Arama Sonuçları Computer networks -- Security measures.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dComputer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300?dt=list2026-01-01T20:36:50ZIdentity management concepts, technologies, and systemsent://SD_ILS/0/SD_ILS:9725072026-01-01T20:36:50Z2026-01-01T20:36:50Zby Bertino, Elisa.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=634511">Click to View</a><br/>Format: Elektronik Kaynak<br/>Unauthorised access physical penetration testing for IT security teamsent://SD_ILS/0/SD_ILS:9587762026-01-01T20:36:50Z2026-01-01T20:36:50Zby Allsopp, Wil.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=470412">Click to View</a><br/>Format: Elektronik Kaynak<br/>Applied network security : master the art of detecting and averting advanced network security attacks and techniquesent://SD_ILS/0/SD_ILS:11258302026-01-01T20:36:50Z2026-01-01T20:36:50Zby Salmon, Arthur, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4853051">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:11925942026-01-01T20:36:50Z2026-01-01T20:36:50Zby Vacca, John R.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123743541">https://www.sciencedirect.com/science/book/9780123743541</a><br/>Format: Elektronik Kaynak<br/>Secure your network for free : using NMAP, wireshark, snort, nessus, and MRTGent://SD_ILS/0/SD_ILS:11882782026-01-01T20:36:50Z2026-01-01T20:36:50Zby Seagren, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491235">http://www.sciencedirect.com/science/book/9781597491235</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity today and tomorrow pay now or pay laterent://SD_ILS/0/SD_ILS:10825832026-01-01T20:36:50Z2026-01-01T20:36:50Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3375180">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security+ study guide and DVD training systement://SD_ILS/0/SD_ILS:9395692026-01-01T20:36:50Z2026-01-01T20:36:50Zby Cross, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294357">Click to View</a><br/>Format: Elektronik Kaynak<br/>Eleventh hour CISSP : study guideent://SD_ILS/0/SD_ILS:11831382026-01-01T20:36:50Z2026-01-01T20:36:50Zby Conrad, Eric, 1967-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495660">https://www.sciencedirect.com/science/book/9781597495660</a><br/>Format: Elektronik Kaynak<br/>Syngress IT security project management handbookent://SD_ILS/0/SD_ILS:11882652026-01-01T20:36:50Z2026-01-01T20:36:50Zby Snedaker, Susan.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490764">http://www.sciencedirect.com/science/book/9781597490764</a><br/>Format: Elektronik Kaynak<br/>Security+ study guide & DVD training systement://SD_ILS/0/SD_ILS:11864622026-01-01T20:36:50Z2026-01-01T20:36:50Zby Cross, Michael, 1965-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491532">https://www.sciencedirect.com/science/book/9781597491532</a><br/>Format: Elektronik Kaynak<br/>GFI network security and PCI compliance power toolsent://SD_ILS/0/SD_ILS:11918272026-01-01T20:36:50Z2026-01-01T20:36:50Zby Posey, Brien.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492850">https://www.sciencedirect.com/science/book/9781597492850</a><br/>Format: Elektronik Kaynak<br/>Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilitiesent://SD_ILS/0/SD_ILS:10856922026-01-01T20:36:50Z2026-01-01T20:36:50Zby Dam, Kenneth W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3378552">Click to View</a><br/>Format: Elektronik Kaynak<br/>Kendi siteni kendin koruent://SD_ILS/0/SD_ILS:11965542026-01-01T20:36:50Z2026-01-01T20:36:50Zby Büyükgöze, Selma.<br/>Format: Kitap<br/>Kendi siteni kendin koruent://SD_ILS/0/SD_ILS:11957522026-01-01T20:36:50Z2026-01-01T20:36:50Zby Büyükgöze, Selma.<br/>Format: Kitap<br/>Two-factor authenticationent://SD_ILS/0/SD_ILS:10495352026-01-01T20:36:50Z2026-01-01T20:36:50Zby Stanislav, Mark, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2048577">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network securityent://SD_ILS/0/SD_ILS:10385512026-01-01T20:36:50Z2026-01-01T20:36:50Zby Perez, Andre, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1800888">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber securityent://SD_ILS/0/SD_ILS:10257192026-01-01T20:36:50Z2026-01-01T20:36:50Zby Voeller, John G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1598809">Click to View</a><br/>Format: Elektronik Kaynak<br/>Communications and information infrastructure securityent://SD_ILS/0/SD_ILS:10257202026-01-01T20:36:50Z2026-01-01T20:36:50Zby Voeller, John G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1598810">Click to View</a><br/>Format: Elektronik Kaynak<br/>IV. Ağ ve Bilgi Güvenliği Sempozyumu : bildiriler kitabı, 25-26 Kasım 2011, Ankara.ent://SD_ILS/0/SD_ILS:11639772026-01-01T20:36:50Z2026-01-01T20:36:50Zby Ağ ve Bilgi Güvenliği Sempozyumu (4th : 2011 : Ankara, Turkey)<br/>Format: Kitap<br/>Network security jumpstartent://SD_ILS/0/SD_ILS:9360082026-01-01T20:36:50Z2026-01-01T20:36:50Zby Strebe, Matthew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=272216">Click to View</a><br/>Format: Elektronik Kaynak<br/>Teknik, teorik bilgilerle, akademiye uygun siber güvenlik : Türkiye'nin siber gücü ve dünyadan örneklerent://SD_ILS/0/SD_ILS:12251132026-01-01T20:36:50Z2026-01-01T20:36:50Zby Paltacı, Bahtiyar M., yazar.<br/>Format: Kitap<br/>Cyber smart : five habits to protect your family, money, and identity from cyber criminalsent://SD_ILS/0/SD_ILS:11439062026-01-01T20:36:50Z2026-01-01T20:36:50Zby McDonough, Bart, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5612908">Click to View</a><br/>Format: Elektronik Kaynak<br/>Practical cyber intelligence : how action-based intelligence can be an effective response to incidentsent://SD_ILS/0/SD_ILS:11366932026-01-01T20:36:50Z2026-01-01T20:36:50Zby Bautista, Wilson, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5332127">Click to View</a><br/>Format: Elektronik Kaynak<br/>Learn social engineering : learn the art of human hacking with an internationally renowned expertent://SD_ILS/0/SD_ILS:11375602026-01-01T20:36:50Z2026-01-01T20:36:50Zby Ozkaya, Erdal, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5379705">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network security and cryptography : a self-teaching introductionent://SD_ILS/0/SD_ILS:11378042026-01-01T20:36:50Z2026-01-01T20:36:50Zby Musa, Sarhan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5389089">Click to View</a><br/>Format: Elektronik Kaynak<br/>.NET Standard 2.0 Cookbook : develop high quality, fast and portable applications by leveraging the power of .NET Standard Libraryent://SD_ILS/0/SD_ILS:11381412026-01-01T20:36:50Z2026-01-01T20:36:50Zby Ismail, Fiqri, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5400395">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network vulnerability assessment : identify security loopholes in your network's infrastructureent://SD_ILS/0/SD_ILS:11417442026-01-01T20:36:50Z2026-01-01T20:36:50Zby Rahalkar, Sagar, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5507753">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security and privacy in cyber-physical systems : foundations, principles, and applicationsent://SD_ILS/0/SD_ILS:11290492026-01-01T20:36:50Z2026-01-01T20:36:50Zby Song, Houbing, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4987646">Click to View</a><br/>Format: Elektronik Kaynak<br/>Advanced persistent threat : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategiesent://SD_ILS/0/SD_ILS:11200822026-01-01T20:36:50Z2026-01-01T20:36:50Zby Winkler, Ira, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4730826">Click to View</a><br/>Format: Elektronik Kaynak<br/>Safety of web applications : risks, encryption and handling vulnerabilities with PHPent://SD_ILS/0/SD_ILS:11253102026-01-01T20:36:50Z2026-01-01T20:36:50Zby Quinton, Eric, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4840953">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:11262122026-01-01T20:36:50Z2026-01-01T20:36:50Zby Vacca, John R., editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4858374">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security operations center guidebook : a practical guide for a successful SOCent://SD_ILS/0/SD_ILS:11264572026-01-01T20:36:50Z2026-01-01T20:36:50Zby Jarpey, Gregory , author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4862661">Click to View</a><br/>Format: Elektronik Kaynak<br/>Loseless information : hiding in imagesent://SD_ILS/0/SD_ILS:11206462026-01-01T20:36:50Z2026-01-01T20:36:50Zby Lu, Zhe-Ming, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4743573">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security in network functions virtualizationent://SD_ILS/0/SD_ILS:11319052026-01-01T20:36:50Z2026-01-01T20:36:50Zby Zhang, Zonghua, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5152998">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information security handbook : develop a threat model and incident response strategy to build a strong information security frameworkent://SD_ILS/0/SD_ILS:11333812026-01-01T20:36:50Z2026-01-01T20:36:50Zby Death, Darren, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5183382">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network forensicsent://SD_ILS/0/SD_ILS:11282472026-01-01T20:36:50Z2026-01-01T20:36:50Zby Messier, Ric, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4917496">Click to View</a><br/>Format: Elektronik Kaynak<br/>Dns security : defending the domain name systement://SD_ILS/0/SD_ILS:11132152026-01-01T20:36:50Z2026-01-01T20:36:50Zby Liska, Allan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4556898">Click to View</a><br/>Format: Elektronik Kaynak<br/>Data breach preparation and response : breaches are certain, impact is notent://SD_ILS/0/SD_ILS:11132162026-01-01T20:36:50Z2026-01-01T20:36:50Zby Fowler, Kevvie, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4556899">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber guerillaent://SD_ILS/0/SD_ILS:11132622026-01-01T20:36:50Z2026-01-01T20:36:50Zby Haaster, Jelle van, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4557157">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security in fixed and wireless networksent://SD_ILS/0/SD_ILS:11155852026-01-01T20:36:50Z2026-01-01T20:36:50Zby Schäfer, Günter, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4658592">Click to View</a><br/>Format: Elektronik Kaynak<br/>Building a corporate culture of security : strategies for strengthening organizational resiliencyent://SD_ILS/0/SD_ILS:11083492026-01-01T20:36:50Z2026-01-01T20:36:50Zby Sullivant, John, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4425984">Click to View</a><br/>Format: Elektronik Kaynak<br/>Web application security is a stack : how to CYA (Cover Your Apps) completelyent://SD_ILS/0/SD_ILS:10538362026-01-01T20:36:50Z2026-01-01T20:36:50Zby Vittie, Lori Mac, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192126">Click to View</a><br/>Format: Elektronik Kaynak<br/>Python passive network mapping : P2NMAPent://SD_ILS/0/SD_ILS:10505042026-01-01T20:36:50Z2026-01-01T20:36:50Zby Hosmer, Chet, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2068785">Click to View</a><br/>Format: Elektronik Kaynak<br/>Introduction to network security : theory and practiceent://SD_ILS/0/SD_ILS:11031222026-01-01T20:36:50Z2026-01-01T20:36:50Zby Wang, Jie, 1961- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040040">Click to View</a><br/>Format: Elektronik Kaynak<br/>The network security test lab : a step-by-step guideent://SD_ILS/0/SD_ILS:11031432026-01-01T20:36:50Z2026-01-01T20:36:50Zby Gregg, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040350">Click to View</a><br/>Format: Elektronik Kaynak<br/>Building an intelligence-led security programent://SD_ILS/0/SD_ILS:10425612026-01-01T20:36:50Z2026-01-01T20:36:50Zby Liska, Allan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1888751">Click to View</a><br/>Format: Elektronik Kaynak<br/>How to define and build an effective cyber threat intelligence capabilityent://SD_ILS/0/SD_ILS:10425652026-01-01T20:36:50Z2026-01-01T20:36:50Zby Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1888755">Click to View</a><br/>Format: Elektronik Kaynak<br/>How to defeat advanced malware : new tools for protection and forensicsent://SD_ILS/0/SD_ILS:10425662026-01-01T20:36:50Z2026-01-01T20:36:50Zby Dalziel, Max, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1888756">Click to View</a><br/>Format: Elektronik Kaynak<br/>Beyond cybersecurity : protecting your digital businessent://SD_ILS/0/SD_ILS:10427752026-01-01T20:36:50Z2026-01-01T20:36:50Zby Kaplan, James M., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1895275">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security technology convergence insightsent://SD_ILS/0/SD_ILS:10475052026-01-01T20:36:50Z2026-01-01T20:36:50Zby Bernard, Ray, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2008287">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking web intelligence : open source intelligence and web reconnaissance concepts and techniquesent://SD_ILS/0/SD_ILS:10478512026-01-01T20:36:50Z2026-01-01T20:36:50Zby Chauhan, Sudhanshu, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2025500">Click to View</a><br/>Format: Elektronik Kaynak<br/>Managing online risk : apps, mobile, and social media securityent://SD_ILS/0/SD_ILS:10381762026-01-01T20:36:50Z2026-01-01T20:36:50Zby Gonzalez, Deborah, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1798304">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computational network science : an algorithmic approachent://SD_ILS/0/SD_ILS:10381842026-01-01T20:36:50Z2026-01-01T20:36:50Zby Hexmoor, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1798312">Click to View</a><br/>Format: Elektronik Kaynak<br/>Assessing information security : strategies, tactics, logic and frameworkent://SD_ILS/0/SD_ILS:10538342026-01-01T20:36:50Z2026-01-01T20:36:50Zby Vladimirov, A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192124">Click to View</a><br/>Format: Elektronik Kaynak<br/>Targeted cyber attacks : multi-staged attacks driven by exploits and malwareent://SD_ILS/0/SD_ILS:10297842026-01-01T20:36:50Z2026-01-01T20:36:50Zby Sood, Aditya K., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1673591">Click to View</a><br/>Format: Elektronik Kaynak<br/>Procuring penetration testing services.ent://SD_ILS/0/SD_ILS:10370852026-01-01T20:36:50Z2026-01-01T20:36:50Z<a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778766">Click to View</a><br/>Format: Elektronik Kaynak<br/>Integrated security systems design : a complete reference for building enterprise-wide digital security systemsent://SD_ILS/0/SD_ILS:10373432026-01-01T20:36:50Z2026-01-01T20:36:50Zby Norman, Thomas, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1781681">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity : managing systems, conducting testing, and investigating intrusionsent://SD_ILS/0/SD_ILS:10215162026-01-01T20:36:50Z2026-01-01T20:36:50Zby Mowbray, Thomas J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1481185">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity for executives : a practical guideent://SD_ILS/0/SD_ILS:10325942026-01-01T20:36:50Z2026-01-01T20:36:50Zby Touhill, Gregory J., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1707094">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network and system securityent://SD_ILS/0/SD_ILS:10185012026-01-01T20:36:50Z2026-01-01T20:36:50Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1364061">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security patterns in practice : designing secure architectures using software patternsent://SD_ILS/0/SD_ILS:10158112026-01-01T20:36:50Z2026-01-01T20:36:50Zby Fernandez, Eduardo B., 1936- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1245159">Click to View</a><br/>Format: Elektronik Kaynak<br/>What should go on the internet? : privacy, freedom, and security onlineent://SD_ILS/0/SD_ILS:11118342026-01-01T20:36:50Z2026-01-01T20:36:50Zby Engel, Mary, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4533280">Click to View</a><br/>Format: Elektronik Kaynak<br/>Federated identity primerent://SD_ILS/0/SD_ILS:10046722026-01-01T20:36:50Z2026-01-01T20:36:50Zby Rountree, Derrick.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1081145">Click to View</a><br/>Format: Elektronik Kaynak<br/>Practical anonymity hiding in plain sight onlineent://SD_ILS/0/SD_ILS:10076142026-01-01T20:36:50Z2026-01-01T20:36:50Zby Loshin, Peter.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115167">Click to View</a><br/>Format: Elektronik Kaynak<br/>UTM security with Fortinet Mastering FortiOSent://SD_ILS/0/SD_ILS:10034962026-01-01T20:36:50Z2026-01-01T20:36:50Zby Tam, Kenneth.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1068442">Click to View</a><br/>Format: Elektronik Kaynak<br/>Advanced persistent threat understanding the danger and how to protect your organizationent://SD_ILS/0/SD_ILS:10039212026-01-01T20:36:50Z2026-01-01T20:36:50Zby Cole, Eric.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073020">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:10141912026-01-01T20:36:50Z2026-01-01T20:36:50Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1195617">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security risks in social media technologies : safe practices in public service applicationsent://SD_ILS/0/SD_ILS:10237762026-01-01T20:36:50Z2026-01-01T20:36:50Zby Oxley, Alan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1574994">Click to View</a><br/>Format: Elektronik Kaynak<br/>Data visualization. Part 2ent://SD_ILS/0/SD_ILS:10242062026-01-01T20:36:50Z2026-01-01T20:36:50Zby Assam, Tarek.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1579356">Click to View</a><br/>Format: Elektronik Kaynak<br/>Client-side attacks and defenseent://SD_ILS/0/SD_ILS:10019052026-01-01T20:36:50Z2026-01-01T20:36:50Zby Shimonski, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1036349">Click to View</a><br/>Format: Elektronik Kaynak<br/>Client-Honeypots : exploring malicious websitesent://SD_ILS/0/SD_ILS:10177762026-01-01T20:36:50Z2026-01-01T20:36:50Zby Göbel, Jan Gerrit, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1348689">Click to View</a><br/>Format: Elektronik Kaynak<br/>Implementing SSL/TLS using cryptography and PKIent://SD_ILS/0/SD_ILS:9790072026-01-01T20:36:50Z2026-01-01T20:36:50Zby Davies, Joshua Dennis.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706899">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security risk management building an information security risk management program from the ground upent://SD_ILS/0/SD_ILS:9768042026-01-01T20:36:50Z2026-01-01T20:36:50Zby Wheeler, Evan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=685406">Click to View</a><br/>Format: Elektronik Kaynak<br/>BackTrack 4 assuring security by penetration testing : master the art of penetration testing with BackTrackent://SD_ILS/0/SD_ILS:9969682026-01-01T20:36:50Z2026-01-01T20:36:50Zby Ali, Shakeel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=950518">Click to View</a><br/>Format: Elektronik Kaynak<br/>Adaptive security management architectureent://SD_ILS/0/SD_ILS:9722382026-01-01T20:36:50Z2026-01-01T20:36:50Zby Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=625004">Click to View</a><br/>Format: Elektronik Kaynak<br/>IT compliance and controls best practices for implementationent://SD_ILS/0/SD_ILS:9450512026-01-01T20:36:50Z2026-01-01T20:36:50Zby DeLuccia, James J., 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=335724">Click to View</a><br/>Format: Elektronik Kaynak<br/>Secure computer and network systems modeling, analysis and designent://SD_ILS/0/SD_ILS:9463852026-01-01T20:36:50Z2026-01-01T20:36:50Zby Ye, Nong.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=351427">Click to View</a><br/>Format: Elektronik Kaynak<br/>Implementing 802.1X security solutions for wired and wireless networksent://SD_ILS/0/SD_ILS:9465792026-01-01T20:36:50Z2026-01-01T20:36:50Zby Geier, James T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=353449">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network security assessment from vulnerability to patchent://SD_ILS/0/SD_ILS:9370382026-01-01T20:36:50Z2026-01-01T20:36:50Zby Manzuik, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=280219">Click to View</a><br/>Format: Elektronik Kaynak<br/>Integrated security systems design concepts, specifications, and implementationent://SD_ILS/0/SD_ILS:9382982026-01-01T20:36:50Z2026-01-01T20:36:50Zby Norman, Thomas L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=287955">Click to View</a><br/>Format: Elektronik Kaynak<br/>Developer's guide to web application securityent://SD_ILS/0/SD_ILS:9385212026-01-01T20:36:50Z2026-01-01T20:36:50Zby Cross, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=289735">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security data visualization graphical techniques for network analysisent://SD_ILS/0/SD_ILS:10584542026-01-01T20:36:50Z2026-01-01T20:36:50Zby Conti, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3017625">Click to View</a><br/>Format: Elektronik Kaynak<br/>How to cheat at managing information securityent://SD_ILS/0/SD_ILS:9347422026-01-01T20:36:50Z2026-01-01T20:36:50Zby Osborne, Mark.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=266207">Click to View</a><br/>Format: Elektronik Kaynak<br/>Firewall policies and VPN configurationsent://SD_ILS/0/SD_ILS:9359862026-01-01T20:36:50Z2026-01-01T20:36:50Zby Cantrell, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=272100">Click to View</a><br/>Format: Elektronik Kaynak<br/>Configuring SonicWALL firewallsent://SD_ILS/0/SD_ILS:9340732026-01-01T20:36:50Z2026-01-01T20:36:50Zby Lathem, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=256369">Click to View</a><br/>Format: Elektronik Kaynak<br/>Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasuresent://SD_ILS/0/SD_ILS:9394832026-01-01T20:36:50Z2026-01-01T20:36:50Zby Contos, Brian T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294116">Click to View</a><br/>Format: Elektronik Kaynak<br/>Designing and building enterprise DMZsent://SD_ILS/0/SD_ILS:9433482026-01-01T20:36:50Z2026-01-01T20:36:50Zby Flynn, Hal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=319198">Click to View</a><br/>Format: Elektronik Kaynak<br/>Silence on the wire a field guide to passive reconnaissance and indirect attacksent://SD_ILS/0/SD_ILS:9365792026-01-01T20:36:50Z2026-01-01T20:36:50Zby Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273504">Click to View</a><br/>Format: Elektronik Kaynak<br/>Buffer overflow attacks detect, exploit, preventent://SD_ILS/0/SD_ILS:9302072026-01-01T20:36:50Z2026-01-01T20:36:50Zby Foster, James C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=222803">Click to View</a><br/>Format: Elektronik Kaynak<br/>Host integrity monitoring using Osiris and Samhainent://SD_ILS/0/SD_ILS:9316062026-01-01T20:36:50Z2026-01-01T20:36:50Zby Wotring, Brian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=233599">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cisco Pix firewalls configure, manage and troubleshootent://SD_ILS/0/SD_ILS:9338592026-01-01T20:36:50Z2026-01-01T20:36:50Zby Behrens, Thorsten.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254835">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network security evaluation using the NSA IEMent://SD_ILS/0/SD_ILS:9338662026-01-01T20:36:50Z2026-01-01T20:36:50Zby Fuller, Ed.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254842">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network security foundationsent://SD_ILS/0/SD_ILS:9350402026-01-01T20:36:50Z2026-01-01T20:36:50Zby Strebe, Matthew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=267332">Click to View</a><br/>Format: Elektronik Kaynak<br/>How to cheat at Configuring ISA Server 2004ent://SD_ILS/0/SD_ILS:9338772026-01-01T20:36:50Z2026-01-01T20:36:50Zby Shinder, Dr. Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254853">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking the code ASP. NET web application securityent://SD_ILS/0/SD_ILS:9395062026-01-01T20:36:50Z2026-01-01T20:36:50Zby Burnett, Mark (Mark M.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294160">Click to View</a><br/>Format: Elektronik Kaynak<br/>Ethereal packet sniffingent://SD_ILS/0/SD_ILS:9394852026-01-01T20:36:50Z2026-01-01T20:36:50Zby Orebaugh, Angela.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294122">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security sage's guide to hardening the network infrastructureent://SD_ILS/0/SD_ILS:9395712026-01-01T20:36:50Z2026-01-01T20:36:50Zby Andrés, Steven.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294359">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cisco security professional's guide to secure intrusion detection systemsent://SD_ILS/0/SD_ILS:9394512026-01-01T20:36:50Z2026-01-01T20:36:50Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294035">Click to View</a><br/>Format: Elektronik Kaynak<br/>Snort 2.0 intrusion detectionent://SD_ILS/0/SD_ILS:9395752026-01-01T20:36:50Z2026-01-01T20:36:50Zby Beale, Jay.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294371">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cisco security specialist's guide to PIX Firewallent://SD_ILS/0/SD_ILS:9394522026-01-01T20:36:50Z2026-01-01T20:36:50Zby Osipov, Vitaly.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294036">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hack proofing ColdFusionent://SD_ILS/0/SD_ILS:9394982026-01-01T20:36:50Z2026-01-01T20:36:50Zby Meyer, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294151">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hack proofing your networkent://SD_ILS/0/SD_ILS:9395042026-01-01T20:36:50Z2026-01-01T20:36:50Zby Ahmad, David R. Mirza.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294158">Click to View</a><br/>Format: Elektronik Kaynak<br/>Nokia Network security solutions handbookent://SD_ILS/0/SD_ILS:9395422026-01-01T20:36:50Z2026-01-01T20:36:50Zby Maxwell, Douglas D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294289">Click to View</a><br/>Format: Elektronik Kaynak<br/>Trust in cyberspaceent://SD_ILS/0/SD_ILS:10859602026-01-01T20:36:50Z2026-01-01T20:36:50Zby Schneider, Fred B.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3378820">Click to View</a><br/>Format: Elektronik Kaynak<br/>Fuzzing for software security testing and quality assuranceent://SD_ILS/0/SD_ILS:11392372026-01-01T20:36:50Z2026-01-01T20:36:50Zby Takanen, Ari, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5430720">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team tacticsent://SD_ILS/0/SD_ILS:11347222026-01-01T20:36:50Z2026-01-01T20:36:50Zby Diogenes, Yuri, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5259454">Click to View</a><br/>Format: Elektronik Kaynak<br/>The five technological forces disrupting security : how social, mobile, cloud and iot are fundamentally changing the practice of physical securityent://SD_ILS/0/SD_ILS:11288832026-01-01T20:36:50Z2026-01-01T20:36:50Zby Van Till, Steve, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4981408">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security and privacy in the digital era. Volume 1ent://SD_ILS/0/SD_ILS:11152702026-01-01T20:36:50Z2026-01-01T20:36:50Zby Guerrier, Claudine, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4648717">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information hiding in communication networks : fundamentals, mechanisms, applications, and countermeasuresent://SD_ILS/0/SD_ILS:11076542026-01-01T20:36:50Z2026-01-01T20:36:50Zby Mazurczyk, Wojciech, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4405578">Click to View</a><br/>Format: Elektronik Kaynak<br/>SSL and TLS : theory and practiceent://SD_ILS/0/SD_ILS:11243182026-01-01T20:36:50Z2026-01-01T20:36:50Zby Oppliger, Rolf, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4821279">Click to View</a><br/>Format: Elektronik Kaynak<br/>Zabbix network monitoring essentials : your one-stop solution to efficient network monitoring with zabbixent://SD_ILS/0/SD_ILS:10460482026-01-01T20:36:50Z2026-01-01T20:36:50Zby Vacche, Andrea Dalle, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1973849">Click to View</a><br/>Format: Elektronik Kaynak<br/>Learning iOS security : enhance the security of your iOS platform and applications using iOS-centric security techniquesent://SD_ILS/0/SD_ILS:10460592026-01-01T20:36:50Z2026-01-01T20:36:50Zby Banks, Allister, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1973863">Click to View</a><br/>Format: Elektronik Kaynak<br/>Understanding bitcoin : cryptography, engineering and economics.ent://SD_ILS/0/SD_ILS:10401802026-01-01T20:36:50Z2026-01-01T20:36:50Zby Franco, Pedro, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1823060">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer forensics with FTK : enhance your computer forensics knowledge through illustrations, tips, tricks, and practical real-world scenariosent://SD_ILS/0/SD_ILS:10291072026-01-01T20:36:50Z2026-01-01T20:36:50Zby Carbone, Fernando, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1657797">Click to View</a><br/>Format: Elektronik Kaynak<br/>Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanningent://SD_ILS/0/SD_ILS:10361782026-01-01T20:36:50Z2026-01-01T20:36:50Zby Hutchens, Justin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1771381">Click to View</a><br/>Format: Elektronik Kaynak<br/>Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013ent://SD_ILS/0/SD_ILS:10350102026-01-01T20:36:50Z2026-01-01T20:36:50Zby Ginodman, Veniamin, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1752831">Click to View</a><br/>Format: Elektronik Kaynak<br/>Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtuallyent://SD_ILS/0/SD_ILS:10281452026-01-01T20:36:50Z2026-01-01T20:36:50Zby Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1644005">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cryptography for security and privacy in cloud computingent://SD_ILS/0/SD_ILS:10209882026-01-01T20:36:50Z2026-01-01T20:36:50Zby Rass, Stefan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1463547">Click to View</a><br/>Format: Elektronik Kaynak<br/>Instant Spring Security starter learn the fundamentals of web authentication and authorization using Spring Securityent://SD_ILS/0/SD_ILS:10162682026-01-01T20:36:50Z2026-01-01T20:36:50Zby Jagielski, Piotr.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1274894">Click to View</a><br/>Format: Elektronik Kaynak<br/>Windows 2012 server network security securing your windows network systems and infrastructureent://SD_ILS/0/SD_ILS:10076102026-01-01T20:36:50Z2026-01-01T20:36:50Zby Rountree, Derrick.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115160">Click to View</a><br/>Format: Elektronik Kaynak<br/>Professional penetration testing creating and learning in a hacking labent://SD_ILS/0/SD_ILS:10076162026-01-01T20:36:50Z2026-01-01T20:36:50Zby Wilhelm, Thomas.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115172">Click to View</a><br/>Format: Elektronik Kaynak<br/>SolarWinds Server & Application Monitor : deployment and administration : an intuitive guide to implementing and calibrating SolarWinds Server & Application Monitor with minimum hassleent://SD_ILS/0/SD_ILS:10246212026-01-01T20:36:50Z2026-01-01T20:36:50Zby Brant, Justin M.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1582950">Click to View</a><br/>Format: Elektronik Kaynak<br/>Web penetration testing with Kali Linux : a practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linuxent://SD_ILS/0/SD_ILS:10200472026-01-01T20:36:50Z2026-01-01T20:36:50Zby Muniz, Joseph.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1420531">Click to View</a><br/>Format: Elektronik Kaynak<br/>CMS security handbook the comprehensive guide for WordPress, Joomla!, Drupal, and Ploneent://SD_ILS/0/SD_ILS:9790052026-01-01T20:36:50Z2026-01-01T20:36:50Zby Canavan, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706893">Click to View</a><br/>Format: Elektronik Kaynak<br/>IBM WebSphere application server V7.0 security secure your WebSphere applications with Java EE and JAAS security standardsent://SD_ILS/0/SD_ILS:9962602026-01-01T20:36:50Z2026-01-01T20:36:50Zby Siliceo, Omar.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=943983">Click to View</a><br/>Format: Elektronik Kaynak<br/>WordPress 3 ultimate security protect your WordPress site and its networkent://SD_ILS/0/SD_ILS:9967892026-01-01T20:36:50Z2026-01-01T20:36:50Zby Connelly, Olly.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948509">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:9556372026-01-01T20:36:50Z2026-01-01T20:36:50Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=453166">Click to View</a><br/>Format: Elektronik Kaynak<br/>Fuzzing for software security testing and quality assuranceent://SD_ILS/0/SD_ILS:9563292026-01-01T20:36:50Z2026-01-01T20:36:50Zby Takanen, Ari.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456884">Click to View</a><br/>Format: Elektronik Kaynak<br/>Toward a safer and more secure cyberspaceent://SD_ILS/0/SD_ILS:10854522026-01-01T20:36:50Z2026-01-01T20:36:50Zby Goodman, Seymour E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3378311">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security in distributed and networking systemsent://SD_ILS/0/SD_ILS:10138972026-01-01T20:36:50Z2026-01-01T20:36:50Zby Pan, Yi, 1960-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1193126">Click to View</a><br/>Format: Elektronik Kaynak<br/>How to cheat at designing security for a Windows Server 2003 networkent://SD_ILS/0/SD_ILS:9338562026-01-01T20:36:50Z2026-01-01T20:36:50Zby Amini, Rob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254832">Click to View</a><br/>Format: Elektronik Kaynak<br/>Securing IM and P2P applications for the enterpriseent://SD_ILS/0/SD_ILS:9338712026-01-01T20:36:50Z2026-01-01T20:36:50Zby Piccard, Paul L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254847">Click to View</a><br/>Format: Elektronik Kaynak<br/>WebSphere application server for z/OS V5 and J2EE 1.3 security handbookent://SD_ILS/0/SD_ILS:10750772026-01-01T20:36:50Z2026-01-01T20:36:50Zby Allison, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306382">Click to View</a><br/>Format: Elektronik Kaynak<br/>z/OS 1.6 security services updateent://SD_ILS/0/SD_ILS:10751482026-01-01T20:36:50Z2026-01-01T20:36:50Zby Kappeler, Patrick.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306453">Click to View</a><br/>Format: Elektronik Kaynak<br/>IBM system z9 109 technical introductionent://SD_ILS/0/SD_ILS:10752772026-01-01T20:36:50Z2026-01-01T20:36:50Zby Ogden, Bill.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306582">Click to View</a><br/>Format: Elektronik Kaynak<br/>Distributed security and high availability with Tivoli Access Manager and WebSphere Application Server for z/OSent://SD_ILS/0/SD_ILS:10752972026-01-01T20:36:50Z2026-01-01T20:36:50Zby Davies, Saida.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306602">Click to View</a><br/>Format: Elektronik Kaynak<br/>z/OS diagnostic data collection and analysisent://SD_ILS/0/SD_ILS:10754652026-01-01T20:36:50Z2026-01-01T20:36:50Zby Rogers, Paul.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306770">Click to View</a><br/>Format: Elektronik Kaynak<br/>Internet applications the emerging global computer.ent://SD_ILS/0/SD_ILS:10920462026-01-01T20:36:50Z2026-01-01T20:36:50Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411450">Click to View</a><br/>Format: Elektronik Kaynak<br/>Special ops host and Network security for Microsoft, UNIX, and Oracleent://SD_ILS/0/SD_ILS:9395772026-01-01T20:36:50Z2026-01-01T20:36:50Zby Birkholz, Erik Pace.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294373">Click to View</a><br/>Format: Elektronik Kaynak<br/>Z/OS WebSphere and J2EE security handbookent://SD_ILS/0/SD_ILS:10753152026-01-01T20:36:50Z2026-01-01T20:36:50Zby Wunderlich, Holger.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306620">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security configuration in a TCP/IP Sysplex environmentent://SD_ILS/0/SD_ILS:10753562026-01-01T20:36:50Z2026-01-01T20:36:50Zby Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306661">Click to View</a><br/>Format: Elektronik Kaynak<br/>Enterprise business portals II with IBM tivoli access managerent://SD_ILS/0/SD_ILS:10754522026-01-01T20:36:50Z2026-01-01T20:36:50Zby Bücker, Axel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306757">Click to View</a><br/>Format: Elektronik Kaynak<br/>The practice of network security monitoring : understanding incident detection and responseent://SD_ILS/0/SD_ILS:10234572026-01-01T20:36:50Z2026-01-01T20:36:50Zby Bejtlich, Richard.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572876">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking web apps detecting and preventing web application security problemsent://SD_ILS/0/SD_ILS:10003712026-01-01T20:36:50Z2026-01-01T20:36:50Zby Shema, Mike.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1012529">Click to View</a><br/>Format: Elektronik Kaynak<br/>Intrusion detection a machine learning approachent://SD_ILS/0/SD_ILS:9811612026-01-01T20:36:50Z2026-01-01T20:36:50Zby Tsai, Jeffrey J.-P.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=737642">Click to View</a><br/>Format: Elektronik Kaynak<br/>Use of risk analysis in computer-aided persuasionent://SD_ILS/0/SD_ILS:9883622026-01-01T20:36:50Z2026-01-01T20:36:50Zby Duman, Ekrem.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=836226">Click to View</a><br/>Format: Elektronik Kaynak<br/>Securing information and communications systems principles, technologies, and applicationsent://SD_ILS/0/SD_ILS:9563262026-01-01T20:36:50Z2026-01-01T20:36:50Zby Furnell, Steven, 1970-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456881">Click to View</a><br/>Format: Elektronik Kaynak<br/>Aspects of network and information securityent://SD_ILS/0/SD_ILS:9471472026-01-01T20:36:50Z2026-01-01T20:36:50Zby NATO Advanced Study Institute on Network Security and Intrusion Detection (2005 : Yerevan, Armenia)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=363205">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information assurance dependability and security in networked systemsent://SD_ILS/0/SD_ILS:9440162026-01-01T20:36:50Z2026-01-01T20:36:50Zby Qian, Yi, 1962-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328312">Click to View</a><br/>Format: Elektronik Kaynak<br/>Nessus, Snort, & Ethereal power tools customizing open source security applicationsent://SD_ILS/0/SD_ILS:9338632026-01-01T20:36:50Z2026-01-01T20:36:50Zby Archibald, Neil.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254839">Click to View</a><br/>Format: Elektronik Kaynak<br/>Implementing SSH strategies for optimizing the Secure Shellent://SD_ILS/0/SD_ILS:9297212026-01-01T20:36:50Z2026-01-01T20:36:50Zby Dwivedi, Himanshu.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=215119">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cisco security professional's guide to secure intrusion detection systemsent://SD_ILS/0/SD_ILS:11884082026-01-01T20:36:50Z2026-01-01T20:36:50Zby Burton, James.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266696">http://www.sciencedirect.com/science/book/9781932266696</a><br/>Format: Elektronik Kaynak<br/>Firewall policies and VPN configurationsent://SD_ILS/0/SD_ILS:11882702026-01-01T20:36:50Z2026-01-01T20:36:50Zby Henmi, Anne.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490887">https://www.sciencedirect.com/science/book/9781597490887</a><br/>Format: Elektronik Kaynak<br/>Insider threat : protecting the enterprise from sabotage, spying, and theftent://SD_ILS/0/SD_ILS:11882592026-01-01T20:36:50Z2026-01-01T20:36:50Zby Cole, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format: Elektronik Kaynak<br/>Security sage's guide to hardening the network infrastructureent://SD_ILS/0/SD_ILS:11883642026-01-01T20:36:50Z2026-01-01T20:36:50Zby Andrés, Steven.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836012">https://www.sciencedirect.com/science/book/9781931836012</a><br/>Format: Elektronik Kaynak<br/>Hack proofing your wireless networkent://SD_ILS/0/SD_ILS:11884872026-01-01T20:36:50Z2026-01-01T20:36:50Zby Barnes, Christian.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994596">http://www.sciencedirect.com/science/book/9781928994596</a><br/>Format: Elektronik Kaynak<br/>Asset protection through security awarenessent://SD_ILS/0/SD_ILS:9874512026-01-01T20:36:50Z2026-01-01T20:36:50Zby Speed, Tyler Justin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826927">Click to View</a><br/>Format: Elektronik Kaynak<br/>Seven deadliest network attacksent://SD_ILS/0/SD_ILS:11780322026-01-01T20:36:50Z2026-01-01T20:36:50Zby Prowell, Stacy J.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495493">https://www.sciencedirect.com/science/book/9781597495493</a><br/>Format: Elektronik Kaynak<br/>How to cheat at securing Linuxent://SD_ILS/0/SD_ILS:11891062026-01-01T20:36:50Z2026-01-01T20:36:50Zby Krishnamurthy Madwachar, Mohan.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492072">https://www.sciencedirect.com/science/book/9781597492072</a><br/>Format: Elektronik Kaynak<br/>Botnets : the killer web appent://SD_ILS/0/SD_ILS:11864442026-01-01T20:36:50Z2026-01-01T20:36:50Zby Schiller, Craig A.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491358">https://www.sciencedirect.com/science/book/9781597491358</a><br/>Format: Elektronik Kaynak<br/>How to cheat at designing security for a Windows Server 2003 networkent://SD_ILS/0/SD_ILS:11882812026-01-01T20:36:50Z2026-01-01T20:36:50Zby Amini, Rob.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492430">https://www.sciencedirect.com/science/book/9781597492430</a><br/>Format: Elektronik Kaynak<br/>Nessus, Snort, & Ethereal power tools : customizing open source security applicationsent://SD_ILS/0/SD_ILS:11882472026-01-01T20:36:50Z2026-01-01T20:36:50Zby Archibald, Neil.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490207">http://www.sciencedirect.com/science/book/9781597490207</a><br/>Format: Elektronik Kaynak<br/>Configuring Check Point NGX VPN-1/fire wall-ent://SD_ILS/0/SD_ILS:11882502026-01-01T20:36:50Z2026-01-01T20:36:50Zby Stephens, Robert.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490313">http://www.sciencedirect.com/science/book/9781597490313</a><br/>Format: Elektronik Kaynak<br/>Ethereal : packet sniffingent://SD_ILS/0/SD_ILS:11884112026-01-01T20:36:50Z2026-01-01T20:36:50Zby Orebaugh, Angela.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266825">http://www.sciencedirect.com/science/book/9781932266825</a><br/>Format: Elektronik Kaynak<br/>Managing and securing a Cisco structured wireless-aware networkent://SD_ILS/0/SD_ILS:11884152026-01-01T20:36:50Z2026-01-01T20:36:50Zby Wall, David.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781932266917">https://www.sciencedirect.com/science/book/9781932266917</a><br/>Format: Elektronik Kaynak<br/>The tangled Web a guide to securing modern Web applicationsent://SD_ILS/0/SD_ILS:10099762026-01-01T20:36:50Z2026-01-01T20:36:50Zby Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137574">Click to View</a><br/>Format: Elektronik Kaynak<br/>Disappearing cryptography : information hiding : steganography & watermarkingent://SD_ILS/0/SD_ILS:11920502026-01-01T20:36:50Z2026-01-01T20:36:50Zby Wayner, Peter, 1964-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123744791">https://www.sciencedirect.com/science/book/9780123744791</a><br/>Format: Elektronik Kaynak<br/>Information assurance : dependability and security in networked systemsent://SD_ILS/0/SD_ILS:11891952026-01-01T20:36:50Z2026-01-01T20:36:50Zby Qian, Yi, 1962-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123735669">https://www.sciencedirect.com/science/book/9780123735669</a><br/>Format: Elektronik Kaynak<br/>Network security : know it allent://SD_ILS/0/SD_ILS:11892572026-01-01T20:36:50Z2026-01-01T20:36:50Zby Joshi, James B. D.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123744630">http://www.sciencedirect.com/science/book/9780123744630</a><br/>Format: Elektronik Kaynak<br/>How to cheat at configuring Open Source security toolsent://SD_ILS/0/SD_ILS:11864652026-01-01T20:36:50Z2026-01-01T20:36:50Zby Alder, Raven.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491709">http://www.sciencedirect.com/science/book/9781597491709</a><br/>Format: Elektronik Kaynak<br/>Integrated security systems design : concepts, specifications, and implementationent://SD_ILS/0/SD_ILS:11879972026-01-01T20:36:50Z2026-01-01T20:36:50Zby Norman, Thomas L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679091">http://www.sciencedirect.com/science/book/9780750679091</a><br/>Format: Elektronik Kaynak<br/>How to cheat at securing your networkent://SD_ILS/0/SD_ILS:11899832026-01-01T20:36:50Z2026-01-01T20:36:50Zby Dubrawsky, Ido.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492317">https://www.sciencedirect.com/science/book/9781597492317</a><br/>Format: Elektronik Kaynak<br/>Developer's guide to web application securityent://SD_ILS/0/SD_ILS:11863712026-01-01T20:36:50Z2026-01-01T20:36:50Zby Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format: Elektronik Kaynak<br/>Designing and building enterprise DMZsent://SD_ILS/0/SD_ILS:11882722026-01-01T20:36:50Z2026-01-01T20:36:50Zby Dubrawsky, Ido.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491006">http://www.sciencedirect.com/science/book/9781597491006</a><br/>Format: Elektronik Kaynak<br/>Security log management : identifying patterns in the chaosent://SD_ILS/0/SD_ILS:11882572026-01-01T20:36:50Z2026-01-01T20:36:50Zby Babbin, Jacob.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490429">http://www.sciencedirect.com/science/book/9781597490429</a><br/>Format: Elektronik Kaynak<br/>Physical security for ITent://SD_ILS/0/SD_ILS:11881102026-01-01T20:36:50Z2026-01-01T20:36:50Zby Erbschloe, Michael, 1951-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583279">http://www.sciencedirect.com/science/book/9781555583279</a><br/>Format: Elektronik Kaynak<br/>Hacking a terror network : the silent threat of covert channelsent://SD_ILS/0/SD_ILS:11883632026-01-01T20:36:50Z2026-01-01T20:36:50Zby Rogers, Russ.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994985">https://www.sciencedirect.com/science/book/9781928994985</a><br/>Format: Elektronik Kaynak<br/>Network security : a practical approachent://SD_ILS/0/SD_ILS:11853532026-01-01T20:36:50Z2026-01-01T20:36:50Zby Harrington, Jan L.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123116338">https://www.sciencedirect.com/science/book/9780123116338</a><br/>Format: Elektronik Kaynak<br/>Snort 2.1 intrusion detectionent://SD_ILS/0/SD_ILS:11883662026-01-01T20:36:50Z2026-01-01T20:36:50Zby Beale, Jay.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836043">https://www.sciencedirect.com/science/book/9781931836043</a><br/>Format: Elektronik Kaynak<br/>Disappearing cryptography : information hiding : steganography & watermarkingent://SD_ILS/0/SD_ILS:11881692026-01-01T20:36:50Z2026-01-01T20:36:50Zby Wayner, Peter, 1964-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607699">http://www.sciencedirect.com/science/book/9781558607699</a><br/>Format: Elektronik Kaynak<br/>Nokia network security solutions handbookent://SD_ILS/0/SD_ILS:11883862026-01-01T20:36:50Z2026-01-01T20:36:50Zby Maxwell, Doug.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836708">http://www.sciencedirect.com/science/book/9781931836708</a><br/>Format: Elektronik Kaynak<br/>Managing Cisco network securityent://SD_ILS/0/SD_ILS:11884932026-01-01T20:36:50Z2026-01-01T20:36:50Zby Knipp, Eric.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836562">https://www.sciencedirect.com/science/book/9781931836562</a><br/>Format: Elektronik Kaynak<br/>Cisco router and switch forensics : investigating and analyzing malicious network activityent://SD_ILS/0/SD_ILS:11928002026-01-01T20:36:50Z2026-01-01T20:36:50Zby Liu, Dale.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494182">https://www.sciencedirect.com/science/book/9781597494182</a><br/>Format: Elektronik Kaynak<br/>Snort : IDS and IPS toolkitent://SD_ILS/0/SD_ILS:11882712026-01-01T20:36:50Z2026-01-01T20:36:50Zby Beale, Jay.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490993">https://www.sciencedirect.com/science/book/9781597490993</a><br/>Format: Elektronik Kaynak<br/>AVIEN malware defense guide for the Enterpriseent://SD_ILS/0/SD_ILS:11891042026-01-01T20:36:50Z2026-01-01T20:36:50Zby Harley, David.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491648">https://www.sciencedirect.com/science/book/9781597491648</a><br/>Format: Elektronik Kaynak<br/>ISA server and beyond : real world security solutions for Microsoft enterprise networksent://SD_ILS/0/SD_ILS:11884952026-01-01T20:36:50Z2026-01-01T20:36:50Zby Shinder, Thomas W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836661">http://www.sciencedirect.com/science/book/9781931836661</a><br/>Format: Elektronik Kaynak<br/>Hack the stack : using snort and ethereal to master the 8 layers of an insecure networkent://SD_ILS/0/SD_ILS:11864272026-01-01T20:36:50Z2026-01-01T20:36:50Zby Gregg, Michael (Michael C.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">http://www.sciencedirect.com/science/book/9781597491099</a><br/>Format: Elektronik Kaynak<br/>Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasuresent://SD_ILS/0/SD_ILS:11864392026-01-01T20:36:50Z2026-01-01T20:36:50Zby Contos, Brian T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491297">https://www.sciencedirect.com/science/book/9781597491297</a><br/>Format: Elektronik Kaynak<br/>Hack proofing your networkent://SD_ILS/0/SD_ILS:11883572026-01-01T20:36:50Z2026-01-01T20:36:50Zby Ahmad, David R. Mirza.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994701">https://www.sciencedirect.com/science/book/9781928994701</a><br/>Format: Elektronik Kaynak<br/>Learning Nessus for penetration testing.ent://SD_ILS/0/SD_ILS:10235072026-01-01T20:36:50Z2026-01-01T20:36:50Zby Kumar, Himanshu.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572937">Click to View</a><br/>Format: Elektronik Kaynak<br/>Smart cities cybersecurity and privacyent://SD_ILS/0/SD_ILS:11438492026-01-01T20:36:50Z2026-01-01T20:36:50Zby Kayhan Zrar Ghafoor, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5609779">Click to View</a><br/>Format: Elektronik Kaynak<br/>Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviorsent://SD_ILS/0/SD_ILS:11462142026-01-01T20:36:50Z2026-01-01T20:36:50Zby Carpenter, Perry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5763515">Click to View</a><br/>Format: Elektronik Kaynak<br/>The business of cybersecurity : foundations and ideologiesent://SD_ILS/0/SD_ILS:11463812026-01-01T20:36:50Z2026-01-01T20:36:50Zby Sathnur, Ashwini, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5770273">Click to View</a><br/>Format: Elektronik Kaynak<br/>Understanding security issuesent://SD_ILS/0/SD_ILS:11325292026-01-01T20:36:50Z2026-01-01T20:36:50Zby Donaldson, Scott E., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5157542">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cloud security automation : get to grips with automating your cloud security on AWS and OpenStackent://SD_ILS/0/SD_ILS:11366912026-01-01T20:36:50Z2026-01-01T20:36:50Zby Priyam, Prashant, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5332125">Click to View</a><br/>Format: Elektronik Kaynak<br/>Practical industrial internet of things security : a practitioner's guide to securing connected industriesent://SD_ILS/0/SD_ILS:11414742026-01-01T20:36:50Z2026-01-01T20:36:50Zby Bhattacharjee, Sravani, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5495617">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security and resilience in intelligent data-centric systems and communication networksent://SD_ILS/0/SD_ILS:11301612026-01-01T20:36:50Z2026-01-01T20:36:50Zby Ficco, Massimo, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5090270">Click to View</a><br/>Format: Elektronik Kaynak<br/>Building a practical information security programent://SD_ILS/0/SD_ILS:11193582026-01-01T20:36:50Z2026-01-01T20:36:50Zby Andress, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4711748">Click to View</a><br/>Format: Elektronik Kaynak<br/>Troubleshooting OpenVPN : get the solutions you need to troubleshoot any issue you may face to keep your OpenVPN up and runningent://SD_ILS/0/SD_ILS:11245492026-01-01T20:36:50Z2026-01-01T20:36:50Zby Crist, Eric F., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4826446">Click to View</a><br/>Format: Elektronik Kaynak<br/>IT-Sicherheitsanalysen : Ein prozessorientiertes Vorgehensmodellent://SD_ILS/0/SD_ILS:11247972026-01-01T20:36:50Z2026-01-01T20:36:50Zby Simić, Daniela, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4830572">Click to View</a><br/>Format: Elektronik Kaynak<br/>IoT security issuesent://SD_ILS/0/SD_ILS:11235192026-01-01T20:36:50Z2026-01-01T20:36:50Zby Gilchrist, Alasdair, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4810138">Click to View</a><br/>Format: Elektronik Kaynak<br/>Advanced penetration testing : hacking the world's most secure networksent://SD_ILS/0/SD_ILS:11237222026-01-01T20:36:50Z2026-01-01T20:36:50Zby Allsopp, Wil, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4813145">Click to View</a><br/>Format: Elektronik Kaynak<br/>Enterprise cloud security and governance : efficiently set data protection and privacy principlesent://SD_ILS/0/SD_ILS:11338402026-01-01T20:36:50Z2026-01-01T20:36:50Zby Vora, Zeal, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5216128">Click to View</a><br/>Format: Elektronik Kaynak<br/>Mastering Kali Linux for web penetration testing : test and evaluate all aspects of the design and implentationent://SD_ILS/0/SD_ILS:11277352026-01-01T20:36:50Z2026-01-01T20:36:50Zby McPhee, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4891263">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber security awareness for CEOs and managementent://SD_ILS/0/SD_ILS:11045662026-01-01T20:36:50Z2026-01-01T20:36:50Zby Willson, David, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4189279">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network performance and security : testing and analyzing using open source and low-cost toolsent://SD_ILS/0/SD_ILS:11090632026-01-01T20:36:50Z2026-01-01T20:36:50Zby Chapman, Chris, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4452265">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network attacks & exploitation : a frameworkent://SD_ILS/0/SD_ILS:11031442026-01-01T20:36:50Z2026-01-01T20:36:50Zby Monte, Matthew, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040351">Click to View</a><br/>Format: Elektronik Kaynak<br/>PCI compliance : understand and implement effective PCI data security standard complianceent://SD_ILS/0/SD_ILS:10405702026-01-01T20:36:50Z2026-01-01T20:36:50Zby Williams, Branden R., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1832710">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking with Kali : practical penetration testing techniquesent://SD_ILS/0/SD_ILS:10076192026-01-01T20:36:50Z2026-01-01T20:36:50Zby Broad, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115177">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information security breaches : avoidance and treatment based on ISO27001ent://SD_ILS/0/SD_ILS:10370822026-01-01T20:36:50Z2026-01-01T20:36:50Zby Krausz, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778763">Click to View</a><br/>Format: Elektronik Kaynak<br/>The benefits and security risks of web-based applications for business trend reportent://SD_ILS/0/SD_ILS:10147332026-01-01T20:36:50Z2026-01-01T20:36:50Zby Kotwica, Kathleen.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1210948">Click to View</a><br/>Format: Elektronik Kaynak<br/>Pragmatic security metrics applying metametrics to information securityent://SD_ILS/0/SD_ILS:10109722026-01-01T20:36:50Z2026-01-01T20:36:50Zby Brotby, W. Krag.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1153198">Click to View</a><br/>Format: Elektronik Kaynak<br/>Microsoft DirectAccess best practices and troubleshootingent://SD_ILS/0/SD_ILS:10192612026-01-01T20:36:50Z2026-01-01T20:36:50Zby Krause, Jordan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1389355">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security for service oriented systemsent://SD_ILS/0/SD_ILS:9723452026-01-01T20:36:50Z2026-01-01T20:36:50Zby Thuraisingham, Bhavani M.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=631696">Click to View</a><br/>Format: Elektronik Kaynak<br/>Managing information securityent://SD_ILS/0/SD_ILS:10183422026-01-01T20:36:50Z2026-01-01T20:36:50Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1357643">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security the human factorent://SD_ILS/0/SD_ILS:9730592026-01-01T20:36:50Z2026-01-01T20:36:50Zby Kearney, Paul.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=647939">Click to View</a><br/>Format: Elektronik Kaynak<br/>Build your own security lab a field guide for network testingent://SD_ILS/0/SD_ILS:9470742026-01-01T20:36:50Z2026-01-01T20:36:50Zby Gregg, Michael (Michael C.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=362050">Click to View</a><br/>Format: Elektronik Kaynak<br/>Configuring NetScreen Firewallsent://SD_ILS/0/SD_ILS:9394612026-01-01T20:36:50Z2026-01-01T20:36:50Zby Cameron, Rob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294055">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber adversary characterization auditing the hacker mindent://SD_ILS/0/SD_ILS:9394692026-01-01T20:36:50Z2026-01-01T20:36:50Zby Parker, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294071">Click to View</a><br/>Format: Elektronik Kaynak<br/>Nessus network auditingent://SD_ILS/0/SD_ILS:9395402026-01-01T20:36:50Z2026-01-01T20:36:50Zby Beale, Jay.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294281">Click to View</a><br/>Format: Elektronik Kaynak<br/>Virtual private networking a construction, operation and utilization guideent://SD_ILS/0/SD_ILS:9587982026-01-01T20:36:50Z2026-01-01T20:36:50Zby Held, Gilbert, 1943-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=470565">Click to View</a><br/>Format: Elektronik Kaynak<br/>Best damn firewall book periodent://SD_ILS/0/SD_ILS:9395852026-01-01T20:36:50Z2026-01-01T20:36:50Zby Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294396">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity operations handbookent://SD_ILS/0/SD_ILS:9426132026-01-01T20:36:50Z2026-01-01T20:36:50Zby Rittinghouse, John W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=313612">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hack proofing your wireless networkent://SD_ILS/0/SD_ILS:9395072026-01-01T20:36:50Z2026-01-01T20:36:50Zby Owens, Les.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294161">Click to View</a><br/>Format: Elektronik Kaynak<br/>A technical guide to IPSec virtual private networksent://SD_ILS/0/SD_ILS:10476252026-01-01T20:36:50Z2026-01-01T20:36:50Zby Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2010400">Click to View</a><br/>Format: Elektronik Kaynak<br/>Empirical research for software security : foundations and experienceent://SD_ILS/0/SD_ILS:11329732026-01-01T20:36:50Z2026-01-01T20:36:50Zby ben Othmane, Lotfi, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5164090">Click to View</a><br/>Format: Elektronik Kaynak<br/>Kali Linux intrusion and exploitation cookbook : over 70 recipes for system administrator or DevOps to master Kali Linux 2 and perform effective security assessmentent://SD_ILS/0/SD_ILS:11255492026-01-01T20:36:50Z2026-01-01T20:36:50Zby Shah, Dhruv, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4845574">Click to View</a><br/>Format: Elektronik Kaynak<br/>Kali linux wireless penetration testing cookbook : identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless securityent://SD_ILS/0/SD_ILS:11334342026-01-01T20:36:50Z2026-01-01T20:36:50Zby Oriyano, Sean-Philip, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5188228">Click to View</a><br/>Format: Elektronik Kaynak<br/>Critical infrastructure protection in homeland security : defending a networked nationent://SD_ILS/0/SD_ILS:10396662026-01-01T20:36:50Z2026-01-01T20:36:50Zby Lewis, T. G. (Theodore Gyle), 1941- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1813343">Click to View</a><br/>Format: Elektronik Kaynak<br/>Mastering metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approachent://SD_ILS/0/SD_ILS:10253642026-01-01T20:36:50Z2026-01-01T20:36:50Zby Jaswal, Nipun, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1593853">Click to View</a><br/>Format: Elektronik Kaynak<br/>Threat modeling : designing for securityent://SD_ILS/0/SD_ILS:10270482026-01-01T20:36:50Z2026-01-01T20:36:50Zby Shostack, Adam.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629177">Click to View</a><br/>Format: Elektronik Kaynak<br/>Mobile access safety beyond BYODent://SD_ILS/0/SD_ILS:10084142026-01-01T20:36:50Z2026-01-01T20:36:50Zby Assing, Dominique.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1124007">Click to View</a><br/>Format: Elektronik Kaynak<br/>The true cost of information security breaches and cyber crimeent://SD_ILS/0/SD_ILS:10212732026-01-01T20:36:50Z2026-01-01T20:36:50Zby Krausz, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1477418">Click to View</a><br/>Format: Elektronik Kaynak<br/>Enterprise information security and privacyent://SD_ILS/0/SD_ILS:9563312026-01-01T20:36:50Z2026-01-01T20:36:50Zby Axelrod, C. Warren.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456886">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information security and employee behaviour how to reduce risk through employee education, training and awarenessent://SD_ILS/0/SD_ILS:9518692026-01-01T20:36:50Z2026-01-01T20:36:50Zby McIlwraith, Angus.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=429792">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security for mobile networks and platformsent://SD_ILS/0/SD_ILS:9452042026-01-01T20:36:50Z2026-01-01T20:36:50Zby Aissi, Selim.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338731">Click to View</a><br/>Format: Elektronik Kaynak<br/>Configuring SonicWALL firewallsent://SD_ILS/0/SD_ILS:11882822026-01-01T20:36:50Z2026-01-01T20:36:50Zby Bendell, Dan.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492508">http://www.sciencedirect.com/science/book/9781597492508</a><br/>Format: Elektronik Kaynak<br/>Configuring Check Point NGX VPN-1/FireWall-1ent://SD_ILS/0/SD_ILS:9343582026-01-01T20:36:50Z2026-01-01T20:36:50Zby Stephens, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=258633">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network and security issues for internet mobile entertainmentent://SD_ILS/0/SD_ILS:9385962026-01-01T20:36:50Z2026-01-01T20:36:50Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=289848">Click to View</a><br/>Format: Elektronik Kaynak<br/>Outsourcing information securityent://SD_ILS/0/SD_ILS:9310182026-01-01T20:36:50Z2026-01-01T20:36:50Zby Axelrod, C. Warren.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227659">Click to View</a><br/>Format: Elektronik Kaynak<br/>Lotus security handbookent://SD_ILS/0/SD_ILS:10755332026-01-01T20:36:50Z2026-01-01T20:36:50Zby Tworek, William.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306838">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network security a practical guideent://SD_ILS/0/SD_ILS:9403342026-01-01T20:36:50Z2026-01-01T20:36:50Zby Poole, Owen.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=298471">Click to View</a><br/>Format: Elektronik Kaynak<br/>Terrorist use of cyberspace and cyber terrorism : new challenges and reponsesent://SD_ILS/0/SD_ILS:11156412026-01-01T20:36:50Z2026-01-01T20:36:50Z<a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4659193">Click to View</a><br/>Format: Elektronik Kaynak<br/>Comprehensive approach as 'sine qua non' for critical infrastructure protectionent://SD_ILS/0/SD_ILS:10448572026-01-01T20:36:50Z2026-01-01T20:36:50Zby Čaleta, Denis, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1920288">Click to View</a><br/>Format: Elektronik Kaynak<br/>Examining robustness and vulnerability of networked systemsent://SD_ILS/0/SD_ILS:10334292026-01-01T20:36:50Z2026-01-01T20:36:50Zby Butenko, Sergiy, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1720838">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber security and resiliency policy frameworkent://SD_ILS/0/SD_ILS:10398772026-01-01T20:36:50Z2026-01-01T20:36:50Zby Vaseashta, A. (Ashok), editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1818046">Click to View</a><br/>Format: Elektronik Kaynak<br/>Risk propagation assessment for network security application to airport communication network designent://SD_ILS/0/SD_ILS:10120962026-01-01T20:36:50Z2026-01-01T20:36:50Zby Ben Mahmoud, Mohamed Slim.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1168523">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information security a manager's guide to thwarting data thieves and hackersent://SD_ILS/0/SD_ILS:9452882026-01-01T20:36:50Z2026-01-01T20:36:50Zby Alexander, Philip, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=339307">Click to View</a><br/>Format: Elektronik Kaynak<br/>The misuse of information systems the impact of security countermeasuresent://SD_ILS/0/SD_ILS:10580442026-01-01T20:36:50Z2026-01-01T20:36:50Zby D'Arcy, John P., 1975-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3016826">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyberwar-Netwar security in the information ageent://SD_ILS/0/SD_ILS:9352162026-01-01T20:36:50Z2026-01-01T20:36:50Zby NATO Advanced Research Workshop on Cyberwar-Netwar: Security in the Information Age (2003 : Lisbon, Portugal)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=267716">Click to View</a><br/>Format: Elektronik Kaynak<br/>Advances in network and distributed systems security IFIP TC11 WG11.4 First Annual Working Conference on Network Security : November 26-27, 2001, Leuven, Belgiument://SD_ILS/0/SD_ILS:10623432026-01-01T20:36:50Z2026-01-01T20:36:50Zby IFIP TC11 WG11.4 Working Conference on Network Security (1st : 2001 : Louvain, Belgium)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3035322">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity public sector threats and responsesent://SD_ILS/0/SD_ILS:9874582026-01-01T20:36:50Z2026-01-01T20:36:50Zby Andreasson, Kim J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826942">Click to View</a><br/>Format: Elektronik Kaynak<br/>Applied cyber security and the smart grid implementing security controls into the modern power infrastructureent://SD_ILS/0/SD_ILS:10076262026-01-01T20:36:50Z2026-01-01T20:36:50Zby Knapp, Eric D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115187">Click to View</a><br/>Format: Elektronik Kaynak<br/>Asterisk hacking.ent://SD_ILS/0/SD_ILS:11885822026-01-01T20:36:50Z2026-01-01T20:36:50Zby Brashars, Joshua.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491518">http://www.sciencedirect.com/science/book/9781597491518</a><br/>Format: Elektronik Kaynak<br/>Ninja hacking : unconventional penetration testing tactics and techniquesent://SD_ILS/0/SD_ILS:11818282026-01-01T20:36:50Z2026-01-01T20:36:50Zby Wilhelm, Thomas.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495882">http://www.sciencedirect.com/science/book/9781597495882</a><br/>Format: Elektronik Kaynak<br/>Network security evaluation using the NSA IEMent://SD_ILS/0/SD_ILS:11882522026-01-01T20:36:50Z2026-01-01T20:36:50Zby Rogers, Russ.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490351">http://www.sciencedirect.com/science/book/9781597490351</a><br/>Format: Elektronik Kaynak<br/>Check Point Next Generation with application intelligence security administrationent://SD_ILS/0/SD_ILS:11884142026-01-01T20:36:50Z2026-01-01T20:36:50Zby Tobkin, Chris.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781932266894">https://www.sciencedirect.com/science/book/9781932266894</a><br/>Format: Elektronik Kaynak<br/>Information security best practices : 205 basic rulesent://SD_ILS/0/SD_ILS:11883182026-01-01T20:36:50Z2026-01-01T20:36:50Zby Stefanek, George L.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781878707963">https://www.sciencedirect.com/science/book/9781878707963</a><br/>Format: Elektronik Kaynak<br/>CCNA security study guide : exam 210-260ent://SD_ILS/0/SD_ILS:11338212026-01-01T20:36:50Z2026-01-01T20:36:50Zby McMillan, Troy, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5215616">Click to View</a><br/>Format: Elektronik Kaynak<br/>Puppet reporting and monitoring : create insightful reports for your server infrastructure using Puppetent://SD_ILS/0/SD_ILS:10281462026-01-01T20:36:50Z2026-01-01T20:36:50Zby Duffy, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1644006">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security of self-organizing networks MANET, WSN, WMN, VANETent://SD_ILS/0/SD_ILS:9691242026-01-01T20:36:50Z2026-01-01T20:36:50Zby Pathan, Al-Sakib Khan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=599718">Click to View</a><br/>Format: Elektronik Kaynak<br/>How to cheat at securing a wireless networkent://SD_ILS/0/SD_ILS:9366442026-01-01T20:36:50Z2026-01-01T20:36:50Zby Hurley, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=274288">Click to View</a><br/>Format: Elektronik Kaynak<br/>Protecting information on local area networksent://SD_ILS/0/SD_ILS:11758282026-01-01T20:36:50Z2026-01-01T20:36:50Zby Schweitzer, James A., 1929-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780409901382">http://www.sciencedirect.com/science/book/9780409901382</a><br/>Format: Elektronik Kaynak<br/>SAP security configuration and deployment : the IT administrator's guide to best practicesent://SD_ILS/0/SD_ILS:11916222026-01-01T20:36:50Z2026-01-01T20:36:50Zby Wun-Young, Leslie.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492843">http://www.sciencedirect.com/science/book/9781597492843</a><br/>Format: Elektronik Kaynak<br/>Eleventh hour CISSP : study guideent://SD_ILS/0/SD_ILS:11176912026-01-01T20:36:50Z2026-01-01T20:36:50Zby Conrad, Eric, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4673334">Click to View</a><br/>Format: Elektronik Kaynak<br/>Siber güvenlikent://SD_ILS/0/SD_ILS:6683032026-01-01T20:36:50Z2026-01-01T20:36:50Zby Canlı, Mustafa<br/>Format: Kitap<br/>CISSP practice 2,250 questions, answers, and explanations for passing the testent://SD_ILS/0/SD_ILS:9867742026-01-01T20:36:50Z2026-01-01T20:36:50Zby Vallabhaneni, S. Rao.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=819012">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security in wireless LANs and MANsent://SD_ILS/0/SD_ILS:9325072026-01-01T20:36:50Z2026-01-01T20:36:50Zby Hardjono, Thomas.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=240770">Click to View</a><br/>Format: Elektronik Kaynak<br/>Coding for penetration testers building better toolsent://SD_ILS/0/SD_ILS:9835212026-01-01T20:36:50Z2026-01-01T20:36:50Zby Andress, Jason.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=773396">Click to View</a><br/>Format: Elektronik Kaynak<br/>Handbook on securing cyber-physical critical infrastructureent://SD_ILS/0/SD_ILS:9900032026-01-01T20:36:50Z2026-01-01T20:36:50Zby Das, Sajal K.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=858728">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security+ study guide & DVD training systement://SD_ILS/0/SD_ILS:9556242026-01-01T20:36:50Z2026-01-01T20:36:50Zby Cross, Michael, 1965-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=452863">Click to View</a><br/>Format: Elektronik Kaynak<br/>TBMM'de fiziksel ve sanal güvenlik analizient://SD_ILS/0/SD_ILS:998382026-01-01T20:36:50Z2026-01-01T20:36:50Zby Yıldırım, Hakan<br/>Format: Kitap<br/>Official (ISC)2 guide to the CAP CBKent://SD_ILS/0/SD_ILS:9990032026-01-01T20:36:50Z2026-01-01T20:36:50Zby Howard, Patrick D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=981531">Click to View</a><br/>Format: Elektronik Kaynak<br/>Syngress IT security project management handbookent://SD_ILS/0/SD_ILS:9346042026-01-01T20:36:50Z2026-01-01T20:36:50Zby Snedaker, Susan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=261283">Click to View</a><br/>Format: Elektronik Kaynak<br/>E-şirket taktikleri.ent://SD_ILS/0/SD_ILS:2977122026-01-01T20:36:50Z2026-01-01T20:36:50ZFormat: Kitap<br/>Cyber and you : the impact of technology on our livesent://SD_ILS/0/SD_ILS:11471552026-01-01T20:36:50Z2026-01-01T20:36:50Zby Kendal, Maureen, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5811334">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity program development for business : the essential planning guideent://SD_ILS/0/SD_ILS:11371192026-01-01T20:36:50Z2026-01-01T20:36:50Zby Moschovitis, Christos J. P., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5342325">Click to View</a><br/>Format: Elektronik Kaynak<br/>Learn ethical hacking from scratch : your stepping stone to penetration testingent://SD_ILS/0/SD_ILS:11411112026-01-01T20:36:50Z2026-01-01T20:36:50Zby Sabih, Zaid, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5485020">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network security with pfSense : architect, deploy, and operate enterprise-grade firewallsent://SD_ILS/0/SD_ILS:11421282026-01-01T20:36:50Z2026-01-01T20:36:50Zby Aggarwal, Manuj, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5520881">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hands-on security in DevOps : ensure continuous security, deployment, and delivery with DevSecOpsent://SD_ILS/0/SD_ILS:11421322026-01-01T20:36:50Z2026-01-01T20:36:50Zby Hsu, Tony, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5520885">Click to View</a><br/>Format: Elektronik Kaynak<br/>IT-Sicherheit : Eine Einführungent://SD_ILS/0/SD_ILS:11325462026-01-01T20:36:50Z2026-01-01T20:36:50Zby Hellmann, Roland, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5157634">Click to View</a><br/>Format: Elektronik Kaynak<br/>Wireless communications security : solutions for the internet of thingsent://SD_ILS/0/SD_ILS:11182192026-01-01T20:36:50Z2026-01-01T20:36:50Zby Penttinen, Jyrki T. J., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4690021">Click to View</a><br/>Format: Elektronik Kaynak<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:11184652026-01-01T20:36:50Z2026-01-01T20:36:50Zby Faircloth, Jeremy, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4694443">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybercrime and business : strategies for global corporate securityent://SD_ILS/0/SD_ILS:11265202026-01-01T20:36:50Z2026-01-01T20:36:50Zby Moskowitz, Sanford, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4863624">Click to View</a><br/>Format: Elektronik Kaynak<br/>You : for sale protecting your personal data and privacy onlineent://SD_ILS/0/SD_ILS:10537572026-01-01T20:36:50Z2026-01-01T20:36:50Zby Sumner, Stuart, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2187472">Click to View</a><br/>Format: Elektronik Kaynak<br/>Essential skills for hackersent://SD_ILS/0/SD_ILS:11045682026-01-01T20:36:50Z2026-01-01T20:36:50Zby Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4189281">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity and applied mathematicsent://SD_ILS/0/SD_ILS:11131692026-01-01T20:36:50Z2026-01-01T20:36:50Zby Metcalf, Leigh, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4556234">Click to View</a><br/>Format: Elektronik Kaynak<br/>Conducting computer security assessments at nuclear facilities.ent://SD_ILS/0/SD_ILS:11259132026-01-01T20:36:50Z2026-01-01T20:36:50Z<a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4853352">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer security incident response planning at nuclear facilitiesent://SD_ILS/0/SD_ILS:11259142026-01-01T20:36:50Z2026-01-01T20:36:50Zby International Atomic Energy Agency.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4853353">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber-risk informatics : engineering evaluation with data scienceent://SD_ILS/0/SD_ILS:11660682026-01-01T20:36:50Z2026-01-01T20:36:50Zby Sahinoglu, Mehmet, 1951-.<br/>Format: Kitap<br/>The defendeŕs dilemma : charting a course toward cybersecurityent://SD_ILS/0/SD_ILS:10508522026-01-01T20:36:50Z2026-01-01T20:36:50Zby Libicki, Martin C., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2075897">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber resilience best practicesent://SD_ILS/0/SD_ILS:11044672026-01-01T20:36:50Z2026-01-01T20:36:50Zby AXELOS Limited, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4187569">Click to View</a><br/>Format: Elektronik Kaynak<br/>The security consultant's handbookent://SD_ILS/0/SD_ILS:11069862026-01-01T20:36:50Z2026-01-01T20:36:50Zby Bingley, Richard, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4395799">Click to View</a><br/>Format: Elektronik Kaynak<br/>Application security in the ISO 27001:2013 environmentent://SD_ILS/0/SD_ILS:11069872026-01-01T20:36:50Z2026-01-01T20:36:50Zby Vasudevan, Vinod, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4395800">Click to View</a><br/>Format: Elektronik Kaynak<br/>Introduction to US cybersecurity careersent://SD_ILS/0/SD_ILS:10425682026-01-01T20:36:50Z2026-01-01T20:36:50Zby Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1888758">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security intelligence : a practitioner's guide to solving enterprise security challengesent://SD_ILS/0/SD_ILS:10427352026-01-01T20:36:50Z2026-01-01T20:36:50Zby Li, Qing, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1895130">Click to View</a><br/>Format: Elektronik Kaynak<br/>Digital identity managementent://SD_ILS/0/SD_ILS:10473362026-01-01T20:36:50Z2026-01-01T20:36:50Zby Laurent, Maryline, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2007485">Click to View</a><br/>Format: Elektronik Kaynak<br/>E-commerceent://SD_ILS/0/SD_ILS:11345312026-01-01T20:36:50Z2026-01-01T20:36:50Zby Mourya, S. K., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5248356">Click to View</a><br/>Format: Elektronik Kaynak<br/>Online security for the business travelerent://SD_ILS/0/SD_ILS:10362512026-01-01T20:36:50Z2026-01-01T20:36:50Zby Gonzalez, Deborah, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1772301">Click to View</a><br/>Format: Elektronik Kaynak<br/>CyberWar, CyberTerror, CyberCrime and CyberActivism : an in-depth guide to the role of standards in cybersecurity enviromentent://SD_ILS/0/SD_ILS:10370812026-01-01T20:36:50Z2026-01-01T20:36:50Zby Mehan, Julie E., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778762">Click to View</a><br/>Format: Elektronik Kaynak<br/>