=274288">Click to View</a><br/>Format: Elektronik Kaynak<br/>Protecting information on local area networksent://SD_ILS/0/SD_ILS:11758282025-12-24T14:19:06Z2025-12-24T14:19:06Zby Schweitzer, James A., 1929-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780409901382">http://www.sciencedirect.com/science/book/9780409901382</a><br/>Format: Elektronik Kaynak<br/>SAP security configuration and deployment : the IT administrator's guide to best practicesent://SD_ILS/0/SD_ILS:11916222025-12-24T14:19:06Z2025-12-24T14:19:06Zby Wun-Young, Leslie.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492843">http://www.sciencedirect.com/science/book/9781597492843</a><br/>Format: Elektronik Kaynak<br/>Eleventh hour CISSP : study guideent://SD_ILS/0/SD_ILS:11176912025-12-24T14:19:06Z2025-12-24T14:19:06Zby Conrad, Eric, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4673334">Click to View</a><br/>Format: Elektronik Kaynak<br/>Siber güvenlikent://SD_ILS/0/SD_ILS:6683032025-12-24T14:19:06Z2025-12-24T14:19:06Zby Canlı, Mustafa<br/>Format: Kitap<br/>CISSP practice 2,250 questions, answers, and explanations for passing the testent://SD_ILS/0/SD_ILS:9867742025-12-24T14:19:06Z2025-12-24T14:19:06Zby Vallabhaneni, S. Rao.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=819012">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security in wireless LANs and MANsent://SD_ILS/0/SD_ILS:9325072025-12-24T14:19:06Z2025-12-24T14:19:06Zby Hardjono, Thomas.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=240770">Click to View</a><br/>Format: Elektronik Kaynak<br/>Coding for penetration testers building better toolsent://SD_ILS/0/SD_ILS:9835212025-12-24T14:19:06Z2025-12-24T14:19:06Zby Andress, Jason.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=773396">Click to View</a><br/>Format: Elektronik Kaynak<br/>Handbook on securing cyber-physical critical infrastructureent://SD_ILS/0/SD_ILS:9900032025-12-24T14:19:06Z2025-12-24T14:19:06Zby Das, Sajal K.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=858728">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security+ study guide & DVD training systement://SD_ILS/0/SD_ILS:9556242025-12-24T14:19:06Z2025-12-24T14:19:06Zby Cross, Michael, 1965-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=452863">Click to View</a><br/>Format: Elektronik Kaynak<br/>Official (ISC)2 guide to the CAP CBKent://SD_ILS/0/SD_ILS:9990032025-12-24T14:19:06Z2025-12-24T14:19:06Zby Howard, Patrick D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=981531">Click to View</a><br/>Format: Elektronik Kaynak<br/>TBMM'de fiziksel ve sanal güvenlik analizient://SD_ILS/0/SD_ILS:998382025-12-24T14:19:06Z2025-12-24T14:19:06Zby Yıldırım, Hakan<br/>Format: Kitap<br/>Syngress IT security project management handbookent://SD_ILS/0/SD_ILS:9346042025-12-24T14:19:06Z2025-12-24T14:19:06Zby Snedaker, Susan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=261283">Click to View</a><br/>Format: Elektronik Kaynak<br/>E-şirket taktikleri.ent://SD_ILS/0/SD_ILS:2977122025-12-24T14:19:06Z2025-12-24T14:19:06ZFormat: Kitap<br/>Cyber and you : the impact of technology on our livesent://SD_ILS/0/SD_ILS:11471552025-12-24T14:19:06Z2025-12-24T14:19:06Zby Kendal, Maureen, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5811334">Click to View</a><br/>Format: Elektronik Kaynak<br/>IT-Sicherheit : Eine Einführungent://SD_ILS/0/SD_ILS:11325462025-12-24T14:19:06Z2025-12-24T14:19:06Zby Hellmann, Roland, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5157634">Click to View</a><br/>Format: Elektronik Kaynak<br/>Learn ethical hacking from scratch : your stepping stone to penetration testingent://SD_ILS/0/SD_ILS:11411112025-12-24T14:19:06Z2025-12-24T14:19:06Zby Sabih, Zaid, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5485020">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network security with pfSense : architect, deploy, and operate enterprise-grade firewallsent://SD_ILS/0/SD_ILS:11421282025-12-24T14:19:06Z2025-12-24T14:19:06Zby Aggarwal, Manuj, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5520881">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hands-on security in DevOps : ensure continuous security, deployment, and delivery with DevSecOpsent://SD_ILS/0/SD_ILS:11421322025-12-24T14:19:06Z2025-12-24T14:19:06Zby Hsu, Tony, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5520885">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity program development for business : the essential planning guideent://SD_ILS/0/SD_ILS:11371192025-12-24T14:19:06Z2025-12-24T14:19:06Zby Moschovitis, Christos J. P., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5342325">Click to View</a><br/>Format: Elektronik Kaynak<br/>Wireless communications security : solutions for the internet of thingsent://SD_ILS/0/SD_ILS:11182192025-12-24T14:19:06Z2025-12-24T14:19:06Zby Penttinen, Jyrki T. J., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4690021">Click to View</a><br/>Format: Elektronik Kaynak<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:11184652025-12-24T14:19:06Z2025-12-24T14:19:06Zby Faircloth, Jeremy, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4694443">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybercrime and business : strategies for global corporate securityent://SD_ILS/0/SD_ILS:11265202025-12-24T14:19:06Z2025-12-24T14:19:06Zby Moskowitz, Sanford, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4863624">Click to View</a><br/>Format: Elektronik Kaynak<br/>You : for sale protecting your personal data and privacy onlineent://SD_ILS/0/SD_ILS:10537572025-12-24T14:19:06Z2025-12-24T14:19:06Zby Sumner, Stuart, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2187472">Click to View</a><br/>Format: Elektronik Kaynak<br/>Essential skills for hackersent://SD_ILS/0/SD_ILS:11045682025-12-24T14:19:06Z2025-12-24T14:19:06Zby Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4189281">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity and applied mathematicsent://SD_ILS/0/SD_ILS:11131692025-12-24T14:19:06Z2025-12-24T14:19:06Zby Metcalf, Leigh, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4556234">Click to View</a><br/>Format: Elektronik Kaynak<br/>Conducting computer security assessments at nuclear facilities.ent://SD_ILS/0/SD_ILS:11259132025-12-24T14:19:06Z2025-12-24T14:19:06Z<a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4853352">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer security incident response planning at nuclear facilitiesent://SD_ILS/0/SD_ILS:11259142025-12-24T14:19:06Z2025-12-24T14:19:06Zby International Atomic Energy Agency.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4853353">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber-risk informatics : engineering evaluation with data scienceent://SD_ILS/0/SD_ILS:11660682025-12-24T14:19:06Z2025-12-24T14:19:06Zby Sahinoglu, Mehmet, 1951-.<br/>Format: Kitap<br/>The defendeŕs dilemma : charting a course toward cybersecurityent://SD_ILS/0/SD_ILS:10508522025-12-24T14:19:06Z2025-12-24T14:19:06Zby Libicki, Martin C., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2075897">Click to View</a><br/>Format: Elektronik Kaynak<br/>Introduction to US cybersecurity careersent://SD_ILS/0/SD_ILS:10425682025-12-24T14:19:06Z2025-12-24T14:19:06Zby Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1888758">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security intelligence : a practitioner's guide to solving enterprise security challengesent://SD_ILS/0/SD_ILS:10427352025-12-24T14:19:06Z2025-12-24T14:19:06Zby Li, Qing, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1895130">Click to View</a><br/>Format: Elektronik Kaynak<br/>Digital identity managementent://SD_ILS/0/SD_ILS:10473362025-12-24T14:19:06Z2025-12-24T14:19:06Zby Laurent, Maryline, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2007485">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber resilience best practicesent://SD_ILS/0/SD_ILS:11044672025-12-24T14:19:06Z2025-12-24T14:19:06Zby AXELOS Limited, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4187569">Click to View</a><br/>Format: Elektronik Kaynak<br/>E-commerceent://SD_ILS/0/SD_ILS:11345312025-12-24T14:19:06Z2025-12-24T14:19:06Zby Mourya, S. K., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5248356">Click to View</a><br/>Format: Elektronik Kaynak<br/>The security consultant's handbookent://SD_ILS/0/SD_ILS:11069862025-12-24T14:19:06Z2025-12-24T14:19:06Zby Bingley, Richard, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4395799">Click to View</a><br/>Format: Elektronik Kaynak<br/>Application security in the ISO 27001:2013 environmentent://SD_ILS/0/SD_ILS:11069872025-12-24T14:19:06Z2025-12-24T14:19:06Zby Vasudevan, Vinod, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4395800">Click to View</a><br/>Format: Elektronik Kaynak<br/>Online security for the business travelerent://SD_ILS/0/SD_ILS:10362512025-12-24T14:19:06Z2025-12-24T14:19:06Zby Gonzalez, Deborah, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1772301">Click to View</a><br/>Format: Elektronik Kaynak<br/>CyberWar, CyberTerror, CyberCrime and CyberActivism : an in-depth guide to the role of standards in cybersecurity enviromentent://SD_ILS/0/SD_ILS:10370812025-12-24T14:19:06Z2025-12-24T14:19:06Zby Mehan, Julie E., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778762">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security careers : skills, compensation, and career pathsent://SD_ILS/0/SD_ILS:10257032025-12-24T14:19:06Z2025-12-24T14:19:06Zby Walker, Stephen W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1598238">Click to View</a><br/>Format: Elektronik Kaynak<br/>