Arama Sonu&ccedil;lar&#305; Computer security. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dComputer$002bsecurity.$0026ic$003dtrue$0026ps$003d300?dt=list 2025-12-20T03:43:24Z Computer security ent://SD_ILS/0/SD_ILS:1175090 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Hsiao, David K., 1933-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123576507">https://www.sciencedirect.com/science/book/9780123576507</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer security ent://SD_ILS/0/SD_ILS:1175962 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Carroll, John M. (John Millar), 1925-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780409900323">https://www.sciencedirect.com/science/book/9780409900323</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer security handbook ent://SD_ILS/0/SD_ILS:1028739 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Bosworth, Seymour, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1652940">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:955637 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=453166">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:1192594 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Vacca, John R.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123743541">https://www.sciencedirect.com/science/book/9780123743541</a><br/>Format:&#160;Elektronik Kaynak<br/> Information assurance and computer security ent://SD_ILS/0/SD_ILS:938176 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;NATO Advanced Research Workshop on Information Assurance and Computer Security (2005 : T?etouan, Morocco)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=287000">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:1014191 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1195617">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer security : art and science ent://SD_ILS/0/SD_ILS:64506 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Bishop, Matt (Matthew A.)<br/>Format:&#160;Kitap<br/> Computer security : awareness for the home ent://SD_ILS/0/SD_ILS:1127161 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Cyborski, Shannon, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4876967">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:1126212 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Vacca, John R., editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4858374">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Conducting computer security assessments at nuclear facilities. ent://SD_ILS/0/SD_ILS:1125913 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z <a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4853352">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information management &amp; computer security. Volume 15, Number 5, Papers from the HAISA 2007 Symposium ent://SD_ILS/0/SD_ILS:944119 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328737">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Essential computer security everyone's guide to e-mail, internet, and wireless security ent://SD_ILS/0/SD_ILS:943350 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Bradley, Tony.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=319200">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Essential computer security : everyone's guide to e-mail, internet, and wireless security ent://SD_ILS/0/SD_ILS:1186419 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Bradley, Tony, 1969-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491143">https://www.sciencedirect.com/science/book/9781597491143</a><br/>Format:&#160;Elektronik Kaynak<br/> Risk management for computer security Protecting your network and information assets ent://SD_ILS/0/SD_ILS:939658 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Jones, Andy, 1952-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294671">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer security incident response planning at nuclear facilities ent://SD_ILS/0/SD_ILS:1125914 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;International Atomic Energy Agency.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4853353">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing the cloud cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:977055 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Winkler, J. R. (Joachim R.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=686827">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing the cloud : cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:1183743 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Winkler, J. R. (Joachim R.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer Communication, Networking and Internet Security Proceedings of IC3T 2016 ent://SD_ILS/0/SD_ILS:481714 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3226-4">http://dx.doi.org/10.1007/978-981-10-3226-4</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing the cloud cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:137201 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Winkler, J. R. (Joachim R.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format:&#160;Elektronik Kaynak<br/> Security, privacy and reliability in computer communications and networks ent://SD_ILS/0/SD_ILS:1121784 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Sha, Kewei, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4771355">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Physics and theoretical computer science from numbers and languages to (quantum) cryptography security ent://SD_ILS/0/SD_ILS:940699 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Gazeau, Jean-Pierre.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=305174">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Trust and security in collaborative computing ent://SD_ILS/0/SD_ILS:1030255 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Zou, Xukai, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1679354">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013 ent://SD_ILS/0/SD_ILS:1035010 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Ginodman, Veniamin, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1752831">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security issues of IT outsourcing ent://SD_ILS/0/SD_ILS:938018 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Gritzalis, Stefanos.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=285536">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Firewall design and analysis ent://SD_ILS/0/SD_ILS:980855 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Liu, Alex X.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=731297">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security in distributed and networking systems ent://SD_ILS/0/SD_ILS:1013897 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Pan, Yi, 1960-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1193126">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Defense and detection strategies against Internet worms ent://SD_ILS/0/SD_ILS:931019 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Nazario, Jose.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227660">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information assurance dependability and security in networked systems ent://SD_ILS/0/SD_ILS:944016 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Qian, Yi, 1962-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328312">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing information and communications systems principles, technologies, and applications ent://SD_ILS/0/SD_ILS:956326 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Furnell, Steven, 1970-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456881">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information assurance : dependability and security in networked systems ent://SD_ILS/0/SD_ILS:1189195 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Qian, Yi, 1962-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123735669">https://www.sciencedirect.com/science/book/9780123735669</a><br/>Format:&#160;Elektronik Kaynak<br/> User's guide to cryptography and standards ent://SD_ILS/0/SD_ILS:931017 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Dent, Alexander W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227658">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Privacy protection and computer forensics ent://SD_ILS/0/SD_ILS:931051 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Caloyannides, Michael A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227692">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Techniques and applications of digital watermarking and content protection ent://SD_ILS/0/SD_ILS:930949 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Arnold, Michael (Michael Konrad), 1964-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227587">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security technologies for the World Wide Web ent://SD_ILS/0/SD_ILS:930980 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Oppliger, Rolf.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227620">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Digital watermarking and steganography ent://SD_ILS/0/SD_ILS:944015 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Cox, I. J. (Ingemar J.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328311">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Digital watermarking and steganography ent://SD_ILS/0/SD_ILS:1189196 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Cox, I. J. (Ingemar J.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123725851">http://www.sciencedirect.com/science/book/9780123725851</a><br/>Format:&#160;Elektronik Kaynak<br/> Contemporary cryptography ent://SD_ILS/0/SD_ILS:931287 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Oppliger, Rolf.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=231638">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Bluetooth security ent://SD_ILS/0/SD_ILS:931009 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Gehrmann, Christian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227650">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Outsourcing information security ent://SD_ILS/0/SD_ILS:931018 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Axelrod, C. Warren.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227659">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security in wireless LANs and MANs ent://SD_ILS/0/SD_ILS:932507 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Hardjono, Thomas.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=240770">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Role-based access control ent://SD_ILS/0/SD_ILS:930991 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Ferraiolo, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227631">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Developing secure distributed systems with CORBA ent://SD_ILS/0/SD_ILS:930964 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Lang, Ulrich.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227602">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security in ad hoc and sensor networks ent://SD_ILS/0/SD_ILS:1030254 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Beyah, Raheem (Raheem A.), 1976-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1679353">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information hiding ent://SD_ILS/0/SD_ILS:1124313 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Katzenbeisser, Stefan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4821270">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Implementing electronic card payment systems ent://SD_ILS/0/SD_ILS:930967 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Radu, Cristian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227605">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Growing vulnerability of the public switched networks : implications for national security emergency preparedness. ent://SD_ILS/0/SD_ILS:1106434 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Committee on Review of Switching, Synchronization and Network Control in National Security Telecommunications Board on Telecommunications and Computer Applications Commission on Engineering and Technical Systems National Research Council.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4388299">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Toward better usability, security, and privacy of information technology report of a workshop ent://SD_ILS/0/SD_ILS:1085815 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;National Research Council (U.S.). Steering Committee on the Usability, Security, and Privacy of Computer Systems.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3378675">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> BATSEN: Modifying the BATMAN Routing Protocol for Wireless Sensor Networks ent://SD_ILS/0/SD_ILS:693276 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Powell, Nelson Henry, III, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10816780">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10816780</a><br/>Format:&#160;Kitap<br/> Summary of discussions at a planning meeting on cyber-security and the insider threat to classified information ent://SD_ILS/0/SD_ILS:1084889 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;National Research Council (U.S.). Computer Science and Telecommunications Board.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3377658">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Best damn firewall book period ent://SD_ILS/0/SD_ILS:944260 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=330100">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors ent://SD_ILS/0/SD_ILS:1146214 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Carpenter, Perry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5763515">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The business of cybersecurity : foundations and ideologies ent://SD_ILS/0/SD_ILS:1146381 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Sathnur, Ashwini, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5770273">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Understanding security issues ent://SD_ILS/0/SD_ILS:1132529 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Donaldson, Scott E., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5157542">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security and resilience in intelligent data-centric systems and communication networks ent://SD_ILS/0/SD_ILS:1130161 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Ficco, Massimo, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5090270">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IT-Sicherheitsanalysen : Ein prozessorientiertes Vorgehensmodell ent://SD_ILS/0/SD_ILS:1124797 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Simi&#263;, Daniela, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4830572">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network performance and security : testing and analyzing using open source and low-cost tools ent://SD_ILS/0/SD_ILS:1109063 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Chapman, Chris, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4452265">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security 2020 reduce security risks this decade ent://SD_ILS/0/SD_ILS:978416 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Howard, Doug.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=694289">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber adversary characterization auditing the hacker mind ent://SD_ILS/0/SD_ILS:939469 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Parker, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294071">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity operations handbook ent://SD_ILS/0/SD_ILS:942613 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Rittinghouse, John W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=313612">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Empirical research for software security : foundations and experience ent://SD_ILS/0/SD_ILS:1132973 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;ben Othmane, Lotfi, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5164090">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Breaking into information security : crafting a custom career path to get the job you really want ent://SD_ILS/0/SD_ILS:1104442 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;More, Josh, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4187289">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Threat modeling : designing for security ent://SD_ILS/0/SD_ILS:1027048 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Shostack, Adam.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629177">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security a practical guide ent://SD_ILS/0/SD_ILS:940334 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Poole, Owen.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=298471">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The misuse of information systems the impact of security countermeasures ent://SD_ILS/0/SD_ILS:1058044 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;D'Arcy, John P., 1975-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3016826">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security best practices : 205 basic rules ent://SD_ILS/0/SD_ILS:1188318 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Stefanek, George L.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781878707963">https://www.sciencedirect.com/science/book/9781878707963</a><br/>Format:&#160;Elektronik Kaynak<br/> Siber g&uuml;venlik ent://SD_ILS/0/SD_ILS:668303 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Canl&#305;, Mustafa<br/>Format:&#160;Kitap<br/> Yaz&#305;l&#305;m g&uuml;venli&#287;i sald&#305;r&#305; ve savunma ent://SD_ILS/0/SD_ILS:291569 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Demir, B&uuml;nyamin<br/>Format:&#160;Kitap<br/> Cyber smart : five habits to protect your family, money, and identity from cyber criminals ent://SD_ILS/0/SD_ILS:1143906 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;McDonough, Bart, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5612908">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> I nove passi per il successo : Compendio per l'attuazione della norma ISO 27001 :2013 ent://SD_ILS/0/SD_ILS:1134675 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5255162">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Neuf &eacute;tapes vers le succ&egrave;s : Un apercu de la mise en oeuvre de la norme ISO 27001 : 2013 ent://SD_ILS/0/SD_ILS:1134676 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5255163">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Nine steps to success : an ISO 27001 : 2013 implementation overview ent://SD_ILS/0/SD_ILS:1130331 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5100512">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Data breach preparation and response : breaches are certain, impact is not ent://SD_ILS/0/SD_ILS:1113216 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Fowler, Kevvie, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4556899">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Web application security is a stack : how to CYA (Cover Your Apps) completely ent://SD_ILS/0/SD_ILS:1053836 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Vittie, Lori Mac, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192126">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Assessing information security : strategies, tactics, logic and framework ent://SD_ILS/0/SD_ILS:1053834 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Vladimirov, A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192124">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security risk management building an information security risk management program from the ground up ent://SD_ILS/0/SD_ILS:976804 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Wheeler, Evan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=685406">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Adaptive security management architecture ent://SD_ILS/0/SD_ILS:972238 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=625004">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Managing information security ent://SD_ILS/0/SD_ILS:1018342 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1357643">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Buffer overflow attacks detect, exploit, prevent ent://SD_ILS/0/SD_ILS:930207 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Foster, James C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=222803">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security evaluation using the NSA IEM ent://SD_ILS/0/SD_ILS:933866 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Fuller, Ed.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254842">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Silence on the wire a field guide to passive reconnaissance and indirect attacks ent://SD_ILS/0/SD_ILS:936579 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273504">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Configuring NetScreen Firewalls ent://SD_ILS/0/SD_ILS:939461 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Cameron, Rob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294055">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at Configuring ISA Server 2004 ent://SD_ILS/0/SD_ILS:933877 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Shinder, Dr. Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254853">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security foundations ent://SD_ILS/0/SD_ILS:935040 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Strebe, Matthew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=267332">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking the code ASP. NET web application security ent://SD_ILS/0/SD_ILS:939506 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Burnett, Mark (Mark M.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294160">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security sage's guide to hardening the network infrastructure ent://SD_ILS/0/SD_ILS:939571 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Andr&eacute;s, Steven.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294359">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Snort 2.0 intrusion detection ent://SD_ILS/0/SD_ILS:939575 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Beale, Jay.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294371">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Best damn firewall book period ent://SD_ILS/0/SD_ILS:939585 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294396">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> OS X incident response : scripting and analysis ent://SD_ILS/0/SD_ILS:1111334 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Bradley, Jaron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4526010">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber resilience best practices ent://SD_ILS/0/SD_ILS:1104467 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;AXELOS Limited, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4187569">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber security and IT infrastructure protection ent://SD_ILS/0/SD_ILS:1018941 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1377640">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Web application defender's cookbook battling hackers and protecting users ent://SD_ILS/0/SD_ILS:1006627 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Barnett, Ryan C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108733">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> An introduction to information security and ISO27001:2013 : a pocket guide ent://SD_ILS/0/SD_ILS:1020992 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Watkins, Steve G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1463578">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> ISO27001 / ISO27002 : a pocket guide ent://SD_ILS/0/SD_ILS:1020993 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Calder, Alan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1463579">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer Forensics jumpstart ent://SD_ILS/0/SD_ILS:973680 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Solomon, Michael R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=661659">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Mac security bible ent://SD_ILS/0/SD_ILS:960377 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Kissell, Joe.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=477803">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking the art of exploitation ent://SD_ILS/0/SD_ILS:1009955 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137538">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Innocent code a security wake-up call for Web programmers ent://SD_ILS/0/SD_ILS:929474 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Huseby, Sverre H.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=210558">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Stealing the network how to own a continent ent://SD_ILS/0/SD_ILS:939580 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Rogers, Russ.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294377">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking the art of exploitation ent://SD_ILS/0/SD_ILS:936567 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273488">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing Windows 2000 ent://SD_ILS/0/SD_ILS:939501 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Todd, Chad.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294154">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security and privacy in the digital era. Volume 1 ent://SD_ILS/0/SD_ILS:1115270 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Guerrier, Claudine, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4648717">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies ent://SD_ILS/0/SD_ILS:1145686 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Le, Dac-Nhuong, 1983- editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5741215">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking point of sale : payment application secrets, threats, and solutions ent://SD_ILS/0/SD_ILS:1027046 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Gomzin, Slava.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629175">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux ent://SD_ILS/0/SD_ILS:1031737 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Buchanan, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1688607">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:1032266 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Andress, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1699255">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking for dummies ent://SD_ILS/0/SD_ILS:1006251 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Beaver, Kevin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1106542">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IBM mainframe security beyond the basics : a practical guide from a z/OS and RACF perspective ent://SD_ILS/0/SD_ILS:1019878 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Dattani, Dinesh D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1411689">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> A multidisciplinary introduction to information security ent://SD_ILS/0/SD_ILS:1028416 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Mj&oslash;lsnes, Stig F., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1648315">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Microsoft Forefront UAG 2010 administrator's handbook take full command of Microsoft Forefront Unified Access Gateway to secure your business applications and provide dynamic remote access with DirectAccess ent://SD_ILS/0/SD_ILS:996844 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Ben-Ari, Erez.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948568">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Configuring SonicWALL firewalls ent://SD_ILS/0/SD_ILS:1188282 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Bendell, Dan.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492508">http://www.sciencedirect.com/science/book/9781597492508</a><br/>Format:&#160;Elektronik Kaynak<br/> MCSE designing security for a Windows Server 2003 network : exam 70-298 study guide &amp; DVD training system ent://SD_ILS/0/SD_ILS:939533 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Khnaser, Elias N.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294253">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security secrets, intruders and ID tags. ent://SD_ILS/0/SD_ILS:1092043 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411447">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Applied network security monitoring : collection, detection, and analysis ent://SD_ILS/0/SD_ILS:1023659 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Sanders, Chris, 1986-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1574451">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> SQL injection attacks and defense ent://SD_ILS/0/SD_ILS:997287 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Clarke, Justin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=953188">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Web commerce security design and development ent://SD_ILS/0/SD_ILS:978975 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Nahari, Hadi.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706729">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of information security understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:133592 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Andress, Jason.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:1183815 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Andress, Jason.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496537">https://www.sciencedirect.com/science/book/9781597496537</a><br/>Format:&#160;Elektronik Kaynak<br/> Host integrity monitoring : using Osiris and Samhain ent://SD_ILS/0/SD_ILS:1188245 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Wotring, Brian.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490184">http://www.sciencedirect.com/science/book/9781597490184</a><br/>Format:&#160;Elektronik Kaynak<br/> Intrusion prevention and active response : deploying network and host IPS ent://SD_ILS/0/SD_ILS:1188400 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Rash, Michael.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266474">http://www.sciencedirect.com/science/book/9781932266474</a><br/>Format:&#160;Elektronik Kaynak<br/> Wireless operational security ent://SD_ILS/0/SD_ILS:1188104 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583170">http://www.sciencedirect.com/science/book/9781555583170</a> ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583170">https://www.sciencedirect.com/science/book/9781555583170</a><br/>Format:&#160;Elektronik Kaynak<br/> Seven deadliest USB attacks ent://SD_ILS/0/SD_ILS:1178020 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Anderson, Brian (Brian James)<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495530">https://www.sciencedirect.com/science/book/9781597495530</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity operations handbook ent://SD_ILS/0/SD_ILS:1188095 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Rittinghouse, John W.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583064">https://www.sciencedirect.com/science/book/9781555583064</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing ColdFusion ent://SD_ILS/0/SD_ILS:1188358 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Meyer, Greg.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994770">http://www.sciencedirect.com/science/book/9781928994770</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing your Web applications ent://SD_ILS/0/SD_ILS:1188343 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Traxler, Julie.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994312">https://www.sciencedirect.com/science/book/9781928994312</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing Sun Solaris 8 ent://SD_ILS/0/SD_ILS:1188485 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Miles, Wyman.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994442">http://www.sciencedirect.com/science/book/9781928994442</a><br/>Format:&#160;Elektronik Kaynak<br/> Information technology security fundamentals ent://SD_ILS/0/SD_ILS:1102697 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Sagers, Glen., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4009415">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Next generation SSH2 implementation : securing data in motion ent://SD_ILS/0/SD_ILS:1191763 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Liu, Dale.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492836">https://www.sciencedirect.com/science/book/9781597492836</a><br/>Format:&#160;Elektronik Kaynak<br/> Microsoft forefront security administration guide ent://SD_ILS/0/SD_ILS:1189120 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Varsalone, Jesse.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492447">https://www.sciencedirect.com/science/book/9781597492447</a><br/>Format:&#160;Elektronik Kaynak<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:1188248 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490214">https://www.sciencedirect.com/science/book/9781597490214</a><br/>Format:&#160;Elektronik Kaynak<br/> Implementing homeland security for enterprise IT ent://SD_ILS/0/SD_ILS:1188099 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Erbschloe, Michael.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">http://www.sciencedirect.com/science/book/9781555583125</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber adversary characterization : auditing the hacker mind ent://SD_ILS/0/SD_ILS:1188369 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Parker, Tom.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836111">http://www.sciencedirect.com/science/book/9781931836111</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing Windows 2000 ent://SD_ILS/0/SD_ILS:1188381 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Todd, Chad.<br/><a href="http://www.sciencedirect.com/science/book/9781931836494">Available from ScienceDirect. Online version available for university members only. This requires an institutional login off-campus</a> ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836494">https://www.sciencedirect.com/science/book/9781931836494</a><br/>Format:&#160;Elektronik Kaynak<br/> Scene of the cybercrime. ent://SD_ILS/0/SD_ILS:1189665 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Cross, Michael, 1965-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492768">https://www.sciencedirect.com/science/book/9781597492768</a><br/>Format:&#160;Elektronik Kaynak<br/> Syngress force emerging threat analysis : from mischief to malicious ent://SD_ILS/0/SD_ILS:1186339 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">http://www.sciencedirect.com/science/book/9781597490566</a><br/>Format:&#160;Elektronik Kaynak<br/> OSSEC host-based intrusion detection guide ent://SD_ILS/0/SD_ILS:1189620 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Hay, Andrew.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492409">http://www.sciencedirect.com/science/book/9781597492409</a><br/>Format:&#160;Elektronik Kaynak<br/> Techno Security's guide to managing risks : for IT managers, auditors, and investigators ent://SD_ILS/0/SD_ILS:1188280 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Wiles, Jack.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">http://www.sciencedirect.com/science/book/9781597491389</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security with pfSense : architect, deploy, and operate enterprise-grade firewalls ent://SD_ILS/0/SD_ILS:1142128 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Aggarwal, Manuj, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5520881">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Practical cyber intelligence : how action-based intelligence can be an effective response to incidents ent://SD_ILS/0/SD_ILS:1136693 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Bautista, Wilson, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5332127">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Mastering Kali Linux for web penetration testing : test and evaluate all aspects of the design and implentation ent://SD_ILS/0/SD_ILS:1127735 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;McPhee, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4891263">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Advanced penetration testing : hacking the world's most secure networks ent://SD_ILS/0/SD_ILS:1123722 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Allsopp, Wil, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4813145">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Nueve pasos para el &eacute;xito : Una vision de conjunto para la aplicacion de la ISO 27001 : 2013 ent://SD_ILS/0/SD_ILS:1134678 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5255165">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutions ent://SD_ILS/0/SD_ILS:1130588 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Sharma, Himanshu, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5108416">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The network security test lab : a step-by-step guide ent://SD_ILS/0/SD_ILS:1103143 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Gregg, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040350">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking with Kali : practical penetration testing techniques ent://SD_ILS/0/SD_ILS:1007619 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Broad, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115177">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Practical anonymity hiding in plain sight online ent://SD_ILS/0/SD_ILS:1007614 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Loshin, Peter.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115167">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Data visualization. Part 2 ent://SD_ILS/0/SD_ILS:1024206 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Assam, Tarek.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1579356">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> BackTrack 4 assuring security by penetration testing : master the art of penetration testing with BackTrack ent://SD_ILS/0/SD_ILS:996968 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Ali, Shakeel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=950518">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security assessment from vulnerability to patch ent://SD_ILS/0/SD_ILS:937038 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Manzuik, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=280219">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Configuring SonicWALL firewalls ent://SD_ILS/0/SD_ILS:934073 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Lathem, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=256369">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at managing information security ent://SD_ILS/0/SD_ILS:934742 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Osborne, Mark.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=266207">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Firewall policies and VPN configurations ent://SD_ILS/0/SD_ILS:935986 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Cantrell, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=272100">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasures ent://SD_ILS/0/SD_ILS:939483 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Contos, Brian T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294116">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cisco Pix firewalls configure, manage and troubleshoot ent://SD_ILS/0/SD_ILS:933859 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Behrens, Thorsten.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254835">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Kali Linux intrusion and exploitation cookbook : over 70 recipes for system administrator or DevOps to master Kali Linux 2 and perform effective security assessment ent://SD_ILS/0/SD_ILS:1125549 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Shah, Dhruv, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4845574">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Kali linux wireless penetration testing cookbook : identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security ent://SD_ILS/0/SD_ILS:1133434 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Oriyano, Sean-Philip, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5188228">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Zabbix network monitoring essentials : your one-stop solution to efficient network monitoring with zabbix ent://SD_ILS/0/SD_ILS:1046048 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Vacche, Andrea Dalle, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1973849">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer forensics with FTK : enhance your computer forensics knowledge through illustrations, tips, tricks, and practical real-world scenarios ent://SD_ILS/0/SD_ILS:1029107 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Carbone, Fernando, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1657797">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Untangle network security : secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW ent://SD_ILS/0/SD_ILS:1040510 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;El-Bawab, Abd El-Monem A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1831903">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Toward a safer and more secure cyberspace ent://SD_ILS/0/SD_ILS:1085452 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Goodman, Seymour E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3378311">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security architect : careers in information security ent://SD_ILS/0/SD_ILS:1033065 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Collins, Jon, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1713960">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Dr. Tom Shinder's configuring ISA Server 2004 ent://SD_ILS/0/SD_ILS:939479 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294094">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Configuring ISA server 2000 building firewalls for windows 2000 ent://SD_ILS/0/SD_ILS:939460 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294054">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Dependable software systems engineering ent://SD_ILS/0/SD_ILS:1111515 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Esparza, Javier, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4528955">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Configuring Juniper Networks NetScreen &amp; SSG firewalls ent://SD_ILS/0/SD_ILS:1186428 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Cameron, Rob.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491181">http://www.sciencedirect.com/science/book/9781597491181</a><br/>Format:&#160;Elektronik Kaynak<br/> Configuring Check Point NGX VPN-1/fire wall- ent://SD_ILS/0/SD_ILS:1188250 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Stephens, Robert.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490313">http://www.sciencedirect.com/science/book/9781597490313</a><br/>Format:&#160;Elektronik Kaynak<br/> Check Point NGX R65 security administration ent://SD_ILS/0/SD_ILS:1189122 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Bonnell, Ralph.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492454">http://www.sciencedirect.com/science/book/9781597492454</a><br/>Format:&#160;Elektronik Kaynak<br/> Cisco PIX firewalls : configure, manage, &amp; troubleshoot ent://SD_ILS/0/SD_ILS:1184283 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Behrens, Thorsten.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490047">https://www.sciencedirect.com/science/book/9781597490047</a><br/>Format:&#160;Elektronik Kaynak<br/> Cisco PIX firewalls : configure, manage, &amp; troubleshoot ent://SD_ILS/0/SD_ILS:1188481 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Behrens, Thorsten.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490047">https://www.sciencedirect.com/science/book/9781597490047</a><br/>Format:&#160;Elektronik Kaynak<br/> Stealing the network : how to own a continent ent://SD_ILS/0/SD_ILS:1188367 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;131ah.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836050">http://www.sciencedirect.com/science/book/9781931836050</a><br/>Format:&#160;Elektronik Kaynak<br/> Zero day exploit : countdown to darkness ent://SD_ILS/0/SD_ILS:1188489 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Shein, Rob.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836098">http://www.sciencedirect.com/science/book/9781931836098</a><br/>Format:&#160;Elektronik Kaynak<br/> Dns security : defending the domain name system ent://SD_ILS/0/SD_ILS:1113215 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Liska, Allan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4556898">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computational network science : an algorithmic approach ent://SD_ILS/0/SD_ILS:1038184 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Hexmoor, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1798312">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Integrating ISA Server 2006 with Microsoft Exchange 2007 ent://SD_ILS/0/SD_ILS:1189650 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Strachan, Fergus.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492751">http://www.sciencedirect.com/science/book/9781597492751</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at configuring ISA server 2004 ent://SD_ILS/0/SD_ILS:1188261 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Shinder, Thomas W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490573">http://www.sciencedirect.com/science/book/9781597490573</a><br/>Format:&#160;Elektronik Kaynak<br/> Ethereal packet sniffing ent://SD_ILS/0/SD_ILS:939485 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Orebaugh, Angela.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294122">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Special ops : host and network security for Microsoft, UNIX, and Oracle ent://SD_ILS/0/SD_ILS:1188496 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Birkholz, Erik Pace.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836692">http://www.sciencedirect.com/science/book/9781931836692</a><br/>Format:&#160;Elektronik Kaynak<br/> Fuzzing for software security testing and quality assurance ent://SD_ILS/0/SD_ILS:956329 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Takanen, Ari.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456884">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Coding for penetration testers building better tools ent://SD_ILS/0/SD_ILS:983521 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Andress, Jason.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=773396">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Nessus, Snort, &amp; Ethereal power tools customizing open source security applications ent://SD_ILS/0/SD_ILS:933863 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Archibald, Neil.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254839">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Learn ethical hacking from scratch : your stepping stone to penetration testing ent://SD_ILS/0/SD_ILS:1141111 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Sabih, Zaid, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5485020">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:1118465 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Faircloth, Jeremy, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4694443">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Building a corporate culture of security : strategies for strengthening organizational resiliency ent://SD_ILS/0/SD_ILS:1108349 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Sullivant, John, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4425984">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity and applied mathematics ent://SD_ILS/0/SD_ILS:1113169 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Metcalf, Leigh, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4556234">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security in fixed and wireless networks ent://SD_ILS/0/SD_ILS:1115585 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Sch&auml;fer, G&uuml;nter, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4658592">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber-risk informatics : engineering evaluation with data science ent://SD_ILS/0/SD_ILS:1166068 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Sahinoglu, Mehmet, 1951-.<br/>Format:&#160;Kitap<br/> Penetration testing services procurement guide ent://SD_ILS/0/SD_ILS:1037084 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Creasey, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778765">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Procuring penetration testing services. ent://SD_ILS/0/SD_ILS:1037085 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z <a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778766">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Pragmatic security metrics applying metametrics to information security ent://SD_ILS/0/SD_ILS:1010972 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Brotby, W. Krag.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1153198">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The tangled Web a guide to securing modern Web applications ent://SD_ILS/0/SD_ILS:1009976 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137574">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Identity management concepts, technologies, and systems ent://SD_ILS/0/SD_ILS:972507 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Bertino, Elisa.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=634511">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Coding for penetration testers building better tools ent://SD_ILS/0/SD_ILS:137213 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Andress, Jason.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497299">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektronik Kaynak<br/> Unauthorised access physical penetration testing for IT security teams ent://SD_ILS/0/SD_ILS:958776 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Allsopp, Wil.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=470412">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Secure computer and network systems modeling, analysis and design ent://SD_ILS/0/SD_ILS:946385 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Ye, Nong.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=351427">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security data visualization graphical techniques for network analysis ent://SD_ILS/0/SD_ILS:1058454 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Conti, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3017625">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Developer's guide to web application security ent://SD_ILS/0/SD_ILS:938521 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Cross, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=289735">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Host integrity monitoring using Osiris and Samhain ent://SD_ILS/0/SD_ILS:931606 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Wotring, Brian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=233599">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Check Point NG VPN-1/Firewall-1 advanced configuration and troubleshooting ent://SD_ILS/0/SD_ILS:939448 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Noble, Jim.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294030">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing ColdFusion ent://SD_ILS/0/SD_ILS:939498 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Meyer, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294151">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The five technological forces disrupting security : how social, mobile, cloud and iot are fundamentally changing the practice of physical security ent://SD_ILS/0/SD_ILS:1128883 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Van Till, Steve, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4981408">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Applied network security : master the art of detecting and averting advanced network security attacks and techniques ent://SD_ILS/0/SD_ILS:1125830 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Salmon, Arthur, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4853051">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber-risk informatics : engineering evaluation with data sciencef ent://SD_ILS/0/SD_ILS:1111177 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Sahinoglu, Mehmet, 1951- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4519251">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Advanced penetration testing for highly-secured environments. ent://SD_ILS/0/SD_ILS:1111214 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Allen, Lee, 1946- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4520648">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Understanding bitcoin : cryptography, engineering and economics. ent://SD_ILS/0/SD_ILS:1040180 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Franco, Pedro, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1823060">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity and cyberwar ent://SD_ILS/0/SD_ILS:150630 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Singer, Peter Warren<br/>Format:&#160;Kitap<br/> Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning ent://SD_ILS/0/SD_ILS:1036178 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Hutchens, Justin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1771381">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually ent://SD_ILS/0/SD_ILS:1028145 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1644005">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> At the nexus of cybersecurity and public policy : some basic concepts and issues ent://SD_ILS/0/SD_ILS:1086454 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Clark, David, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3379336">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Professional penetration testing creating and learning in a hacking lab ent://SD_ILS/0/SD_ILS:1007616 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Wilhelm, Thomas.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115172">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> CISO's guide to penetration testing a framework to plan, manage, and maximize benefits ent://SD_ILS/0/SD_ILS:987471 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826967">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> A cyberworm that knows no boundaries ent://SD_ILS/0/SD_ILS:989711 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Porche, Isaac, 1968-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=846009">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at designing security for a Windows Server 2003 network ent://SD_ILS/0/SD_ILS:933856 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Amini, Rob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254832">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing IM and P2P applications for the enterprise ent://SD_ILS/0/SD_ILS:933871 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Piccard, Paul L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254847">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> FISMA and the risk management framework the new practice of federal cyber security ent://SD_ILS/0/SD_ILS:1004011 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Gantz, Stephen D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1074427">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking web apps detecting and preventing web application security problems ent://SD_ILS/0/SD_ILS:1000371 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Shema, Mike.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1012529">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security and embedded systems ent://SD_ILS/0/SD_ILS:934725 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;NATO Advanced Research Workshop on Security and Embedded Systems (2005 August 22-26 : Patrai, Greece)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=265974">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cisco security professional's guide to secure intrusion detection systems ent://SD_ILS/0/SD_ILS:1188408 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Burton, James.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266696">http://www.sciencedirect.com/science/book/9781932266696</a><br/>Format:&#160;Elektronik Kaynak<br/> Firewall policies and VPN configurations ent://SD_ILS/0/SD_ILS:1188270 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Henmi, Anne.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490887">https://www.sciencedirect.com/science/book/9781597490887</a><br/>Format:&#160;Elektronik Kaynak<br/> Insider threat : protecting the enterprise from sabotage, spying, and theft ent://SD_ILS/0/SD_ILS:1188259 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Cole, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format:&#160;Elektronik Kaynak<br/> Botnets : the killer web app ent://SD_ILS/0/SD_ILS:1186444 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Schiller, Craig A.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491358">https://www.sciencedirect.com/science/book/9781597491358</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at designing security for a Windows Server 2003 network ent://SD_ILS/0/SD_ILS:1188281 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Amini, Rob.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492430">https://www.sciencedirect.com/science/book/9781597492430</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber security awareness for CEOs and management ent://SD_ILS/0/SD_ILS:1104566 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Willson, David, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4189279">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Professional penetration testing : creating and operating a formal hacking lab ent://SD_ILS/0/SD_ILS:1193016 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Wilhelm, Thomas.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494250">https://www.sciencedirect.com/science/book/9781597494250</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security assessment : from vulnerability to patch ent://SD_ILS/0/SD_ILS:1188273 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Manzuik, Steve.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491013">http://www.sciencedirect.com/science/book/9781597491013</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at securing your network ent://SD_ILS/0/SD_ILS:1189983 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Dubrawsky, Ido.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492317">https://www.sciencedirect.com/science/book/9781597492317</a><br/>Format:&#160;Elektronik Kaynak<br/> Developer's guide to web application security ent://SD_ILS/0/SD_ILS:1186371 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking a terror network : the silent threat of covert channels ent://SD_ILS/0/SD_ILS:1188363 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Rogers, Russ.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994985">https://www.sciencedirect.com/science/book/9781928994985</a><br/>Format:&#160;Elektronik Kaynak<br/> Snort 2.1 intrusion detection ent://SD_ILS/0/SD_ILS:1188366 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Beale, Jay.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836043">https://www.sciencedirect.com/science/book/9781931836043</a><br/>Format:&#160;Elektronik Kaynak<br/> Snort : IDS and IPS toolkit ent://SD_ILS/0/SD_ILS:1188271 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Beale, Jay.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490993">https://www.sciencedirect.com/science/book/9781597490993</a><br/>Format:&#160;Elektronik Kaynak<br/> AVIEN malware defense guide for the Enterprise ent://SD_ILS/0/SD_ILS:1189104 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Harley, David.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491648">https://www.sciencedirect.com/science/book/9781597491648</a><br/>Format:&#160;Elektronik Kaynak<br/> Check Point NG VPN-1/Firewall-1 : advanced configuration and troubleshooting ent://SD_ILS/0/SD_ILS:1188397 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Noble, Jim.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836975">http://www.sciencedirect.com/science/book/9781931836975</a><br/>Format:&#160;Elektronik Kaynak<br/> Bilgisayar sistemlerinde g&uuml;venlik ve gizlilik ent://SD_ILS/0/SD_ILS:1223212 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Ayd&#305;n, &Ouml;mer, Dr. &Ouml;&#287;r. &Uuml;yesi, edit&ouml;r<br/>Format:&#160;Kitap<br/> Hack the stack : using snort and ethereal to master the 8 layers of an insecure network ent://SD_ILS/0/SD_ILS:1186427 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Gregg, Michael (Michael C.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">http://www.sciencedirect.com/science/book/9781597491099</a><br/>Format:&#160;Elektronik Kaynak<br/> Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures ent://SD_ILS/0/SD_ILS:1186439 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Contos, Brian T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491297">https://www.sciencedirect.com/science/book/9781597491297</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing your network ent://SD_ILS/0/SD_ILS:1188357 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Ahmad, David R. Mirza.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994701">https://www.sciencedirect.com/science/book/9781928994701</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity blue team toolkit ent://SD_ILS/0/SD_ILS:1145841 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Tanner, Nadean, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5747366">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Siber g&uuml;venlik : sald&#305;r&#305; &amp; savunma stratejileri ent://SD_ILS/0/SD_ILS:1195743 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;&Ouml;zkaya, Erdal<br/>Format:&#160;Kitap<br/> Java programlama diliyle kriptoloji uygulamalar&#305; ent://SD_ILS/0/SD_ILS:1206978 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Bodur, H&uuml;seyin, yazar.<br/>Format:&#160;Kitap<br/> Hacking the hacker ent://SD_ILS/0/SD_ILS:1125525 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Grimes, Roger A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4845208">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Aldatma sanat&#305; : g&uuml;venli&#287;in insan boyutunun kullan&#305;lmas&#305; ent://SD_ILS/0/SD_ILS:1158369 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Mitnick, Kevin D.<br/>Format:&#160;Kitap<br/> Her y&ouml;n&uuml;yle elektronik imza : e-imza ent://SD_ILS/0/SD_ILS:1219091 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Sa&#287;&#305;ro&#287;lu, &#350;eref, Do&ccedil;. Dr., yazar.<br/>Format:&#160;Kitap<br/> &#304;nternette g&uuml;venlik ve Hacker Cracker meselesi : el kitab&#305; ent://SD_ILS/0/SD_ILS:70005 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;G&uuml;ven, Mehmet<br/>Format:&#160;Kitap<br/> Cryptography for internet and database applications : developing secret and public key techniques with Java ent://SD_ILS/0/SD_ILS:41923 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Galbreath, Nick<br/>Format:&#160;Kitap<br/> Network security : private communication in a public world ent://SD_ILS/0/SD_ILS:1169380 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Kaufman, Charlie.<br/>Format:&#160;Kitap<br/> Security controls evaluation, testing, and assessment handbook ent://SD_ILS/0/SD_ILS:1148986 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Johnson, Leighton, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5986757">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity law : protect yourself and your customers ent://SD_ILS/0/SD_ILS:1145228 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Brathwaite, Shimon, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5719658">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hardware security : a hands-on learning approach ent://SD_ILS/0/SD_ILS:1146041 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Bhunia, Swarup, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5754491">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Digital asset valuation and cyber risk measurement : principles of cybernomics ent://SD_ILS/0/SD_ILS:1146603 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Ruan, Keyun, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5780982">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security risk management for ISO 27001/ISO 27002 ent://SD_ILS/0/SD_ILS:1148197 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5894007">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> How cyber security can protect your business : a guide for all stakeholders ent://SD_ILS/0/SD_ILS:1148887 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Wright, Christopher, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5979597">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Online danger : how to protect yourself and your loved ones from the evil side of the internet ent://SD_ILS/0/SD_ILS:1148139 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Cole, Eric, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5893451">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Port cybersecurity : securing critical information infrastructures and supply chains ent://SD_ILS/0/SD_ILS:1130929 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Polemi, Nineta, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5118465">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> RIoT control : understanding and managing risks and the internet of things ent://SD_ILS/0/SD_ILS:1118263 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Macaulay, Tyson, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4691335">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing the internet of things ent://SD_ILS/0/SD_ILS:1122371 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Li, Shancang, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4786871">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Wireshark for security professionals : using wireshark and the metasploit framework ent://SD_ILS/0/SD_ILS:1123925 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Bullock, Jessey, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4816492">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IoT penetration testing cookbook : identify vulnerabilities and secure your smart devices. ent://SD_ILS/0/SD_ILS:1133049 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Guzman, Aaron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5165736">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security in the digital world : for the home user, parent, consumer and home office ent://SD_ILS/0/SD_ILS:1133712 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Day, Graham, 1945- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5211340">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Meeting people via WiFi and Bluetooth ent://SD_ILS/0/SD_ILS:1104567 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Schroeder, Joshua, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4189280">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The information systems security officer's guide : establishing and managing a cyber security program ent://SD_ILS/0/SD_ILS:1105580 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Kovacich, Gerald L., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4334673">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Linux server security : hack and defend ent://SD_ILS/0/SD_ILS:1111179 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Binnie, Christopher, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4519259">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Selling information security to the board : a primer ent://SD_ILS/0/SD_ILS:1111186 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4519662">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security science : measuring the vulnerability to data compromises ent://SD_ILS/0/SD_ILS:1113500 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Young, Carl S., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4567434">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Chaotic secure communication : principles and technologies ent://SD_ILS/0/SD_ILS:1119254 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Sun, Kehui, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4707910">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Infosec management fundamentals ent://SD_ILS/0/SD_ILS:1053583 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2146007">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Bent functions : results and applications to cryptography ent://SD_ILS/0/SD_ILS:1053831 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Tokareva, Natalia, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192079">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security analytics : finding security insights, patterns and anomalies in big data ent://SD_ILS/0/SD_ILS:1041629 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Mark, Talabis, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1873129">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Designing and building a security operations center ent://SD_ILS/0/SD_ILS:1040615 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Nathans, David, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1834659">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network attacks &amp; exploitation : a framework ent://SD_ILS/0/SD_ILS:1103144 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Monte, Matthew, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040351">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybers&eacute;curit&eacute; des Installations Industrielles ent://SD_ILS/0/SD_ILS:1145096 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Fourastier, Yannick, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709851">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybers&eacute;curit&eacute; des installations industrielles : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:1145060 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709810">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybers&eacute;curit&eacute; des installations industrielles : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:1145062 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709812">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybers&eacute;curit&eacute; des Installations Industrielles. Chapter V, Des bus de terrain a l'Industrial Ethernet ent://SD_ILS/0/SD_ILS:1145070 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709821">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre X, S&eacute;curit&eacute; des R&eacute;seaux Industriels &eacute;tendus : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:1145073 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709824">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre II, Typologie des installations industrielles : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:1145077 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709828">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre II, Typologie des installations industrielles : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:1145078 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709829">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapter VI, Analyse des risques : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:1145082 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709834">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre I, Mythes et r&eacute;alit&eacute;s de la cybers&eacute;curit&eacute; des syst&egrave;mes num&eacute;riques industriels : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:1145083 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709836">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybers&eacute;curit&eacute; des Installations Industrielles : Chapitre XII Panorama de l'offre Technologique Pour la Cybers&eacute;curit&eacute; Industrielle ent://SD_ILS/0/SD_ILS:1145091 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Fourastier, Yannick, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709845">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Using security patterns in web-application ent://SD_ILS/0/SD_ILS:1135621 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Alam, Shahnawaz, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5291824">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Datennutzungs- und datenschutzvertr&auml;ge : muster, klauseln, erl&auml;uterungen ent://SD_ILS/0/SD_ILS:1053491 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Moos, Flemming, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2129586">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Chinese cybersecurity and defense ent://SD_ILS/0/SD_ILS:1035841 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Ventre, Daniel, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1765106">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Data-driven security : analysis, visualization and dashboards ent://SD_ILS/0/SD_ILS:1025819 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Jacobs, Jay.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1599321">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security leader insights for information protection : lessons and strategies from leading security professionals ent://SD_ILS/0/SD_ILS:1032265 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Fahy, Bob, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1699254">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security breaches : avoidance and treatment based on ISO27001 ent://SD_ILS/0/SD_ILS:1037082 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Krausz, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778763">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber essentials : a pocket guide ent://SD_ILS/0/SD_ILS:1037088 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778769">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Data hiding exposing concealed data in multimedia, operating systems, mobile devices, and network protocols ent://SD_ILS/0/SD_ILS:1003916 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Raggo, Michael T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073014">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Intelligent systems for security informatics ent://SD_ILS/0/SD_ILS:1009493 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Yang, Christopher.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1133729">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyberspace and cybersecurity ent://SD_ILS/0/SD_ILS:1020695 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Kostopoulos, George K., 1939- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1446799">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Getting started with FortiGate ent://SD_ILS/0/SD_ILS:1023474 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Fabbri, Rosato.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572901">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> OAuth 2.0 identity and access management patterns ent://SD_ILS/0/SD_ILS:1023480 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Spasovski, Martin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572907">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Instant Java password and authentication security ent://SD_ILS/0/SD_ILS:1023486 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Mayoral, Fernando.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572913">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> IBM i security administration and compliance ent://SD_ILS/0/SD_ILS:993715 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Woodbury, Carol.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=906259">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Microsoft SQL Server 2012 security cookbook ent://SD_ILS/0/SD_ILS:1001891 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Bruchez, Rudi.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1036251">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Oracle 11g anti-hacker's cookbook ent://SD_ILS/0/SD_ILS:1003349 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Neagu, Adrian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1057945">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Low tech hacking street smarts for security professionals ent://SD_ILS/0/SD_ILS:987787 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Wiles, Jack.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=829964">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Microsoft Forefront Identity Manager 2010 R2 handbook ent://SD_ILS/0/SD_ILS:1000680 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Nordstr&ouml;m, Kent.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1019543">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing WebLogic Server 12c learn to develop, administer, and troubleshot your WebLogic Server ent://SD_ILS/0/SD_ILS:1004959 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Masini, Luca.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1085228">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Spring Security 3.1 secure your web applications from hackers with the step-by-step guide ent://SD_ILS/0/SD_ILS:1006508 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Winch, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108351">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Dear hacker letters to the editor of 2600 ent://SD_ILS/0/SD_ILS:964867 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Goldstein, Emmanuel J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537340">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Professional Cocoa application security ent://SD_ILS/0/SD_ILS:964870 2025-12-20T03:43:24Z 2025-12-20T03:43:24Z by&#160;Lee, Graham J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537355">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/>