Arama Sonu&ccedil;lar&#305; Computer networks -- Security measures. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dComputer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ic$003dtrue$0026ps$003d300?dt=list 2025-12-24T14:19:06Z Identity management concepts, technologies, and systems ent://SD_ILS/0/SD_ILS:972507 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Bertino, Elisa.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=634511">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Unauthorised access physical penetration testing for IT security teams ent://SD_ILS/0/SD_ILS:958776 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Allsopp, Wil.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=470412">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Applied network security : master the art of detecting and averting advanced network security attacks and techniques ent://SD_ILS/0/SD_ILS:1125830 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Salmon, Arthur, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4853051">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:1192594 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Vacca, John R.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123743541">https://www.sciencedirect.com/science/book/9780123743541</a><br/>Format:&#160;Elektronik Kaynak<br/> Secure your network for free : using NMAP, wireshark, snort, nessus, and MRTG ent://SD_ILS/0/SD_ILS:1188278 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Seagren, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491235">http://www.sciencedirect.com/science/book/9781597491235</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity today and tomorrow pay now or pay later ent://SD_ILS/0/SD_ILS:1082583 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3375180">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security+ study guide and DVD training system ent://SD_ILS/0/SD_ILS:939569 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Cross, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294357">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Eleventh hour CISSP : study guide ent://SD_ILS/0/SD_ILS:1183138 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Conrad, Eric, 1967-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495660">https://www.sciencedirect.com/science/book/9781597495660</a><br/>Format:&#160;Elektronik Kaynak<br/> Syngress IT security project management handbook ent://SD_ILS/0/SD_ILS:1188265 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Snedaker, Susan.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490764">http://www.sciencedirect.com/science/book/9781597490764</a><br/>Format:&#160;Elektronik Kaynak<br/> Security+ study guide &amp; DVD training system ent://SD_ILS/0/SD_ILS:1186462 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Cross, Michael, 1965-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491532">https://www.sciencedirect.com/science/book/9781597491532</a><br/>Format:&#160;Elektronik Kaynak<br/> GFI network security and PCI compliance power tools ent://SD_ILS/0/SD_ILS:1191827 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Posey, Brien.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492850">https://www.sciencedirect.com/science/book/9781597492850</a><br/>Format:&#160;Elektronik Kaynak<br/> Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities ent://SD_ILS/0/SD_ILS:1085692 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Dam, Kenneth W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3378552">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Kendi siteni kendin koru ent://SD_ILS/0/SD_ILS:1196554 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;B&uuml;y&uuml;kg&ouml;ze, Selma.<br/>Format:&#160;Kitap<br/> Kendi siteni kendin koru ent://SD_ILS/0/SD_ILS:1195752 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;B&uuml;y&uuml;kg&ouml;ze, Selma.<br/>Format:&#160;Kitap<br/> Two-factor authentication ent://SD_ILS/0/SD_ILS:1049535 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Stanislav, Mark, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2048577">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security ent://SD_ILS/0/SD_ILS:1038551 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Perez, Andre, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1800888">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber security ent://SD_ILS/0/SD_ILS:1025719 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Voeller, John G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1598809">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Communications and information infrastructure security ent://SD_ILS/0/SD_ILS:1025720 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Voeller, John G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1598810">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IV. A&#287; ve Bilgi G&uuml;venli&#287;i Sempozyumu : bildiriler kitab&#305;, 25-26 Kas&#305;m 2011, Ankara. ent://SD_ILS/0/SD_ILS:1163977 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;A&#287; ve Bilgi G&uuml;venli&#287;i Sempozyumu (4th : 2011 : Ankara, Turkey)<br/>Format:&#160;Kitap<br/> Network security jumpstart ent://SD_ILS/0/SD_ILS:936008 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Strebe, Matthew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=272216">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Teknik, teorik bilgilerle, akademiye uygun siber g&uuml;venlik : T&uuml;rkiye'nin siber g&uuml;c&uuml; ve d&uuml;nyadan &ouml;rnekler ent://SD_ILS/0/SD_ILS:1225113 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Paltac&#305;, Bahtiyar M., yazar.<br/>Format:&#160;Kitap<br/> Cyber smart : five habits to protect your family, money, and identity from cyber criminals ent://SD_ILS/0/SD_ILS:1143906 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;McDonough, Bart, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5612908">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security and privacy in cyber-physical systems : foundations, principles, and applications ent://SD_ILS/0/SD_ILS:1129049 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Song, Houbing, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4987646">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network vulnerability assessment : identify security loopholes in your network's infrastructure ent://SD_ILS/0/SD_ILS:1141744 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Rahalkar, Sagar, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5507753">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Practical cyber intelligence : how action-based intelligence can be an effective response to incidents ent://SD_ILS/0/SD_ILS:1136693 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Bautista, Wilson, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5332127">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Learn social engineering : learn the art of human hacking with an internationally renowned expert ent://SD_ILS/0/SD_ILS:1137560 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Ozkaya, Erdal, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5379705">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security and cryptography : a self-teaching introduction ent://SD_ILS/0/SD_ILS:1137804 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Musa, Sarhan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5389089">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> .NET Standard 2.0 Cookbook : develop high quality, fast and portable applications by leveraging the power of .NET Standard Library ent://SD_ILS/0/SD_ILS:1138141 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Ismail, Fiqri, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5400395">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security in network functions virtualization ent://SD_ILS/0/SD_ILS:1131905 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Zhang, Zonghua, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5152998">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security handbook : develop a threat model and incident response strategy to build a strong information security framework ent://SD_ILS/0/SD_ILS:1133381 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Death, Darren, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5183382">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network forensics ent://SD_ILS/0/SD_ILS:1128247 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Messier, Ric, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4917496">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Advanced persistent threat : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies ent://SD_ILS/0/SD_ILS:1120082 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Winkler, Ira, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4730826">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Safety of web applications : risks, encryption and handling vulnerabilities with PHP ent://SD_ILS/0/SD_ILS:1125310 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Quinton, Eric, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4840953">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:1126212 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Vacca, John R., editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4858374">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security operations center guidebook : a practical guide for a successful SOC ent://SD_ILS/0/SD_ILS:1126457 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Jarpey, Gregory , author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4862661">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Loseless information : hiding in images ent://SD_ILS/0/SD_ILS:1120646 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Lu, Zhe-Ming, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4743573">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Building a corporate culture of security : strategies for strengthening organizational resiliency ent://SD_ILS/0/SD_ILS:1108349 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Sullivant, John, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4425984">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Dns security : defending the domain name system ent://SD_ILS/0/SD_ILS:1113215 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Liska, Allan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4556898">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Data breach preparation and response : breaches are certain, impact is not ent://SD_ILS/0/SD_ILS:1113216 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Fowler, Kevvie, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4556899">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber guerilla ent://SD_ILS/0/SD_ILS:1113262 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Haaster, Jelle van, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4557157">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security in fixed and wireless networks ent://SD_ILS/0/SD_ILS:1115585 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Sch&auml;fer, G&uuml;nter, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4658592">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Managing online risk : apps, mobile, and social media security ent://SD_ILS/0/SD_ILS:1038176 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Gonzalez, Deborah, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1798304">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computational network science : an algorithmic approach ent://SD_ILS/0/SD_ILS:1038184 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Hexmoor, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1798312">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Python passive network mapping : P2NMAP ent://SD_ILS/0/SD_ILS:1050504 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Hosmer, Chet, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2068785">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Web application security is a stack : how to CYA (Cover Your Apps) completely ent://SD_ILS/0/SD_ILS:1053836 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Vittie, Lori Mac, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192126">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Building an intelligence-led security program ent://SD_ILS/0/SD_ILS:1042561 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Liska, Allan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1888751">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> How to define and build an effective cyber threat intelligence capability ent://SD_ILS/0/SD_ILS:1042565 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1888755">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> How to defeat advanced malware : new tools for protection and forensics ent://SD_ILS/0/SD_ILS:1042566 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Dalziel, Max, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1888756">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Beyond cybersecurity : protecting your digital business ent://SD_ILS/0/SD_ILS:1042775 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Kaplan, James M., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1895275">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security technology convergence insights ent://SD_ILS/0/SD_ILS:1047505 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Bernard, Ray, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2008287">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking web intelligence : open source intelligence and web reconnaissance concepts and techniques ent://SD_ILS/0/SD_ILS:1047851 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Chauhan, Sudhanshu, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2025500">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Introduction to network security : theory and practice ent://SD_ILS/0/SD_ILS:1103122 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Wang, Jie, 1961- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040040">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The network security test lab : a step-by-step guide ent://SD_ILS/0/SD_ILS:1103143 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Gregg, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040350">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Targeted cyber attacks : multi-staged attacks driven by exploits and malware ent://SD_ILS/0/SD_ILS:1029784 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Sood, Aditya K., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1673591">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Procuring penetration testing services. ent://SD_ILS/0/SD_ILS:1037085 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z <a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778766">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Integrated security systems design : a complete reference for building enterprise-wide digital security systems ent://SD_ILS/0/SD_ILS:1037343 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Norman, Thomas, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1781681">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity for executives : a practical guide ent://SD_ILS/0/SD_ILS:1032594 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Touhill, Gregory J., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1707094">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Assessing information security : strategies, tactics, logic and framework ent://SD_ILS/0/SD_ILS:1053834 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Vladimirov, A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192124">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity : managing systems, conducting testing, and investigating intrusions ent://SD_ILS/0/SD_ILS:1021516 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Mowbray, Thomas J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1481185">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network and system security ent://SD_ILS/0/SD_ILS:1018501 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1364061">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:1014191 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1195617">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security patterns in practice : designing secure architectures using software patterns ent://SD_ILS/0/SD_ILS:1015811 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Fernandez, Eduardo B., 1936- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1245159">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security risks in social media technologies : safe practices in public service applications ent://SD_ILS/0/SD_ILS:1023776 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Oxley, Alan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1574994">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Data visualization. Part 2 ent://SD_ILS/0/SD_ILS:1024206 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Assam, Tarek.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1579356">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> UTM security with Fortinet Mastering FortiOS ent://SD_ILS/0/SD_ILS:1003496 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Tam, Kenneth.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1068442">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Advanced persistent threat understanding the danger and how to protect your organization ent://SD_ILS/0/SD_ILS:1003921 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Cole, Eric.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073020">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Federated identity primer ent://SD_ILS/0/SD_ILS:1004672 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Rountree, Derrick.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1081145">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Practical anonymity hiding in plain sight online ent://SD_ILS/0/SD_ILS:1007614 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Loshin, Peter.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115167">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> What should go on the internet? : privacy, freedom, and security online ent://SD_ILS/0/SD_ILS:1111834 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Engel, Mary, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4533280">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Client-side attacks and defense ent://SD_ILS/0/SD_ILS:1001905 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Shimonski, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1036349">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> BackTrack 4 assuring security by penetration testing : master the art of penetration testing with BackTrack ent://SD_ILS/0/SD_ILS:996968 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Ali, Shakeel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=950518">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Implementing SSL/TLS using cryptography and PKI ent://SD_ILS/0/SD_ILS:979007 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Davies, Joshua Dennis.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706899">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security risk management building an information security risk management program from the ground up ent://SD_ILS/0/SD_ILS:976804 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Wheeler, Evan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=685406">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Client-Honeypots : exploring malicious websites ent://SD_ILS/0/SD_ILS:1017776 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;G&ouml;bel, Jan Gerrit, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1348689">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Adaptive security management architecture ent://SD_ILS/0/SD_ILS:972238 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=625004">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Secure computer and network systems modeling, analysis and design ent://SD_ILS/0/SD_ILS:946385 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Ye, Nong.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=351427">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Implementing 802.1X security solutions for wired and wireless networks ent://SD_ILS/0/SD_ILS:946579 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Geier, James T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=353449">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IT compliance and controls best practices for implementation ent://SD_ILS/0/SD_ILS:945051 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;DeLuccia, James J., 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=335724">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Integrated security systems design concepts, specifications, and implementation ent://SD_ILS/0/SD_ILS:938298 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Norman, Thomas L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=287955">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Developer's guide to web application security ent://SD_ILS/0/SD_ILS:938521 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Cross, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=289735">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security assessment from vulnerability to patch ent://SD_ILS/0/SD_ILS:937038 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Manzuik, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=280219">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security data visualization graphical techniques for network analysis ent://SD_ILS/0/SD_ILS:1058454 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Conti, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3017625">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasures ent://SD_ILS/0/SD_ILS:939483 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Contos, Brian T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294116">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Designing and building enterprise DMZs ent://SD_ILS/0/SD_ILS:943348 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Flynn, Hal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=319198">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Configuring SonicWALL firewalls ent://SD_ILS/0/SD_ILS:934073 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Lathem, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=256369">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at managing information security ent://SD_ILS/0/SD_ILS:934742 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Osborne, Mark.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=266207">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Firewall policies and VPN configurations ent://SD_ILS/0/SD_ILS:935986 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Cantrell, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=272100">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Buffer overflow attacks detect, exploit, prevent ent://SD_ILS/0/SD_ILS:930207 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Foster, James C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=222803">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Host integrity monitoring using Osiris and Samhain ent://SD_ILS/0/SD_ILS:931606 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Wotring, Brian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=233599">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cisco Pix firewalls configure, manage and troubleshoot ent://SD_ILS/0/SD_ILS:933859 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Behrens, Thorsten.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254835">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security evaluation using the NSA IEM ent://SD_ILS/0/SD_ILS:933866 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Fuller, Ed.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254842">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Silence on the wire a field guide to passive reconnaissance and indirect attacks ent://SD_ILS/0/SD_ILS:936579 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273504">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking the code ASP. NET web application security ent://SD_ILS/0/SD_ILS:939506 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Burnett, Mark (Mark M.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294160">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Ethereal packet sniffing ent://SD_ILS/0/SD_ILS:939485 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Orebaugh, Angela.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294122">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security sage's guide to hardening the network infrastructure ent://SD_ILS/0/SD_ILS:939571 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Andr&eacute;s, Steven.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294359">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at Configuring ISA Server 2004 ent://SD_ILS/0/SD_ILS:933877 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Shinder, Dr. Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254853">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security foundations ent://SD_ILS/0/SD_ILS:935040 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Strebe, Matthew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=267332">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cisco security professional's guide to secure intrusion detection systems ent://SD_ILS/0/SD_ILS:939451 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294035">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Snort 2.0 intrusion detection ent://SD_ILS/0/SD_ILS:939575 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Beale, Jay.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294371">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cisco security specialist's guide to PIX Firewall ent://SD_ILS/0/SD_ILS:939452 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Osipov, Vitaly.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294036">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing ColdFusion ent://SD_ILS/0/SD_ILS:939498 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Meyer, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294151">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing your network ent://SD_ILS/0/SD_ILS:939504 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Ahmad, David R. Mirza.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294158">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Nokia Network security solutions handbook ent://SD_ILS/0/SD_ILS:939542 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Maxwell, Douglas D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294289">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Trust in cyberspace ent://SD_ILS/0/SD_ILS:1085960 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Schneider, Fred B.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3378820">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team tactics ent://SD_ILS/0/SD_ILS:1134722 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Diogenes, Yuri, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5259454">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The five technological forces disrupting security : how social, mobile, cloud and iot are fundamentally changing the practice of physical security ent://SD_ILS/0/SD_ILS:1128883 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Van Till, Steve, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4981408">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Fuzzing for software security testing and quality assurance ent://SD_ILS/0/SD_ILS:1139237 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Takanen, Ari, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5430720">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information hiding in communication networks : fundamentals, mechanisms, applications, and countermeasures ent://SD_ILS/0/SD_ILS:1107654 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Mazurczyk, Wojciech, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4405578">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security and privacy in the digital era. Volume 1 ent://SD_ILS/0/SD_ILS:1115270 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Guerrier, Claudine, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4648717">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> SSL and TLS : theory and practice ent://SD_ILS/0/SD_ILS:1124318 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Oppliger, Rolf, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4821279">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Zabbix network monitoring essentials : your one-stop solution to efficient network monitoring with zabbix ent://SD_ILS/0/SD_ILS:1046048 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Vacche, Andrea Dalle, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1973849">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Learning iOS security : enhance the security of your iOS platform and applications using iOS-centric security techniques ent://SD_ILS/0/SD_ILS:1046059 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Banks, Allister, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1973863">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Understanding bitcoin : cryptography, engineering and economics. ent://SD_ILS/0/SD_ILS:1040180 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Franco, Pedro, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1823060">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually ent://SD_ILS/0/SD_ILS:1028145 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1644005">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer forensics with FTK : enhance your computer forensics knowledge through illustrations, tips, tricks, and practical real-world scenarios ent://SD_ILS/0/SD_ILS:1029107 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Carbone, Fernando, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1657797">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning ent://SD_ILS/0/SD_ILS:1036178 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Hutchens, Justin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1771381">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013 ent://SD_ILS/0/SD_ILS:1035010 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Ginodman, Veniamin, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1752831">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cryptography for security and privacy in cloud computing ent://SD_ILS/0/SD_ILS:1020988 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Rass, Stefan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1463547">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> SolarWinds Server &amp; Application Monitor : deployment and administration : an intuitive guide to implementing and calibrating SolarWinds Server &amp; Application Monitor with minimum hassle ent://SD_ILS/0/SD_ILS:1024621 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Brant, Justin M.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1582950">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Instant Spring Security starter learn the fundamentals of web authentication and authorization using Spring Security ent://SD_ILS/0/SD_ILS:1016268 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Jagielski, Piotr.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1274894">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows 2012 server network security securing your windows network systems and infrastructure ent://SD_ILS/0/SD_ILS:1007610 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Rountree, Derrick.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115160">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Professional penetration testing creating and learning in a hacking lab ent://SD_ILS/0/SD_ILS:1007616 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Wilhelm, Thomas.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115172">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Web penetration testing with Kali Linux : a practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux ent://SD_ILS/0/SD_ILS:1020047 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Muniz, Joseph.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1420531">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IBM WebSphere application server V7.0 security secure your WebSphere applications with Java EE and JAAS security standards ent://SD_ILS/0/SD_ILS:996260 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Siliceo, Omar.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=943983">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> WordPress 3 ultimate security protect your WordPress site and its network ent://SD_ILS/0/SD_ILS:996789 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Connelly, Olly.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948509">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> CMS security handbook the comprehensive guide for WordPress, Joomla!, Drupal, and Plone ent://SD_ILS/0/SD_ILS:979005 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Canavan, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706893">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:955637 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=453166">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Fuzzing for software security testing and quality assurance ent://SD_ILS/0/SD_ILS:956329 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Takanen, Ari.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456884">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Toward a safer and more secure cyberspace ent://SD_ILS/0/SD_ILS:1085452 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Goodman, Seymour E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3378311">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security in distributed and networking systems ent://SD_ILS/0/SD_ILS:1013897 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Pan, Yi, 1960-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1193126">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at designing security for a Windows Server 2003 network ent://SD_ILS/0/SD_ILS:933856 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Amini, Rob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254832">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing IM and P2P applications for the enterprise ent://SD_ILS/0/SD_ILS:933871 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Piccard, Paul L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254847">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> z/OS 1.6 security services update ent://SD_ILS/0/SD_ILS:1075148 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Kappeler, Patrick.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306453">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> WebSphere application server for z/OS V5 and J2EE 1.3 security handbook ent://SD_ILS/0/SD_ILS:1075077 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Allison, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306382">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Distributed security and high availability with Tivoli Access Manager and WebSphere Application Server for z/OS ent://SD_ILS/0/SD_ILS:1075297 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Davies, Saida.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306602">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IBM system z9 109 technical introduction ent://SD_ILS/0/SD_ILS:1075277 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Ogden, Bill.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306582">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> z/OS diagnostic data collection and analysis ent://SD_ILS/0/SD_ILS:1075465 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Rogers, Paul.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306770">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Internet applications the emerging global computer. ent://SD_ILS/0/SD_ILS:1092046 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411450">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Z/OS WebSphere and J2EE security handbook ent://SD_ILS/0/SD_ILS:1075315 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Wunderlich, Holger.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306620">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security configuration in a TCP/IP Sysplex environment ent://SD_ILS/0/SD_ILS:1075356 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306661">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Enterprise business portals II with IBM tivoli access manager ent://SD_ILS/0/SD_ILS:1075452 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;B&uuml;cker, Axel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306757">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Special ops host and Network security for Microsoft, UNIX, and Oracle ent://SD_ILS/0/SD_ILS:939577 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Birkholz, Erik Pace.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294373">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The practice of network security monitoring : understanding incident detection and response ent://SD_ILS/0/SD_ILS:1023457 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Bejtlich, Richard.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572876">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking web apps detecting and preventing web application security problems ent://SD_ILS/0/SD_ILS:1000371 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Shema, Mike.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1012529">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Intrusion detection a machine learning approach ent://SD_ILS/0/SD_ILS:981161 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Tsai, Jeffrey J.-P.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=737642">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Use of risk analysis in computer-aided persuasion ent://SD_ILS/0/SD_ILS:988362 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Duman, Ekrem.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=836226">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing information and communications systems principles, technologies, and applications ent://SD_ILS/0/SD_ILS:956326 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Furnell, Steven, 1970-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456881">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Aspects of network and information security ent://SD_ILS/0/SD_ILS:947147 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;NATO Advanced Study Institute on Network Security and Intrusion Detection (2005 : Yerevan, Armenia)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=363205">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information assurance dependability and security in networked systems ent://SD_ILS/0/SD_ILS:944016 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Qian, Yi, 1962-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328312">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Nessus, Snort, &amp; Ethereal power tools customizing open source security applications ent://SD_ILS/0/SD_ILS:933863 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Archibald, Neil.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254839">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Implementing SSH strategies for optimizing the Secure Shell ent://SD_ILS/0/SD_ILS:929721 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Dwivedi, Himanshu.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=215119">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cisco security professional's guide to secure intrusion detection systems ent://SD_ILS/0/SD_ILS:1188408 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Burton, James.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266696">http://www.sciencedirect.com/science/book/9781932266696</a><br/>Format:&#160;Elektronik Kaynak<br/> Firewall policies and VPN configurations ent://SD_ILS/0/SD_ILS:1188270 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Henmi, Anne.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490887">https://www.sciencedirect.com/science/book/9781597490887</a><br/>Format:&#160;Elektronik Kaynak<br/> Insider threat : protecting the enterprise from sabotage, spying, and theft ent://SD_ILS/0/SD_ILS:1188259 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Cole, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format:&#160;Elektronik Kaynak<br/> Security sage's guide to hardening the network infrastructure ent://SD_ILS/0/SD_ILS:1188364 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Andr&eacute;s, Steven.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836012">https://www.sciencedirect.com/science/book/9781931836012</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing your wireless network ent://SD_ILS/0/SD_ILS:1188487 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Barnes, Christian.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994596">http://www.sciencedirect.com/science/book/9781928994596</a><br/>Format:&#160;Elektronik Kaynak<br/> Asset protection through security awareness ent://SD_ILS/0/SD_ILS:987451 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Speed, Tyler Justin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826927">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at securing Linux ent://SD_ILS/0/SD_ILS:1189106 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Krishnamurthy Madwachar, Mohan.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492072">https://www.sciencedirect.com/science/book/9781597492072</a><br/>Format:&#160;Elektronik Kaynak<br/> Botnets : the killer web app ent://SD_ILS/0/SD_ILS:1186444 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Schiller, Craig A.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491358">https://www.sciencedirect.com/science/book/9781597491358</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at designing security for a Windows Server 2003 network ent://SD_ILS/0/SD_ILS:1188281 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Amini, Rob.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492430">https://www.sciencedirect.com/science/book/9781597492430</a><br/>Format:&#160;Elektronik Kaynak<br/> Nessus, Snort, &amp; Ethereal power tools : customizing open source security applications ent://SD_ILS/0/SD_ILS:1188247 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Archibald, Neil.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490207">http://www.sciencedirect.com/science/book/9781597490207</a><br/>Format:&#160;Elektronik Kaynak<br/> Configuring Check Point NGX VPN-1/fire wall- ent://SD_ILS/0/SD_ILS:1188250 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Stephens, Robert.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490313">http://www.sciencedirect.com/science/book/9781597490313</a><br/>Format:&#160;Elektronik Kaynak<br/> Ethereal : packet sniffing ent://SD_ILS/0/SD_ILS:1188411 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Orebaugh, Angela.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266825">http://www.sciencedirect.com/science/book/9781932266825</a><br/>Format:&#160;Elektronik Kaynak<br/> Managing and securing a Cisco structured wireless-aware network ent://SD_ILS/0/SD_ILS:1188415 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Wall, David.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781932266917">https://www.sciencedirect.com/science/book/9781932266917</a><br/>Format:&#160;Elektronik Kaynak<br/> The tangled Web a guide to securing modern Web applications ent://SD_ILS/0/SD_ILS:1009976 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137574">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Disappearing cryptography : information hiding : steganography &amp; watermarking ent://SD_ILS/0/SD_ILS:1192050 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Wayner, Peter, 1964-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123744791">https://www.sciencedirect.com/science/book/9780123744791</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security : know it all ent://SD_ILS/0/SD_ILS:1189257 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Joshi, James B. D.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123744630">http://www.sciencedirect.com/science/book/9780123744630</a><br/>Format:&#160;Elektronik Kaynak<br/> Information assurance : dependability and security in networked systems ent://SD_ILS/0/SD_ILS:1189195 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Qian, Yi, 1962-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123735669">https://www.sciencedirect.com/science/book/9780123735669</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at securing your network ent://SD_ILS/0/SD_ILS:1189983 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Dubrawsky, Ido.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492317">https://www.sciencedirect.com/science/book/9781597492317</a><br/>Format:&#160;Elektronik Kaynak<br/> Developer's guide to web application security ent://SD_ILS/0/SD_ILS:1186371 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at configuring Open Source security tools ent://SD_ILS/0/SD_ILS:1186465 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Alder, Raven.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491709">http://www.sciencedirect.com/science/book/9781597491709</a><br/>Format:&#160;Elektronik Kaynak<br/> Integrated security systems design : concepts, specifications, and implementation ent://SD_ILS/0/SD_ILS:1187997 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Norman, Thomas L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679091">http://www.sciencedirect.com/science/book/9780750679091</a><br/>Format:&#160;Elektronik Kaynak<br/> Designing and building enterprise DMZs ent://SD_ILS/0/SD_ILS:1188272 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Dubrawsky, Ido.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491006">http://www.sciencedirect.com/science/book/9781597491006</a><br/>Format:&#160;Elektronik Kaynak<br/> Security log management : identifying patterns in the chaos ent://SD_ILS/0/SD_ILS:1188257 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Babbin, Jacob.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490429">http://www.sciencedirect.com/science/book/9781597490429</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security : a practical approach ent://SD_ILS/0/SD_ILS:1185353 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Harrington, Jan L.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123116338">https://www.sciencedirect.com/science/book/9780123116338</a><br/>Format:&#160;Elektronik Kaynak<br/> Physical security for IT ent://SD_ILS/0/SD_ILS:1188110 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Erbschloe, Michael, 1951-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583279">http://www.sciencedirect.com/science/book/9781555583279</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking a terror network : the silent threat of covert channels ent://SD_ILS/0/SD_ILS:1188363 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Rogers, Russ.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994985">https://www.sciencedirect.com/science/book/9781928994985</a><br/>Format:&#160;Elektronik Kaynak<br/> Snort 2.1 intrusion detection ent://SD_ILS/0/SD_ILS:1188366 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Beale, Jay.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836043">https://www.sciencedirect.com/science/book/9781931836043</a><br/>Format:&#160;Elektronik Kaynak<br/> Disappearing cryptography : information hiding : steganography &amp; watermarking ent://SD_ILS/0/SD_ILS:1188169 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Wayner, Peter, 1964-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607699">http://www.sciencedirect.com/science/book/9781558607699</a><br/>Format:&#160;Elektronik Kaynak<br/> Nokia network security solutions handbook ent://SD_ILS/0/SD_ILS:1188386 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Maxwell, Doug.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836708">http://www.sciencedirect.com/science/book/9781931836708</a><br/>Format:&#160;Elektronik Kaynak<br/> Managing Cisco network security ent://SD_ILS/0/SD_ILS:1188493 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Knipp, Eric.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836562">https://www.sciencedirect.com/science/book/9781931836562</a><br/>Format:&#160;Elektronik Kaynak<br/> Cisco router and switch forensics : investigating and analyzing malicious network activity ent://SD_ILS/0/SD_ILS:1192800 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Liu, Dale.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494182">https://www.sciencedirect.com/science/book/9781597494182</a><br/>Format:&#160;Elektronik Kaynak<br/> Snort : IDS and IPS toolkit ent://SD_ILS/0/SD_ILS:1188271 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Beale, Jay.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490993">https://www.sciencedirect.com/science/book/9781597490993</a><br/>Format:&#160;Elektronik Kaynak<br/> AVIEN malware defense guide for the Enterprise ent://SD_ILS/0/SD_ILS:1189104 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Harley, David.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491648">https://www.sciencedirect.com/science/book/9781597491648</a><br/>Format:&#160;Elektronik Kaynak<br/> ISA server and beyond : real world security solutions for Microsoft enterprise networks ent://SD_ILS/0/SD_ILS:1188495 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Shinder, Thomas W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836661">http://www.sciencedirect.com/science/book/9781931836661</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack the stack : using snort and ethereal to master the 8 layers of an insecure network ent://SD_ILS/0/SD_ILS:1186427 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Gregg, Michael (Michael C.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">http://www.sciencedirect.com/science/book/9781597491099</a><br/>Format:&#160;Elektronik Kaynak<br/> Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures ent://SD_ILS/0/SD_ILS:1186439 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Contos, Brian T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491297">https://www.sciencedirect.com/science/book/9781597491297</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing your network ent://SD_ILS/0/SD_ILS:1188357 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Ahmad, David R. Mirza.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994701">https://www.sciencedirect.com/science/book/9781928994701</a><br/>Format:&#160;Elektronik Kaynak<br/> Learning Nessus for penetration testing. ent://SD_ILS/0/SD_ILS:1023507 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Kumar, Himanshu.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572937">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Understanding security issues ent://SD_ILS/0/SD_ILS:1132529 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Donaldson, Scott E., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5157542">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Smart cities cybersecurity and privacy ent://SD_ILS/0/SD_ILS:1143849 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Kayhan Zrar Ghafoor, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5609779">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors ent://SD_ILS/0/SD_ILS:1146214 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Carpenter, Perry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5763515">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The business of cybersecurity : foundations and ideologies ent://SD_ILS/0/SD_ILS:1146381 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Sathnur, Ashwini, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5770273">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security and resilience in intelligent data-centric systems and communication networks ent://SD_ILS/0/SD_ILS:1130161 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Ficco, Massimo, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5090270">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Practical industrial internet of things security : a practitioner's guide to securing connected industries ent://SD_ILS/0/SD_ILS:1141474 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Bhattacharjee, Sravani, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5495617">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cloud security automation : get to grips with automating your cloud security on AWS and OpenStack ent://SD_ILS/0/SD_ILS:1136691 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Priyam, Prashant, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5332125">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Enterprise cloud security and governance : efficiently set data protection and privacy principles ent://SD_ILS/0/SD_ILS:1133840 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Vora, Zeal, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5216128">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Mastering Kali Linux for web penetration testing : test and evaluate all aspects of the design and implentation ent://SD_ILS/0/SD_ILS:1127735 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;McPhee, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4891263">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Building a practical information security program ent://SD_ILS/0/SD_ILS:1119358 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Andress, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4711748">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Troubleshooting OpenVPN : get the solutions you need to troubleshoot any issue you may face to keep your OpenVPN up and running ent://SD_ILS/0/SD_ILS:1124549 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Crist, Eric F., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4826446">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IT-Sicherheitsanalysen : Ein prozessorientiertes Vorgehensmodell ent://SD_ILS/0/SD_ILS:1124797 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Simi&#263;, Daniela, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4830572">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IoT security issues ent://SD_ILS/0/SD_ILS:1123519 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Gilchrist, Alasdair, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4810138">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Advanced penetration testing : hacking the world's most secure networks ent://SD_ILS/0/SD_ILS:1123722 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Allsopp, Wil, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4813145">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber security awareness for CEOs and management ent://SD_ILS/0/SD_ILS:1104566 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Willson, David, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4189279">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network performance and security : testing and analyzing using open source and low-cost tools ent://SD_ILS/0/SD_ILS:1109063 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Chapman, Chris, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4452265">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> PCI compliance : understand and implement effective PCI data security standard compliance ent://SD_ILS/0/SD_ILS:1040570 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Williams, Branden R., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1832710">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network attacks &amp; exploitation : a framework ent://SD_ILS/0/SD_ILS:1103144 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Monte, Matthew, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040351">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security breaches : avoidance and treatment based on ISO27001 ent://SD_ILS/0/SD_ILS:1037082 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Krausz, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778763">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking with Kali : practical penetration testing techniques ent://SD_ILS/0/SD_ILS:1007619 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Broad, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115177">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The benefits and security risks of web-based applications for business trend report ent://SD_ILS/0/SD_ILS:1014733 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Kotwica, Kathleen.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1210948">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Pragmatic security metrics applying metametrics to information security ent://SD_ILS/0/SD_ILS:1010972 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Brotby, W. Krag.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1153198">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Microsoft DirectAccess best practices and troubleshooting ent://SD_ILS/0/SD_ILS:1019261 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Krause, Jordan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1389355">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security for service oriented systems ent://SD_ILS/0/SD_ILS:972345 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Thuraisingham, Bhavani M.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=631696">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security the human factor ent://SD_ILS/0/SD_ILS:973059 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Kearney, Paul.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=647939">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Managing information security ent://SD_ILS/0/SD_ILS:1018342 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1357643">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Build your own security lab a field guide for network testing ent://SD_ILS/0/SD_ILS:947074 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Gregg, Michael (Michael C.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=362050">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Configuring NetScreen Firewalls ent://SD_ILS/0/SD_ILS:939461 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Cameron, Rob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294055">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Virtual private networking a construction, operation and utilization guide ent://SD_ILS/0/SD_ILS:958798 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Held, Gilbert, 1943-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=470565">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber adversary characterization auditing the hacker mind ent://SD_ILS/0/SD_ILS:939469 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Parker, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294071">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Nessus network auditing ent://SD_ILS/0/SD_ILS:939540 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Beale, Jay.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294281">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Best damn firewall book period ent://SD_ILS/0/SD_ILS:939585 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294396">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity operations handbook ent://SD_ILS/0/SD_ILS:942613 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Rittinghouse, John W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=313612">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing your wireless network ent://SD_ILS/0/SD_ILS:939507 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Owens, Les.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294161">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> A technical guide to IPSec virtual private networks ent://SD_ILS/0/SD_ILS:1047625 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2010400">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Empirical research for software security : foundations and experience ent://SD_ILS/0/SD_ILS:1132973 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;ben Othmane, Lotfi, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5164090">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Kali linux wireless penetration testing cookbook : identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security ent://SD_ILS/0/SD_ILS:1133434 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Oriyano, Sean-Philip, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5188228">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Kali Linux intrusion and exploitation cookbook : over 70 recipes for system administrator or DevOps to master Kali Linux 2 and perform effective security assessment ent://SD_ILS/0/SD_ILS:1125549 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Shah, Dhruv, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4845574">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Critical infrastructure protection in homeland security : defending a networked nation ent://SD_ILS/0/SD_ILS:1039666 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Lewis, T. G. (Theodore Gyle), 1941- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1813343">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Mastering metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach ent://SD_ILS/0/SD_ILS:1025364 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Jaswal, Nipun, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1593853">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Threat modeling : designing for security ent://SD_ILS/0/SD_ILS:1027048 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Shostack, Adam.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629177">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The true cost of information security breaches and cyber crime ent://SD_ILS/0/SD_ILS:1021273 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Krausz, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1477418">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Mobile access safety beyond BYOD ent://SD_ILS/0/SD_ILS:1008414 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Assing, Dominique.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1124007">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Enterprise information security and privacy ent://SD_ILS/0/SD_ILS:956331 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Axelrod, C. Warren.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456886">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security and employee behaviour how to reduce risk through employee education, training and awareness ent://SD_ILS/0/SD_ILS:951869 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;McIlwraith, Angus.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=429792">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security for mobile networks and platforms ent://SD_ILS/0/SD_ILS:945204 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Aissi, Selim.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338731">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Configuring SonicWALL firewalls ent://SD_ILS/0/SD_ILS:1188282 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Bendell, Dan.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492508">http://www.sciencedirect.com/science/book/9781597492508</a><br/>Format:&#160;Elektronik Kaynak<br/> Configuring Check Point NGX VPN-1/FireWall-1 ent://SD_ILS/0/SD_ILS:934358 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Stephens, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=258633">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Lotus security handbook ent://SD_ILS/0/SD_ILS:1075533 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Tworek, William.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306838">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network and security issues for internet mobile entertainment ent://SD_ILS/0/SD_ILS:938596 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=289848">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Outsourcing information security ent://SD_ILS/0/SD_ILS:931018 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Axelrod, C. Warren.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227659">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security a practical guide ent://SD_ILS/0/SD_ILS:940334 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Poole, Owen.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=298471">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Comprehensive approach as 'sine qua non' for critical infrastructure protection ent://SD_ILS/0/SD_ILS:1044857 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;&#268;aleta, Denis, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1920288">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Terrorist use of cyberspace and cyber terrorism : new challenges and reponses ent://SD_ILS/0/SD_ILS:1115641 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z <a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4659193">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber security and resiliency policy framework ent://SD_ILS/0/SD_ILS:1039877 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Vaseashta, A. (Ashok), editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1818046">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Examining robustness and vulnerability of networked systems ent://SD_ILS/0/SD_ILS:1033429 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Butenko, Sergiy, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1720838">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Risk propagation assessment for network security application to airport communication network design ent://SD_ILS/0/SD_ILS:1012096 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Ben Mahmoud, Mohamed Slim.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1168523">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security a manager's guide to thwarting data thieves and hackers ent://SD_ILS/0/SD_ILS:945288 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Alexander, Philip, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=339307">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The misuse of information systems the impact of security countermeasures ent://SD_ILS/0/SD_ILS:1058044 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;D'Arcy, John P., 1975-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3016826">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyberwar-Netwar security in the information age ent://SD_ILS/0/SD_ILS:935216 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;NATO Advanced Research Workshop on Cyberwar-Netwar: Security in the Information Age (2003 : Lisbon, Portugal)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=267716">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Advances in network and distributed systems security IFIP TC11 WG11.4 First Annual Working Conference on Network Security : November 26-27, 2001, Leuven, Belgium ent://SD_ILS/0/SD_ILS:1062343 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;IFIP TC11 WG11.4 Working Conference on Network Security (1st : 2001 : Louvain, Belgium)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3035322">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity public sector threats and responses ent://SD_ILS/0/SD_ILS:987458 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Andreasson, Kim J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826942">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Applied cyber security and the smart grid implementing security controls into the modern power infrastructure ent://SD_ILS/0/SD_ILS:1007626 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Knapp, Eric D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115187">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Asterisk hacking. ent://SD_ILS/0/SD_ILS:1188582 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Brashars, Joshua.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491518">http://www.sciencedirect.com/science/book/9781597491518</a><br/>Format:&#160;Elektronik Kaynak<br/> Ninja hacking : unconventional penetration testing tactics and techniques ent://SD_ILS/0/SD_ILS:1181828 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Wilhelm, Thomas.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495882">http://www.sciencedirect.com/science/book/9781597495882</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security evaluation using the NSA IEM ent://SD_ILS/0/SD_ILS:1188252 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Rogers, Russ.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490351">http://www.sciencedirect.com/science/book/9781597490351</a><br/>Format:&#160;Elektronik Kaynak<br/> Check Point Next Generation with application intelligence security administration ent://SD_ILS/0/SD_ILS:1188414 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Tobkin, Chris.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781932266894">https://www.sciencedirect.com/science/book/9781932266894</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security best practices : 205 basic rules ent://SD_ILS/0/SD_ILS:1188318 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Stefanek, George L.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781878707963">https://www.sciencedirect.com/science/book/9781878707963</a><br/>Format:&#160;Elektronik Kaynak<br/> CCNA security study guide : exam 210-260 ent://SD_ILS/0/SD_ILS:1133821 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;McMillan, Troy, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5215616">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Puppet reporting and monitoring : create insightful reports for your server infrastructure using Puppet ent://SD_ILS/0/SD_ILS:1028146 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Duffy, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1644006">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security of self-organizing networks MANET, WSN, WMN, VANET ent://SD_ILS/0/SD_ILS:969124 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Pathan, Al-Sakib Khan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=599718">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at securing a wireless network ent://SD_ILS/0/SD_ILS:936644 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Hurley, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=274288">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Protecting information on local area networks ent://SD_ILS/0/SD_ILS:1175828 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Schweitzer, James A., 1929-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780409901382">http://www.sciencedirect.com/science/book/9780409901382</a><br/>Format:&#160;Elektronik Kaynak<br/> SAP security configuration and deployment : the IT administrator's guide to best practices ent://SD_ILS/0/SD_ILS:1191622 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Wun-Young, Leslie.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492843">http://www.sciencedirect.com/science/book/9781597492843</a><br/>Format:&#160;Elektronik Kaynak<br/> Eleventh hour CISSP : study guide ent://SD_ILS/0/SD_ILS:1117691 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Conrad, Eric, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4673334">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Siber g&uuml;venlik ent://SD_ILS/0/SD_ILS:668303 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Canl&#305;, Mustafa<br/>Format:&#160;Kitap<br/> CISSP practice 2,250 questions, answers, and explanations for passing the test ent://SD_ILS/0/SD_ILS:986774 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Vallabhaneni, S. Rao.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=819012">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security in wireless LANs and MANs ent://SD_ILS/0/SD_ILS:932507 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Hardjono, Thomas.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=240770">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Coding for penetration testers building better tools ent://SD_ILS/0/SD_ILS:983521 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Andress, Jason.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=773396">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Handbook on securing cyber-physical critical infrastructure ent://SD_ILS/0/SD_ILS:990003 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Das, Sajal K.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=858728">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security+ study guide &amp; DVD training system ent://SD_ILS/0/SD_ILS:955624 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Cross, Michael, 1965-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=452863">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Official (ISC)2 guide to the CAP CBK ent://SD_ILS/0/SD_ILS:999003 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Howard, Patrick D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=981531">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> TBMM'de fiziksel ve sanal g&uuml;venlik analizi ent://SD_ILS/0/SD_ILS:99838 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Y&#305;ld&#305;r&#305;m, Hakan<br/>Format:&#160;Kitap<br/> Syngress IT security project management handbook ent://SD_ILS/0/SD_ILS:934604 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Snedaker, Susan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=261283">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> E-&#351;irket taktikleri. ent://SD_ILS/0/SD_ILS:297712 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z Format:&#160;Kitap<br/> Cyber and you : the impact of technology on our lives ent://SD_ILS/0/SD_ILS:1147155 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Kendal, Maureen, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5811334">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IT-Sicherheit : Eine Einf&uuml;hrung ent://SD_ILS/0/SD_ILS:1132546 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Hellmann, Roland, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5157634">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Learn ethical hacking from scratch : your stepping stone to penetration testing ent://SD_ILS/0/SD_ILS:1141111 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Sabih, Zaid, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5485020">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security with pfSense : architect, deploy, and operate enterprise-grade firewalls ent://SD_ILS/0/SD_ILS:1142128 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Aggarwal, Manuj, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5520881">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hands-on security in DevOps : ensure continuous security, deployment, and delivery with DevSecOps ent://SD_ILS/0/SD_ILS:1142132 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Hsu, Tony, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5520885">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity program development for business : the essential planning guide ent://SD_ILS/0/SD_ILS:1137119 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Moschovitis, Christos J. P., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5342325">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Wireless communications security : solutions for the internet of things ent://SD_ILS/0/SD_ILS:1118219 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Penttinen, Jyrki T. J., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4690021">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:1118465 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Faircloth, Jeremy, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4694443">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybercrime and business : strategies for global corporate security ent://SD_ILS/0/SD_ILS:1126520 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Moskowitz, Sanford, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4863624">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> You : for sale protecting your personal data and privacy online ent://SD_ILS/0/SD_ILS:1053757 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Sumner, Stuart, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2187472">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Essential skills for hackers ent://SD_ILS/0/SD_ILS:1104568 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4189281">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity and applied mathematics ent://SD_ILS/0/SD_ILS:1113169 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Metcalf, Leigh, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4556234">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Conducting computer security assessments at nuclear facilities. ent://SD_ILS/0/SD_ILS:1125913 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z <a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4853352">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer security incident response planning at nuclear facilities ent://SD_ILS/0/SD_ILS:1125914 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;International Atomic Energy Agency.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4853353">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber-risk informatics : engineering evaluation with data science ent://SD_ILS/0/SD_ILS:1166068 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Sahinoglu, Mehmet, 1951-.<br/>Format:&#160;Kitap<br/> The defende&#341;s dilemma : charting a course toward cybersecurity ent://SD_ILS/0/SD_ILS:1050852 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Libicki, Martin C., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2075897">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Introduction to US cybersecurity careers ent://SD_ILS/0/SD_ILS:1042568 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1888758">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security intelligence : a practitioner's guide to solving enterprise security challenges ent://SD_ILS/0/SD_ILS:1042735 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Li, Qing, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1895130">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Digital identity management ent://SD_ILS/0/SD_ILS:1047336 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Laurent, Maryline, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2007485">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber resilience best practices ent://SD_ILS/0/SD_ILS:1104467 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;AXELOS Limited, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4187569">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> E-commerce ent://SD_ILS/0/SD_ILS:1134531 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Mourya, S. K., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5248356">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The security consultant's handbook ent://SD_ILS/0/SD_ILS:1106986 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Bingley, Richard, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4395799">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Application security in the ISO 27001:2013 environment ent://SD_ILS/0/SD_ILS:1106987 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Vasudevan, Vinod, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4395800">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Online security for the business traveler ent://SD_ILS/0/SD_ILS:1036251 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Gonzalez, Deborah, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1772301">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> CyberWar, CyberTerror, CyberCrime and CyberActivism : an in-depth guide to the role of standards in cybersecurity enviroment ent://SD_ILS/0/SD_ILS:1037081 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Mehan, Julie E., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778762">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security careers : skills, compensation, and career paths ent://SD_ILS/0/SD_ILS:1025703 2025-12-24T14:19:06Z 2025-12-24T14:19:06Z by&#160;Walker, Stephen W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1598238">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/>