Arama Sonuçları Computer security. - Daraltılmış: Ebook CentralSirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dComputer$002bsecurity.$0026qf$003dLOCATION$002509Lokasyon$0025091$00253AEBOOKCENT$002509Ebook$002bCentral$0026ps$003d300?dt=list2025-12-22T07:51:38ZComputer security handbookent://SD_ILS/0/SD_ILS:10287392025-12-22T07:51:38Z2025-12-22T07:51:38Zby Bosworth, Seymour, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1652940">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:9556372025-12-22T07:51:38Z2025-12-22T07:51:38Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=453166">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information assurance and computer securityent://SD_ILS/0/SD_ILS:9381762025-12-22T07:51:38Z2025-12-22T07:51:38Zby NATO Advanced Research Workshop on Information Assurance and Computer Security (2005 : T?etouan, Morocco)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=287000">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:10141912025-12-22T07:51:38Z2025-12-22T07:51:38Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1195617">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer security : awareness for the homeent://SD_ILS/0/SD_ILS:11271612025-12-22T07:51:38Z2025-12-22T07:51:38Zby Cyborski, Shannon, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4876967">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:11262122025-12-22T07:51:38Z2025-12-22T07:51:38Zby Vacca, John R., editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4858374">Click to View</a><br/>Format: Elektronik Kaynak<br/>Conducting computer security assessments at nuclear facilities.ent://SD_ILS/0/SD_ILS:11259132025-12-22T07:51:38Z2025-12-22T07:51:38Z<a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4853352">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information management & computer security. Volume 15, Number 5, Papers from the HAISA 2007 Symposiument://SD_ILS/0/SD_ILS:9441192025-12-22T07:51:38Z2025-12-22T07:51:38Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328737">Click to View</a><br/>Format: Elektronik Kaynak<br/>Essential computer security everyone's guide to e-mail, internet, and wireless securityent://SD_ILS/0/SD_ILS:9433502025-12-22T07:51:38Z2025-12-22T07:51:38Zby Bradley, Tony.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=319200">Click to View</a><br/>Format: Elektronik Kaynak<br/>Risk management for computer security Protecting your network and information assetsent://SD_ILS/0/SD_ILS:9396582025-12-22T07:51:38Z2025-12-22T07:51:38Zby Jones, Andy, 1952-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294671">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer security incident response planning at nuclear facilitiesent://SD_ILS/0/SD_ILS:11259142025-12-22T07:51:38Z2025-12-22T07:51:38Zby International Atomic Energy Agency.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4853353">Click to View</a><br/>Format: Elektronik Kaynak<br/>Securing the cloud cloud computer security techniques and tacticsent://SD_ILS/0/SD_ILS:9770552025-12-22T07:51:38Z2025-12-22T07:51:38Zby Winkler, J. R. (Joachim R.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=686827">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security, privacy and reliability in computer communications and networksent://SD_ILS/0/SD_ILS:11217842025-12-22T07:51:38Z2025-12-22T07:51:38Zby Sha, Kewei, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4771355">Click to View</a><br/>Format: Elektronik Kaynak<br/>Physics and theoretical computer science from numbers and languages to (quantum) cryptography securityent://SD_ILS/0/SD_ILS:9406992025-12-22T07:51:38Z2025-12-22T07:51:38Zby Gazeau, Jean-Pierre.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=305174">Click to View</a><br/>Format: Elektronik Kaynak<br/>Trust and security in collaborative computingent://SD_ILS/0/SD_ILS:10302552025-12-22T07:51:38Z2025-12-22T07:51:38Zby Zou, Xukai, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1679354">Click to View</a><br/>Format: Elektronik Kaynak<br/>Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013ent://SD_ILS/0/SD_ILS:10350102025-12-22T07:51:38Z2025-12-22T07:51:38Zby Ginodman, Veniamin, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1752831">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security issues of IT outsourcingent://SD_ILS/0/SD_ILS:9380182025-12-22T07:51:38Z2025-12-22T07:51:38Zby Gritzalis, Stefanos.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=285536">Click to View</a><br/>Format: Elektronik Kaynak<br/>Firewall design and analysisent://SD_ILS/0/SD_ILS:9808552025-12-22T07:51:38Z2025-12-22T07:51:38Zby Liu, Alex X.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=731297">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security in distributed and networking systemsent://SD_ILS/0/SD_ILS:10138972025-12-22T07:51:38Z2025-12-22T07:51:38Zby Pan, Yi, 1960-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1193126">Click to View</a><br/>Format: Elektronik Kaynak<br/>Defense and detection strategies against Internet wormsent://SD_ILS/0/SD_ILS:9310192025-12-22T07:51:38Z2025-12-22T07:51:38Zby Nazario, Jose.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227660">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information assurance dependability and security in networked systemsent://SD_ILS/0/SD_ILS:9440162025-12-22T07:51:38Z2025-12-22T07:51:38Zby Qian, Yi, 1962-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328312">Click to View</a><br/>Format: Elektronik Kaynak<br/>Securing information and communications systems principles, technologies, and applicationsent://SD_ILS/0/SD_ILS:9563262025-12-22T07:51:38Z2025-12-22T07:51:38Zby Furnell, Steven, 1970-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456881">Click to View</a><br/>Format: Elektronik Kaynak<br/>User's guide to cryptography and standardsent://SD_ILS/0/SD_ILS:9310172025-12-22T07:51:38Z2025-12-22T07:51:38Zby Dent, Alexander W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227658">Click to View</a><br/>Format: Elektronik Kaynak<br/>Privacy protection and computer forensicsent://SD_ILS/0/SD_ILS:9310512025-12-22T07:51:38Z2025-12-22T07:51:38Zby Caloyannides, Michael A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227692">Click to View</a><br/>Format: Elektronik Kaynak<br/>Techniques and applications of digital watermarking and content protectionent://SD_ILS/0/SD_ILS:9309492025-12-22T07:51:38Z2025-12-22T07:51:38Zby Arnold, Michael (Michael Konrad), 1964-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227587">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security technologies for the World Wide Webent://SD_ILS/0/SD_ILS:9309802025-12-22T07:51:38Z2025-12-22T07:51:38Zby Oppliger, Rolf.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227620">Click to View</a><br/>Format: Elektronik Kaynak<br/>Digital watermarking and steganographyent://SD_ILS/0/SD_ILS:9440152025-12-22T07:51:38Z2025-12-22T07:51:38Zby Cox, I. J. (Ingemar J.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328311">Click to View</a><br/>Format: Elektronik Kaynak<br/>Contemporary cryptographyent://SD_ILS/0/SD_ILS:9312872025-12-22T07:51:38Z2025-12-22T07:51:38Zby Oppliger, Rolf.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=231638">Click to View</a><br/>Format: Elektronik Kaynak<br/>Bluetooth securityent://SD_ILS/0/SD_ILS:9310092025-12-22T07:51:38Z2025-12-22T07:51:38Zby Gehrmann, Christian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227650">Click to View</a><br/>Format: Elektronik Kaynak<br/>Outsourcing information securityent://SD_ILS/0/SD_ILS:9310182025-12-22T07:51:38Z2025-12-22T07:51:38Zby Axelrod, C. Warren.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227659">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security in wireless LANs and MANsent://SD_ILS/0/SD_ILS:9325072025-12-22T07:51:38Z2025-12-22T07:51:38Zby Hardjono, Thomas.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=240770">Click to View</a><br/>Format: Elektronik Kaynak<br/>Role-based access controlent://SD_ILS/0/SD_ILS:9309912025-12-22T07:51:38Z2025-12-22T07:51:38Zby Ferraiolo, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227631">Click to View</a><br/>Format: Elektronik Kaynak<br/>Developing secure distributed systems with CORBAent://SD_ILS/0/SD_ILS:9309642025-12-22T07:51:38Z2025-12-22T07:51:38Zby Lang, Ulrich.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227602">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security in ad hoc and sensor networksent://SD_ILS/0/SD_ILS:10302542025-12-22T07:51:38Z2025-12-22T07:51:38Zby Beyah, Raheem (Raheem A.), 1976-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1679353">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information hidingent://SD_ILS/0/SD_ILS:11243132025-12-22T07:51:38Z2025-12-22T07:51:38Zby Katzenbeisser, Stefan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4821270">Click to View</a><br/>Format: Elektronik Kaynak<br/>Implementing electronic card payment systemsent://SD_ILS/0/SD_ILS:9309672025-12-22T07:51:38Z2025-12-22T07:51:38Zby Radu, Cristian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227605">Click to View</a><br/>Format: Elektronik Kaynak<br/>Growing vulnerability of the public switched networks : implications for national security emergency preparedness.ent://SD_ILS/0/SD_ILS:11064342025-12-22T07:51:38Z2025-12-22T07:51:38Zby Committee on Review of Switching, Synchronization and Network Control in National Security Telecommunications Board on Telecommunications and Computer Applications Commission on Engineering and Technical Systems National Research Council.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4388299">Click to View</a><br/>Format: Elektronik Kaynak<br/>Toward better usability, security, and privacy of information technology report of a workshopent://SD_ILS/0/SD_ILS:10858152025-12-22T07:51:38Z2025-12-22T07:51:38Zby National Research Council (U.S.). Steering Committee on the Usability, Security, and Privacy of Computer Systems.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3378675">Click to View</a><br/>Format: Elektronik Kaynak<br/>Summary of discussions at a planning meeting on cyber-security and the insider threat to classified informationent://SD_ILS/0/SD_ILS:10848892025-12-22T07:51:38Z2025-12-22T07:51:38Zby National Research Council (U.S.). Computer Science and Telecommunications Board.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3377658">Click to View</a><br/>Format: Elektronik Kaynak<br/>Best damn firewall book periodent://SD_ILS/0/SD_ILS:9442602025-12-22T07:51:38Z2025-12-22T07:51:38Zby Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=330100">Click to View</a><br/>Format: Elektronik Kaynak<br/>Understanding security issuesent://SD_ILS/0/SD_ILS:11325292025-12-22T07:51:38Z2025-12-22T07:51:38Zby Donaldson, Scott E., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5157542">Click to View</a><br/>Format: Elektronik Kaynak<br/>Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviorsent://SD_ILS/0/SD_ILS:11462142025-12-22T07:51:38Z2025-12-22T07:51:38Zby Carpenter, Perry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5763515">Click to View</a><br/>Format: Elektronik Kaynak<br/>The business of cybersecurity : foundations and ideologiesent://SD_ILS/0/SD_ILS:11463812025-12-22T07:51:38Z2025-12-22T07:51:38Zby Sathnur, Ashwini, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5770273">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security and resilience in intelligent data-centric systems and communication networksent://SD_ILS/0/SD_ILS:11301612025-12-22T07:51:38Z2025-12-22T07:51:38Zby Ficco, Massimo, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5090270">Click to View</a><br/>Format: Elektronik Kaynak<br/>IT-Sicherheitsanalysen : Ein prozessorientiertes Vorgehensmodellent://SD_ILS/0/SD_ILS:11247972025-12-22T07:51:38Z2025-12-22T07:51:38Zby Simić, Daniela, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4830572">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network performance and security : testing and analyzing using open source and low-cost toolsent://SD_ILS/0/SD_ILS:11090632025-12-22T07:51:38Z2025-12-22T07:51:38Zby Chapman, Chris, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4452265">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security 2020 reduce security risks this decadeent://SD_ILS/0/SD_ILS:9784162025-12-22T07:51:38Z2025-12-22T07:51:38Zby Howard, Doug.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=694289">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber adversary characterization auditing the hacker mindent://SD_ILS/0/SD_ILS:9394692025-12-22T07:51:38Z2025-12-22T07:51:38Zby Parker, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294071">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity operations handbookent://SD_ILS/0/SD_ILS:9426132025-12-22T07:51:38Z2025-12-22T07:51:38Zby Rittinghouse, John W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=313612">Click to View</a><br/>Format: Elektronik Kaynak<br/>Empirical research for software security : foundations and experienceent://SD_ILS/0/SD_ILS:11329732025-12-22T07:51:38Z2025-12-22T07:51:38Zby ben Othmane, Lotfi, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5164090">Click to View</a><br/>Format: Elektronik Kaynak<br/>Breaking into information security : crafting a custom career path to get the job you really wantent://SD_ILS/0/SD_ILS:11044422025-12-22T07:51:38Z2025-12-22T07:51:38Zby More, Josh, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4187289">Click to View</a><br/>Format: Elektronik Kaynak<br/>Threat modeling : designing for securityent://SD_ILS/0/SD_ILS:10270482025-12-22T07:51:38Z2025-12-22T07:51:38Zby Shostack, Adam.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629177">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network security a practical guideent://SD_ILS/0/SD_ILS:9403342025-12-22T07:51:38Z2025-12-22T07:51:38Zby Poole, Owen.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=298471">Click to View</a><br/>Format: Elektronik Kaynak<br/>The misuse of information systems the impact of security countermeasuresent://SD_ILS/0/SD_ILS:10580442025-12-22T07:51:38Z2025-12-22T07:51:38Zby D'Arcy, John P., 1975-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3016826">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber smart : five habits to protect your family, money, and identity from cyber criminalsent://SD_ILS/0/SD_ILS:11439062025-12-22T07:51:38Z2025-12-22T07:51:38Zby McDonough, Bart, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5612908">Click to View</a><br/>Format: Elektronik Kaynak<br/>Nine steps to success : an ISO 27001 : 2013 implementation overviewent://SD_ILS/0/SD_ILS:11303312025-12-22T07:51:38Z2025-12-22T07:51:38Zby Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5100512">Click to View</a><br/>Format: Elektronik Kaynak<br/>I nove passi per il successo : Compendio per l'attuazione della norma ISO 27001 :2013ent://SD_ILS/0/SD_ILS:11346752025-12-22T07:51:38Z2025-12-22T07:51:38Zby Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5255162">Click to View</a><br/>Format: Elektronik Kaynak<br/>Neuf étapes vers le succès : Un apercu de la mise en oeuvre de la norme ISO 27001 : 2013ent://SD_ILS/0/SD_ILS:11346762025-12-22T07:51:38Z2025-12-22T07:51:38Zby Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5255163">Click to View</a><br/>Format: Elektronik Kaynak<br/>Data breach preparation and response : breaches are certain, impact is notent://SD_ILS/0/SD_ILS:11132162025-12-22T07:51:38Z2025-12-22T07:51:38Zby Fowler, Kevvie, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4556899">Click to View</a><br/>Format: Elektronik Kaynak<br/>Web application security is a stack : how to CYA (Cover Your Apps) completelyent://SD_ILS/0/SD_ILS:10538362025-12-22T07:51:38Z2025-12-22T07:51:38Zby Vittie, Lori Mac, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192126">Click to View</a><br/>Format: Elektronik Kaynak<br/>Assessing information security : strategies, tactics, logic and frameworkent://SD_ILS/0/SD_ILS:10538342025-12-22T07:51:38Z2025-12-22T07:51:38Zby Vladimirov, A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192124">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security risk management building an information security risk management program from the ground upent://SD_ILS/0/SD_ILS:9768042025-12-22T07:51:38Z2025-12-22T07:51:38Zby Wheeler, Evan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=685406">Click to View</a><br/>Format: Elektronik Kaynak<br/>Adaptive security management architectureent://SD_ILS/0/SD_ILS:9722382025-12-22T07:51:38Z2025-12-22T07:51:38Zby Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=625004">Click to View</a><br/>Format: Elektronik Kaynak<br/>Managing information securityent://SD_ILS/0/SD_ILS:10183422025-12-22T07:51:38Z2025-12-22T07:51:38Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1357643">Click to View</a><br/>Format: Elektronik Kaynak<br/>Configuring NetScreen Firewallsent://SD_ILS/0/SD_ILS:9394612025-12-22T07:51:38Z2025-12-22T07:51:38Zby Cameron, Rob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294055">Click to View</a><br/>Format: Elektronik Kaynak<br/>Buffer overflow attacks detect, exploit, preventent://SD_ILS/0/SD_ILS:9302072025-12-22T07:51:38Z2025-12-22T07:51:38Zby Foster, James C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=222803">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network security evaluation using the NSA IEMent://SD_ILS/0/SD_ILS:9338662025-12-22T07:51:38Z2025-12-22T07:51:38Zby Fuller, Ed.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254842">Click to View</a><br/>Format: Elektronik Kaynak<br/>Silence on the wire a field guide to passive reconnaissance and indirect attacksent://SD_ILS/0/SD_ILS:9365792025-12-22T07:51:38Z2025-12-22T07:51:38Zby Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273504">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking the code ASP. NET web application securityent://SD_ILS/0/SD_ILS:9395062025-12-22T07:51:38Z2025-12-22T07:51:38Zby Burnett, Mark (Mark M.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294160">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security sage's guide to hardening the network infrastructureent://SD_ILS/0/SD_ILS:9395712025-12-22T07:51:38Z2025-12-22T07:51:38Zby Andrés, Steven.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294359">Click to View</a><br/>Format: Elektronik Kaynak<br/>How to cheat at Configuring ISA Server 2004ent://SD_ILS/0/SD_ILS:9338772025-12-22T07:51:38Z2025-12-22T07:51:38Zby Shinder, Dr. Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254853">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network security foundationsent://SD_ILS/0/SD_ILS:9350402025-12-22T07:51:38Z2025-12-22T07:51:38Zby Strebe, Matthew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=267332">Click to View</a><br/>Format: Elektronik Kaynak<br/>Snort 2.0 intrusion detectionent://SD_ILS/0/SD_ILS:9395752025-12-22T07:51:38Z2025-12-22T07:51:38Zby Beale, Jay.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294371">Click to View</a><br/>Format: Elektronik Kaynak<br/>Best damn firewall book periodent://SD_ILS/0/SD_ILS:9395852025-12-22T07:51:38Z2025-12-22T07:51:38Zby Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294396">Click to View</a><br/>Format: Elektronik Kaynak<br/>OS X incident response : scripting and analysisent://SD_ILS/0/SD_ILS:11113342025-12-22T07:51:38Z2025-12-22T07:51:38Zby Bradley, Jaron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4526010">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber resilience best practicesent://SD_ILS/0/SD_ILS:11044672025-12-22T07:51:38Z2025-12-22T07:51:38Zby AXELOS Limited, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4187569">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber security and IT infrastructure protectionent://SD_ILS/0/SD_ILS:10189412025-12-22T07:51:38Z2025-12-22T07:51:38Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1377640">Click to View</a><br/>Format: Elektronik Kaynak<br/>An introduction to information security and ISO27001:2013 : a pocket guideent://SD_ILS/0/SD_ILS:10209922025-12-22T07:51:38Z2025-12-22T07:51:38Zby Watkins, Steve G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1463578">Click to View</a><br/>Format: Elektronik Kaynak<br/>ISO27001 / ISO27002 : a pocket guideent://SD_ILS/0/SD_ILS:10209932025-12-22T07:51:38Z2025-12-22T07:51:38Zby Calder, Alan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1463579">Click to View</a><br/>Format: Elektronik Kaynak<br/>Web application defender's cookbook battling hackers and protecting usersent://SD_ILS/0/SD_ILS:10066272025-12-22T07:51:38Z2025-12-22T07:51:38Zby Barnett, Ryan C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108733">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer Forensics jumpstartent://SD_ILS/0/SD_ILS:9736802025-12-22T07:51:38Z2025-12-22T07:51:38Zby Solomon, Michael R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=661659">Click to View</a><br/>Format: Elektronik Kaynak<br/>Mac security bibleent://SD_ILS/0/SD_ILS:9603772025-12-22T07:51:38Z2025-12-22T07:51:38Zby Kissell, Joe.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=477803">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking the art of exploitationent://SD_ILS/0/SD_ILS:10099552025-12-22T07:51:38Z2025-12-22T07:51:38Zby Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137538">Click to View</a><br/>Format: Elektronik Kaynak<br/>Innocent code a security wake-up call for Web programmersent://SD_ILS/0/SD_ILS:9294742025-12-22T07:51:38Z2025-12-22T07:51:38Zby Huseby, Sverre H.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=210558">Click to View</a><br/>Format: Elektronik Kaynak<br/>Stealing the network how to own a continentent://SD_ILS/0/SD_ILS:9395802025-12-22T07:51:38Z2025-12-22T07:51:38Zby Rogers, Russ.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294377">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking the art of exploitationent://SD_ILS/0/SD_ILS:9365672025-12-22T07:51:38Z2025-12-22T07:51:38Zby Erickson, Jon, 1977-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273488">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hack proofing Windows 2000ent://SD_ILS/0/SD_ILS:9395012025-12-22T07:51:38Z2025-12-22T07:51:38Zby Todd, Chad.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294154">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security and privacy in the digital era. Volume 1ent://SD_ILS/0/SD_ILS:11152702025-12-22T07:51:38Z2025-12-22T07:51:38Zby Guerrier, Claudine, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4648717">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber security in parallel and distributed computing : concepts, techniques, applications and case studiesent://SD_ILS/0/SD_ILS:11456862025-12-22T07:51:38Z2025-12-22T07:51:38Zby Le, Dac-Nhuong, 1983- editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5741215">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking point of sale : payment application secrets, threats, and solutionsent://SD_ILS/0/SD_ILS:10270462025-12-22T07:51:38Z2025-12-22T07:51:38Zby Gomzin, Slava.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629175">Click to View</a><br/>Format: Elektronik Kaynak<br/>Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linuxent://SD_ILS/0/SD_ILS:10317372025-12-22T07:51:38Z2025-12-22T07:51:38Zby Buchanan, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1688607">Click to View</a><br/>Format: Elektronik Kaynak<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:10322662025-12-22T07:51:38Z2025-12-22T07:51:38Zby Andress, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1699255">Click to View</a><br/>Format: Elektronik Kaynak<br/>IBM mainframe security beyond the basics : a practical guide from a z/OS and RACF perspectiveent://SD_ILS/0/SD_ILS:10198782025-12-22T07:51:38Z2025-12-22T07:51:38Zby Dattani, Dinesh D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1411689">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking for dummiesent://SD_ILS/0/SD_ILS:10062512025-12-22T07:51:38Z2025-12-22T07:51:38Zby Beaver, Kevin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1106542">Click to View</a><br/>Format: Elektronik Kaynak<br/>A multidisciplinary introduction to information securityent://SD_ILS/0/SD_ILS:10284162025-12-22T07:51:38Z2025-12-22T07:51:38Zby Mjølsnes, Stig F., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1648315">Click to View</a><br/>Format: Elektronik Kaynak<br/>Microsoft Forefront UAG 2010 administrator's handbook take full command of Microsoft Forefront Unified Access Gateway to secure your business applications and provide dynamic remote access with DirectAccessent://SD_ILS/0/SD_ILS:9968442025-12-22T07:51:38Z2025-12-22T07:51:38Zby Ben-Ari, Erez.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948568">Click to View</a><br/>Format: Elektronik Kaynak<br/>MCSE designing security for a Windows Server 2003 network : exam 70-298 study guide & DVD training systement://SD_ILS/0/SD_ILS:9395332025-12-22T07:51:38Z2025-12-22T07:51:38Zby Khnaser, Elias N.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294253">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security secrets, intruders and ID tags.ent://SD_ILS/0/SD_ILS:10920432025-12-22T07:51:38Z2025-12-22T07:51:38Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411447">Click to View</a><br/>Format: Elektronik Kaynak<br/>Applied network security monitoring : collection, detection, and analysisent://SD_ILS/0/SD_ILS:10236592025-12-22T07:51:38Z2025-12-22T07:51:38Zby Sanders, Chris, 1986-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1574451">Click to View</a><br/>Format: Elektronik Kaynak<br/>SQL injection attacks and defenseent://SD_ILS/0/SD_ILS:9972872025-12-22T07:51:38Z2025-12-22T07:51:38Zby Clarke, Justin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=953188">Click to View</a><br/>Format: Elektronik Kaynak<br/>Web commerce security design and developmentent://SD_ILS/0/SD_ILS:9789752025-12-22T07:51:38Z2025-12-22T07:51:38Zby Nahari, Hadi.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706729">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information technology security fundamentalsent://SD_ILS/0/SD_ILS:11026972025-12-22T07:51:38Z2025-12-22T07:51:38Zby Sagers, Glen., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4009415">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network security with pfSense : architect, deploy, and operate enterprise-grade firewallsent://SD_ILS/0/SD_ILS:11421282025-12-22T07:51:38Z2025-12-22T07:51:38Zby Aggarwal, Manuj, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5520881">Click to View</a><br/>Format: Elektronik Kaynak<br/>Practical cyber intelligence : how action-based intelligence can be an effective response to incidentsent://SD_ILS/0/SD_ILS:11366932025-12-22T07:51:38Z2025-12-22T07:51:38Zby Bautista, Wilson, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5332127">Click to View</a><br/>Format: Elektronik Kaynak<br/>Mastering Kali Linux for web penetration testing : test and evaluate all aspects of the design and implentationent://SD_ILS/0/SD_ILS:11277352025-12-22T07:51:38Z2025-12-22T07:51:38Zby McPhee, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4891263">Click to View</a><br/>Format: Elektronik Kaynak<br/>Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutionsent://SD_ILS/0/SD_ILS:11305882025-12-22T07:51:38Z2025-12-22T07:51:38Zby Sharma, Himanshu, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5108416">Click to View</a><br/>Format: Elektronik Kaynak<br/>Advanced penetration testing : hacking the world's most secure networksent://SD_ILS/0/SD_ILS:11237222025-12-22T07:51:38Z2025-12-22T07:51:38Zby Allsopp, Wil, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4813145">Click to View</a><br/>Format: Elektronik Kaynak<br/>Nueve pasos para el éxito : Una vision de conjunto para la aplicacion de la ISO 27001 : 2013ent://SD_ILS/0/SD_ILS:11346782025-12-22T07:51:38Z2025-12-22T07:51:38Zby Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5255165">Click to View</a><br/>Format: Elektronik Kaynak<br/>The network security test lab : a step-by-step guideent://SD_ILS/0/SD_ILS:11031432025-12-22T07:51:38Z2025-12-22T07:51:38Zby Gregg, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040350">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking with Kali : practical penetration testing techniquesent://SD_ILS/0/SD_ILS:10076192025-12-22T07:51:38Z2025-12-22T07:51:38Zby Broad, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115177">Click to View</a><br/>Format: Elektronik Kaynak<br/>Data visualization. Part 2ent://SD_ILS/0/SD_ILS:10242062025-12-22T07:51:38Z2025-12-22T07:51:38Zby Assam, Tarek.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1579356">Click to View</a><br/>Format: Elektronik Kaynak<br/>Practical anonymity hiding in plain sight onlineent://SD_ILS/0/SD_ILS:10076142025-12-22T07:51:38Z2025-12-22T07:51:38Zby Loshin, Peter.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115167">Click to View</a><br/>Format: Elektronik Kaynak<br/>BackTrack 4 assuring security by penetration testing : master the art of penetration testing with BackTrackent://SD_ILS/0/SD_ILS:9969682025-12-22T07:51:38Z2025-12-22T07:51:38Zby Ali, Shakeel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=950518">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network security assessment from vulnerability to patchent://SD_ILS/0/SD_ILS:9370382025-12-22T07:51:38Z2025-12-22T07:51:38Zby Manzuik, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=280219">Click to View</a><br/>Format: Elektronik Kaynak<br/>Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasuresent://SD_ILS/0/SD_ILS:9394832025-12-22T07:51:38Z2025-12-22T07:51:38Zby Contos, Brian T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294116">Click to View</a><br/>Format: Elektronik Kaynak<br/>Configuring SonicWALL firewallsent://SD_ILS/0/SD_ILS:9340732025-12-22T07:51:38Z2025-12-22T07:51:38Zby Lathem, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=256369">Click to View</a><br/>Format: Elektronik Kaynak<br/>How to cheat at managing information securityent://SD_ILS/0/SD_ILS:9347422025-12-22T07:51:38Z2025-12-22T07:51:38Zby Osborne, Mark.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=266207">Click to View</a><br/>Format: Elektronik Kaynak<br/>Firewall policies and VPN configurationsent://SD_ILS/0/SD_ILS:9359862025-12-22T07:51:38Z2025-12-22T07:51:38Zby Cantrell, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=272100">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cisco Pix firewalls configure, manage and troubleshootent://SD_ILS/0/SD_ILS:9338592025-12-22T07:51:38Z2025-12-22T07:51:38Zby Behrens, Thorsten.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254835">Click to View</a><br/>Format: Elektronik Kaynak<br/>Kali Linux intrusion and exploitation cookbook : over 70 recipes for system administrator or DevOps to master Kali Linux 2 and perform effective security assessmentent://SD_ILS/0/SD_ILS:11255492025-12-22T07:51:38Z2025-12-22T07:51:38Zby Shah, Dhruv, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4845574">Click to View</a><br/>Format: Elektronik Kaynak<br/>Kali linux wireless penetration testing cookbook : identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless securityent://SD_ILS/0/SD_ILS:11334342025-12-22T07:51:38Z2025-12-22T07:51:38Zby Oriyano, Sean-Philip, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5188228">Click to View</a><br/>Format: Elektronik Kaynak<br/>Zabbix network monitoring essentials : your one-stop solution to efficient network monitoring with zabbixent://SD_ILS/0/SD_ILS:10460482025-12-22T07:51:38Z2025-12-22T07:51:38Zby Vacche, Andrea Dalle, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1973849">Click to View</a><br/>Format: Elektronik Kaynak<br/>Untangle network security : secure your network against threats and vulnerabilities using the unparalleled Untangle NGFWent://SD_ILS/0/SD_ILS:10405102025-12-22T07:51:38Z2025-12-22T07:51:38Zby El-Bawab, Abd El-Monem A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1831903">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer forensics with FTK : enhance your computer forensics knowledge through illustrations, tips, tricks, and practical real-world scenariosent://SD_ILS/0/SD_ILS:10291072025-12-22T07:51:38Z2025-12-22T07:51:38Zby Carbone, Fernando, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1657797">Click to View</a><br/>Format: Elektronik Kaynak<br/>Toward a safer and more secure cyberspaceent://SD_ILS/0/SD_ILS:10854522025-12-22T07:51:38Z2025-12-22T07:51:38Zby Goodman, Seymour E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3378311">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security architect : careers in information securityent://SD_ILS/0/SD_ILS:10330652025-12-22T07:51:38Z2025-12-22T07:51:38Zby Collins, Jon, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1713960">Click to View</a><br/>Format: Elektronik Kaynak<br/>Dr. Tom Shinder's configuring ISA Server 2004ent://SD_ILS/0/SD_ILS:9394792025-12-22T07:51:38Z2025-12-22T07:51:38Zby Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294094">Click to View</a><br/>Format: Elektronik Kaynak<br/>Configuring ISA server 2000 building firewalls for windows 2000ent://SD_ILS/0/SD_ILS:9394602025-12-22T07:51:38Z2025-12-22T07:51:38Zby Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294054">Click to View</a><br/>Format: Elektronik Kaynak<br/>Dependable software systems engineeringent://SD_ILS/0/SD_ILS:11115152025-12-22T07:51:38Z2025-12-22T07:51:38Zby Esparza, Javier, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4528955">Click to View</a><br/>Format: Elektronik Kaynak<br/>Dns security : defending the domain name systement://SD_ILS/0/SD_ILS:11132152025-12-22T07:51:38Z2025-12-22T07:51:38Zby Liska, Allan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4556898">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computational network science : an algorithmic approachent://SD_ILS/0/SD_ILS:10381842025-12-22T07:51:38Z2025-12-22T07:51:38Zby Hexmoor, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1798312">Click to View</a><br/>Format: Elektronik Kaynak<br/>Ethereal packet sniffingent://SD_ILS/0/SD_ILS:9394852025-12-22T07:51:38Z2025-12-22T07:51:38Zby Orebaugh, Angela.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294122">Click to View</a><br/>Format: Elektronik Kaynak<br/>Fuzzing for software security testing and quality assuranceent://SD_ILS/0/SD_ILS:9563292025-12-22T07:51:38Z2025-12-22T07:51:38Zby Takanen, Ari.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456884">Click to View</a><br/>Format: Elektronik Kaynak<br/>Coding for penetration testers building better toolsent://SD_ILS/0/SD_ILS:9835212025-12-22T07:51:38Z2025-12-22T07:51:38Zby Andress, Jason.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=773396">Click to View</a><br/>Format: Elektronik Kaynak<br/>Nessus, Snort, & Ethereal power tools customizing open source security applicationsent://SD_ILS/0/SD_ILS:9338632025-12-22T07:51:38Z2025-12-22T07:51:38Zby Archibald, Neil.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254839">Click to View</a><br/>Format: Elektronik Kaynak<br/>Learn ethical hacking from scratch : your stepping stone to penetration testingent://SD_ILS/0/SD_ILS:11411112025-12-22T07:51:38Z2025-12-22T07:51:38Zby Sabih, Zaid, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5485020">Click to View</a><br/>Format: Elektronik Kaynak<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:11184652025-12-22T07:51:38Z2025-12-22T07:51:38Zby Faircloth, Jeremy, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4694443">Click to View</a><br/>Format: Elektronik Kaynak<br/>Building a corporate culture of security : strategies for strengthening organizational resiliencyent://SD_ILS/0/SD_ILS:11083492025-12-22T07:51:38Z2025-12-22T07:51:38Zby Sullivant, John, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4425984">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity and applied mathematicsent://SD_ILS/0/SD_ILS:11131692025-12-22T07:51:38Z2025-12-22T07:51:38Zby Metcalf, Leigh, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4556234">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security in fixed and wireless networksent://SD_ILS/0/SD_ILS:11155852025-12-22T07:51:38Z2025-12-22T07:51:38Zby Schäfer, Günter, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4658592">Click to View</a><br/>Format: Elektronik Kaynak<br/>Penetration testing services procurement guideent://SD_ILS/0/SD_ILS:10370842025-12-22T07:51:38Z2025-12-22T07:51:38Zby Creasey, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778765">Click to View</a><br/>Format: Elektronik Kaynak<br/>Procuring penetration testing services.ent://SD_ILS/0/SD_ILS:10370852025-12-22T07:51:38Z2025-12-22T07:51:38Z<a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778766">Click to View</a><br/>Format: Elektronik Kaynak<br/>Pragmatic security metrics applying metametrics to information securityent://SD_ILS/0/SD_ILS:10109722025-12-22T07:51:38Z2025-12-22T07:51:38Zby Brotby, W. Krag.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1153198">Click to View</a><br/>Format: Elektronik Kaynak<br/>The tangled Web a guide to securing modern Web applicationsent://SD_ILS/0/SD_ILS:10099762025-12-22T07:51:38Z2025-12-22T07:51:38Zby Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137574">Click to View</a><br/>Format: Elektronik Kaynak<br/>Identity management concepts, technologies, and systemsent://SD_ILS/0/SD_ILS:9725072025-12-22T07:51:38Z2025-12-22T07:51:38Zby Bertino, Elisa.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=634511">Click to View</a><br/>Format: Elektronik Kaynak<br/>Unauthorised access physical penetration testing for IT security teamsent://SD_ILS/0/SD_ILS:9587762025-12-22T07:51:38Z2025-12-22T07:51:38Zby Allsopp, Wil.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=470412">Click to View</a><br/>Format: Elektronik Kaynak<br/>Secure computer and network systems modeling, analysis and designent://SD_ILS/0/SD_ILS:9463852025-12-22T07:51:38Z2025-12-22T07:51:38Zby Ye, Nong.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=351427">Click to View</a><br/>Format: Elektronik Kaynak<br/>Developer's guide to web application securityent://SD_ILS/0/SD_ILS:9385212025-12-22T07:51:38Z2025-12-22T07:51:38Zby Cross, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=289735">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security data visualization graphical techniques for network analysisent://SD_ILS/0/SD_ILS:10584542025-12-22T07:51:38Z2025-12-22T07:51:38Zby Conti, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3017625">Click to View</a><br/>Format: Elektronik Kaynak<br/>Host integrity monitoring using Osiris and Samhainent://SD_ILS/0/SD_ILS:9316062025-12-22T07:51:38Z2025-12-22T07:51:38Zby Wotring, Brian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=233599">Click to View</a><br/>Format: Elektronik Kaynak<br/>Check Point NG VPN-1/Firewall-1 advanced configuration and troubleshootingent://SD_ILS/0/SD_ILS:9394482025-12-22T07:51:38Z2025-12-22T07:51:38Zby Noble, Jim.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294030">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hack proofing ColdFusionent://SD_ILS/0/SD_ILS:9394982025-12-22T07:51:38Z2025-12-22T07:51:38Zby Meyer, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294151">Click to View</a><br/>Format: Elektronik Kaynak<br/>The five technological forces disrupting security : how social, mobile, cloud and iot are fundamentally changing the practice of physical securityent://SD_ILS/0/SD_ILS:11288832025-12-22T07:51:38Z2025-12-22T07:51:38Zby Van Till, Steve, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4981408">Click to View</a><br/>Format: Elektronik Kaynak<br/>Applied network security : master the art of detecting and averting advanced network security attacks and techniquesent://SD_ILS/0/SD_ILS:11258302025-12-22T07:51:38Z2025-12-22T07:51:38Zby Salmon, Arthur, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4853051">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber-risk informatics : engineering evaluation with data sciencefent://SD_ILS/0/SD_ILS:11111772025-12-22T07:51:38Z2025-12-22T07:51:38Zby Sahinoglu, Mehmet, 1951- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4519251">Click to View</a><br/>Format: Elektronik Kaynak<br/>Advanced penetration testing for highly-secured environments.ent://SD_ILS/0/SD_ILS:11112142025-12-22T07:51:38Z2025-12-22T07:51:38Zby Allen, Lee, 1946- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4520648">Click to View</a><br/>Format: Elektronik Kaynak<br/>Understanding bitcoin : cryptography, engineering and economics.ent://SD_ILS/0/SD_ILS:10401802025-12-22T07:51:38Z2025-12-22T07:51:38Zby Franco, Pedro, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1823060">Click to View</a><br/>Format: Elektronik Kaynak<br/>Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanningent://SD_ILS/0/SD_ILS:10361782025-12-22T07:51:38Z2025-12-22T07:51:38Zby Hutchens, Justin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1771381">Click to View</a><br/>Format: Elektronik Kaynak<br/>Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtuallyent://SD_ILS/0/SD_ILS:10281452025-12-22T07:51:38Z2025-12-22T07:51:38Zby Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1644005">Click to View</a><br/>Format: Elektronik Kaynak<br/>At the nexus of cybersecurity and public policy : some basic concepts and issuesent://SD_ILS/0/SD_ILS:10864542025-12-22T07:51:38Z2025-12-22T07:51:38Zby Clark, David, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3379336">Click to View</a><br/>Format: Elektronik Kaynak<br/>Professional penetration testing creating and learning in a hacking labent://SD_ILS/0/SD_ILS:10076162025-12-22T07:51:38Z2025-12-22T07:51:38Zby Wilhelm, Thomas.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115172">Click to View</a><br/>Format: Elektronik Kaynak<br/>CISO's guide to penetration testing a framework to plan, manage, and maximize benefitsent://SD_ILS/0/SD_ILS:9874712025-12-22T07:51:38Z2025-12-22T07:51:38Zby Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826967">Click to View</a><br/>Format: Elektronik Kaynak<br/>A cyberworm that knows no boundariesent://SD_ILS/0/SD_ILS:9897112025-12-22T07:51:38Z2025-12-22T07:51:38Zby Porche, Isaac, 1968-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=846009">Click to View</a><br/>Format: Elektronik Kaynak<br/>How to cheat at designing security for a Windows Server 2003 networkent://SD_ILS/0/SD_ILS:9338562025-12-22T07:51:38Z2025-12-22T07:51:38Zby Amini, Rob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254832">Click to View</a><br/>Format: Elektronik Kaynak<br/>Securing IM and P2P applications for the enterpriseent://SD_ILS/0/SD_ILS:9338712025-12-22T07:51:38Z2025-12-22T07:51:38Zby Piccard, Paul L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254847">Click to View</a><br/>Format: Elektronik Kaynak<br/>FISMA and the risk management framework the new practice of federal cyber securityent://SD_ILS/0/SD_ILS:10040112025-12-22T07:51:38Z2025-12-22T07:51:38Zby Gantz, Stephen D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1074427">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking web apps detecting and preventing web application security problemsent://SD_ILS/0/SD_ILS:10003712025-12-22T07:51:38Z2025-12-22T07:51:38Zby Shema, Mike.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1012529">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security and embedded systemsent://SD_ILS/0/SD_ILS:9347252025-12-22T07:51:38Z2025-12-22T07:51:38Zby NATO Advanced Research Workshop on Security and Embedded Systems (2005 August 22-26 : Patrai, Greece)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=265974">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber security awareness for CEOs and managementent://SD_ILS/0/SD_ILS:11045662025-12-22T07:51:38Z2025-12-22T07:51:38Zby Willson, David, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4189279">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity blue team toolkitent://SD_ILS/0/SD_ILS:11458412025-12-22T07:51:38Z2025-12-22T07:51:38Zby Tanner, Nadean, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5747366">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking the hackerent://SD_ILS/0/SD_ILS:11255252025-12-22T07:51:38Z2025-12-22T07:51:38Zby Grimes, Roger A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4845208">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security controls evaluation, testing, and assessment handbookent://SD_ILS/0/SD_ILS:11489862025-12-22T07:51:38Z2025-12-22T07:51:38Zby Johnson, Leighton, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5986757">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information security risk management for ISO 27001/ISO 27002ent://SD_ILS/0/SD_ILS:11481972025-12-22T07:51:38Z2025-12-22T07:51:38Zby Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5894007">Click to View</a><br/>Format: Elektronik Kaynak<br/>How cyber security can protect your business : a guide for all stakeholdersent://SD_ILS/0/SD_ILS:11488872025-12-22T07:51:38Z2025-12-22T07:51:38Zby Wright, Christopher, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5979597">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity law : protect yourself and your customersent://SD_ILS/0/SD_ILS:11452282025-12-22T07:51:38Z2025-12-22T07:51:38Zby Brathwaite, Shimon, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5719658">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hardware security : a hands-on learning approachent://SD_ILS/0/SD_ILS:11460412025-12-22T07:51:38Z2025-12-22T07:51:38Zby Bhunia, Swarup, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5754491">Click to View</a><br/>Format: Elektronik Kaynak<br/>Digital asset valuation and cyber risk measurement : principles of cybernomicsent://SD_ILS/0/SD_ILS:11466032025-12-22T07:51:38Z2025-12-22T07:51:38Zby Ruan, Keyun, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5780982">Click to View</a><br/>Format: Elektronik Kaynak<br/>Port cybersecurity : securing critical information infrastructures and supply chainsent://SD_ILS/0/SD_ILS:11309292025-12-22T07:51:38Z2025-12-22T07:51:38Zby Polemi, Nineta, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5118465">Click to View</a><br/>Format: Elektronik Kaynak<br/>Online danger : how to protect yourself and your loved ones from the evil side of the internetent://SD_ILS/0/SD_ILS:11481392025-12-22T07:51:38Z2025-12-22T07:51:38Zby Cole, Eric, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5893451">Click to View</a><br/>Format: Elektronik Kaynak<br/>Wireshark for security professionals : using wireshark and the metasploit frameworkent://SD_ILS/0/SD_ILS:11239252025-12-22T07:51:38Z2025-12-22T07:51:38Zby Bullock, Jessey, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4816492">Click to View</a><br/>Format: Elektronik Kaynak<br/>RIoT control : understanding and managing risks and the internet of thingsent://SD_ILS/0/SD_ILS:11182632025-12-22T07:51:38Z2025-12-22T07:51:38Zby Macaulay, Tyson, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4691335">Click to View</a><br/>Format: Elektronik Kaynak<br/>Securing the internet of thingsent://SD_ILS/0/SD_ILS:11223712025-12-22T07:51:38Z2025-12-22T07:51:38Zby Li, Shancang, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4786871">Click to View</a><br/>Format: Elektronik Kaynak<br/>IoT penetration testing cookbook : identify vulnerabilities and secure your smart devices.ent://SD_ILS/0/SD_ILS:11330492025-12-22T07:51:38Z2025-12-22T07:51:38Zby Guzman, Aaron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5165736">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security in the digital world : for the home user, parent, consumer and home officeent://SD_ILS/0/SD_ILS:11337122025-12-22T07:51:38Z2025-12-22T07:51:38Zby Day, Graham, 1945- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5211340">Click to View</a><br/>Format: Elektronik Kaynak<br/>The information systems security officer's guide : establishing and managing a cyber security programent://SD_ILS/0/SD_ILS:11055802025-12-22T07:51:38Z2025-12-22T07:51:38Zby Kovacich, Gerald L., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4334673">Click to View</a><br/>Format: Elektronik Kaynak<br/>Chaotic secure communication : principles and technologiesent://SD_ILS/0/SD_ILS:11192542025-12-22T07:51:38Z2025-12-22T07:51:38Zby Sun, Kehui, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4707910">Click to View</a><br/>Format: Elektronik Kaynak<br/>Linux server security : hack and defendent://SD_ILS/0/SD_ILS:11111792025-12-22T07:51:38Z2025-12-22T07:51:38Zby Binnie, Christopher, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4519259">Click to View</a><br/>Format: Elektronik Kaynak<br/>Selling information security to the board : a primerent://SD_ILS/0/SD_ILS:11111862025-12-22T07:51:38Z2025-12-22T07:51:38Zby Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4519662">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information security science : measuring the vulnerability to data compromisesent://SD_ILS/0/SD_ILS:11135002025-12-22T07:51:38Z2025-12-22T07:51:38Zby Young, Carl S., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4567434">Click to View</a><br/>Format: Elektronik Kaynak<br/>Meeting people via WiFi and Bluetoothent://SD_ILS/0/SD_ILS:11045672025-12-22T07:51:38Z2025-12-22T07:51:38Zby Schroeder, Joshua, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4189280">Click to View</a><br/>Format: Elektronik Kaynak<br/>Designing and building a security operations centerent://SD_ILS/0/SD_ILS:10406152025-12-22T07:51:38Z2025-12-22T07:51:38Zby Nathans, David, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1834659">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information security analytics : finding security insights, patterns and anomalies in big dataent://SD_ILS/0/SD_ILS:10416292025-12-22T07:51:38Z2025-12-22T07:51:38Zby Mark, Talabis, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1873129">Click to View</a><br/>Format: Elektronik Kaynak<br/>Infosec management fundamentalsent://SD_ILS/0/SD_ILS:10535832025-12-22T07:51:38Z2025-12-22T07:51:38Zby Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2146007">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network attacks & exploitation : a frameworkent://SD_ILS/0/SD_ILS:11031442025-12-22T07:51:38Z2025-12-22T07:51:38Zby Monte, Matthew, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040351">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersécurité des Installations Industriellesent://SD_ILS/0/SD_ILS:11450962025-12-22T07:51:38Z2025-12-22T07:51:38Zby Fourastier, Yannick, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709851">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersécurité des installations industrielles : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450602025-12-22T07:51:38Z2025-12-22T07:51:38Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709810">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersécurité des installations industrielles : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450622025-12-22T07:51:38Z2025-12-22T07:51:38Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709812">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersécurité des Installations Industrielles. Chapter V, Des bus de terrain a l'Industrial Ethernetent://SD_ILS/0/SD_ILS:11450702025-12-22T07:51:38Z2025-12-22T07:51:38Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709821">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersécurité des installations industrielles. Chapitre X, Sécurité des Réseaux Industriels étendus : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450732025-12-22T07:51:38Z2025-12-22T07:51:38Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709824">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersécurité des installations industrielles. Chapitre II, Typologie des installations industrielles : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450772025-12-22T07:51:38Z2025-12-22T07:51:38Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709828">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersécurité des installations industrielles. Chapitre II, Typologie des installations industrielles : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450782025-12-22T07:51:38Z2025-12-22T07:51:38Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709829">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersécurité des installations industrielles. Chapter VI, Analyse des risques : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450822025-12-22T07:51:38Z2025-12-22T07:51:38Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709834">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersécurité des installations industrielles. Chapitre I, Mythes et réalités de la cybersécurité des systèmes numériques industriels : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450832025-12-22T07:51:38Z2025-12-22T07:51:38Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709836">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersécurité des Installations Industrielles : Chapitre XII Panorama de l'offre Technologique Pour la Cybersécurité Industrielleent://SD_ILS/0/SD_ILS:11450912025-12-22T07:51:38Z2025-12-22T07:51:38Zby Fourastier, Yannick, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709845">Click to View</a><br/>Format: Elektronik Kaynak<br/>Using security patterns in web-applicationent://SD_ILS/0/SD_ILS:11356212025-12-22T07:51:38Z2025-12-22T07:51:38Zby Alam, Shahnawaz, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5291824">Click to View</a><br/>Format: Elektronik Kaynak<br/>Bent functions : results and applications to cryptographyent://SD_ILS/0/SD_ILS:10538312025-12-22T07:51:38Z2025-12-22T07:51:38Zby Tokareva, Natalia, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192079">Click to View</a><br/>Format: Elektronik Kaynak<br/>Chinese cybersecurity and defenseent://SD_ILS/0/SD_ILS:10358412025-12-22T07:51:38Z2025-12-22T07:51:38Zby Ventre, Daniel, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1765106">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information security breaches : avoidance and treatment based on ISO27001ent://SD_ILS/0/SD_ILS:10370822025-12-22T07:51:38Z2025-12-22T07:51:38Zby Krausz, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778763">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber essentials : a pocket guideent://SD_ILS/0/SD_ILS:10370882025-12-22T07:51:38Z2025-12-22T07:51:38Zby Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778769">Click to View</a><br/>Format: Elektronik Kaynak<br/>Data-driven security : analysis, visualization and dashboardsent://SD_ILS/0/SD_ILS:10258192025-12-22T07:51:38Z2025-12-22T07:51:38Zby Jacobs, Jay.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1599321">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security leader insights for information protection : lessons and strategies from leading security professionalsent://SD_ILS/0/SD_ILS:10322652025-12-22T07:51:38Z2025-12-22T07:51:38Zby Fahy, Bob, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1699254">Click to View</a><br/>Format: Elektronik Kaynak<br/>Datennutzungs- und datenschutzverträge : muster, klauseln, erläuterungenent://SD_ILS/0/SD_ILS:10534912025-12-22T07:51:38Z2025-12-22T07:51:38Zby Moos, Flemming, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2129586">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyberspace and cybersecurityent://SD_ILS/0/SD_ILS:10206952025-12-22T07:51:38Z2025-12-22T07:51:38Zby Kostopoulos, George K., 1939- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1446799">Click to View</a><br/>Format: Elektronik Kaynak<br/>Getting started with FortiGateent://SD_ILS/0/SD_ILS:10234742025-12-22T07:51:38Z2025-12-22T07:51:38Zby Fabbri, Rosato.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572901">Click to View</a><br/>Format: Elektronik Kaynak<br/>OAuth 2.0 identity and access management patternsent://SD_ILS/0/SD_ILS:10234802025-12-22T07:51:38Z2025-12-22T07:51:38Zby Spasovski, Martin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572907">Click to View</a><br/>Format: Elektronik Kaynak<br/>Instant Java password and authentication securityent://SD_ILS/0/SD_ILS:10234862025-12-22T07:51:38Z2025-12-22T07:51:38Zby Mayoral, Fernando.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572913">Click to View</a><br/>Format: Elektronik Kaynak<br/>Data hiding exposing concealed data in multimedia, operating systems, mobile devices, and network protocolsent://SD_ILS/0/SD_ILS:10039162025-12-22T07:51:38Z2025-12-22T07:51:38Zby Raggo, Michael T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073014">Click to View</a><br/>Format: Elektronik Kaynak<br/>Intelligent systems for security informaticsent://SD_ILS/0/SD_ILS:10094932025-12-22T07:51:38Z2025-12-22T07:51:38Zby Yang, Christopher.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1133729">Click to View</a><br/>Format: Elektronik Kaynak<br/>Low tech hacking street smarts for security professionalsent://SD_ILS/0/SD_ILS:9877872025-12-22T07:51:38Z2025-12-22T07:51:38Zby Wiles, Jack.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=829964">Click to View</a><br/>Format: Elektronik Kaynak<br/>IBM i security administration and complianceent://SD_ILS/0/SD_ILS:9937152025-12-22T07:51:38Z2025-12-22T07:51:38Zby Woodbury, Carol.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=906259">Click to View</a><br/>Format: Elektronik Kaynak<br/>Oracle 11g anti-hacker's cookbookent://SD_ILS/0/SD_ILS:10033492025-12-22T07:51:38Z2025-12-22T07:51:38Zby Neagu, Adrian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1057945">Click to View</a><br/>Format: Elektronik Kaynak<br/>Securing WebLogic Server 12c learn to develop, administer, and troubleshot your WebLogic Serverent://SD_ILS/0/SD_ILS:10049592025-12-22T07:51:38Z2025-12-22T07:51:38Zby Masini, Luca.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1085228">Click to View</a><br/>Format: Elektronik Kaynak<br/>Spring Security 3.1 secure your web applications from hackers with the step-by-step guideent://SD_ILS/0/SD_ILS:10065082025-12-22T07:51:38Z2025-12-22T07:51:38Zby Winch, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108351">Click to View</a><br/>Format: Elektronik Kaynak<br/>Microsoft Forefront Identity Manager 2010 R2 handbookent://SD_ILS/0/SD_ILS:10006802025-12-22T07:51:38Z2025-12-22T07:51:38Zby Nordström, Kent.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1019543">Click to View</a><br/>Format: Elektronik Kaynak<br/>Microsoft SQL Server 2012 security cookbookent://SD_ILS/0/SD_ILS:10018912025-12-22T07:51:38Z2025-12-22T07:51:38Zby Bruchez, Rudi.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1036251">Click to View</a><br/>Format: Elektronik Kaynak<br/>Dear hacker letters to the editor of 2600ent://SD_ILS/0/SD_ILS:9648672025-12-22T07:51:38Z2025-12-22T07:51:38Zby Goldstein, Emmanuel J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537340">Click to View</a><br/>Format: Elektronik Kaynak<br/>Professional Cocoa application securityent://SD_ILS/0/SD_ILS:9648702025-12-22T07:51:38Z2025-12-22T07:51:38Zby Lee, Graham J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537355">Click to View</a><br/>Format: Elektronik Kaynak<br/>Least privilege security for Windows 7, Vista, And XP secure desktops for regulatory compliance and business agilityent://SD_ILS/0/SD_ILS:9963142025-12-22T07:51:38Z2025-12-22T07:51:38Zby Smith, Russell.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=944038">Click to View</a><br/>Format: Elektronik Kaynak<br/>Distributed systems security issues, processes, and solutionsent://SD_ILS/0/SD_ILS:9541832025-12-22T07:51:38Z2025-12-22T07:51:38Zby Belapurkar, Abhijit.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=437429">Click to View</a><br/>Format: Elektronik Kaynak<br/>Gray hat Python Python programming for hackers and reverse engineersent://SD_ILS/0/SD_ILS:10099522025-12-22T07:51:38Z2025-12-22T07:51:38Zby Seitz, Justin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137535">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer forensics for dummiesent://SD_ILS/0/SD_ILS:9477742025-12-22T07:51:38Z2025-12-22T07:51:38Zby Volonino, Linda.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=380503">Click to View</a><br/>Format: Elektronik Kaynak<br/>Microsoft Vista for IT security professionalsent://SD_ILS/0/SD_ILS:9440752025-12-22T07:51:38Z2025-12-22T07:51:38Zby Piltzecker, Tony, 1975-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328623">Click to View</a><br/>Format: Elektronik Kaynak<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:9442822025-12-22T07:51:38Z2025-12-22T07:51:38Zby Winkler, Ira.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=330200">Click to View</a><br/>Format: Elektronik Kaynak<br/>Microsoft windows security fundamentalsent://SD_ILS/0/SD_ILS:9396472025-12-22T07:51:38Z2025-12-22T07:51:38Zby Clercq, Jan de, 1968-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294637">Click to View</a><br/>Format: Elektronik Kaynak<br/>Perfect passwords selection, protection, authenticationent://SD_ILS/0/SD_ILS:9338752025-12-22T07:51:38Z2025-12-22T07:51:38Zby Burnett, Mark.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254851">Click to View</a><br/>Format: Elektronik Kaynak<br/>Multimedia security technologies for digital rights managementent://SD_ILS/0/SD_ILS:9366402025-12-22T07:51:38Z2025-12-22T07:51:38Zby Zeng, Wenjun, 1967-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=274233">Click to View</a><br/>Format: Elektronik Kaynak<br/>Combating spyware in the enterpriseent://SD_ILS/0/SD_ILS:9366452025-12-22T07:51:38Z2025-12-22T07:51:38Zby Baskin, Brian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=274289">Click to View</a><br/>Format: Elektronik Kaynak<br/>Implementing database security and auditingent://SD_ILS/0/SD_ILS:9380792025-12-22T07:51:38Z2025-12-22T07:51:38Zby Ben-Natan, Ron.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=286701">Click to View</a><br/>Format: Elektronik Kaynak<br/>Black hat physical device security exploiting hardware and softwareent://SD_ILS/0/SD_ILS:9302092025-12-22T07:51:38Z2025-12-22T07:51:38Zby Miller, Drew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=222851">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber spying tracking your family's (sometimes) secret online livesent://SD_ILS/0/SD_ILS:9302102025-12-22T07:51:38Z2025-12-22T07:51:38Zby Fair, Ted.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=222853">Click to View</a><br/>Format: Elektronik Kaynak<br/>Sockets, shellcode, porting & coding reverse engineering exploits and tool coding for security professionalsent://SD_ILS/0/SD_ILS:9307132025-12-22T07:51:38Z2025-12-22T07:51:38Zby Foster, James C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=226568">Click to View</a><br/>Format: Elektronik Kaynak<br/>Aggressive network self-defenseent://SD_ILS/0/SD_ILS:9306562025-12-22T07:51:38Z2025-12-22T07:51:38Zby Wyler, Neil R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=225321">Click to View</a><br/>Format: Elektronik Kaynak<br/>Click, click, who's there? a family-based non-technical approach to help parents protect their children onlineent://SD_ILS/0/SD_ILS:9452752025-12-22T07:51:38Z2025-12-22T07:51:38Zby Koh.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338852">Click to View</a><br/>Format: Elektronik Kaynak<br/>SSCP study guide and & DVD training systement://SD_ILS/0/SD_ILS:9395782025-12-22T07:51:38Z2025-12-22T07:51:38Zby Jacobs, Josh.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294375">Click to View</a><br/>Format: Elektronik Kaynak<br/>Check Point NG next generation security administrationent://SD_ILS/0/SD_ILS:9394472025-12-22T07:51:38Z2025-12-22T07:51:38Zby Simonis, Drew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294029">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hack proofing XMLent://SD_ILS/0/SD_ILS:9395022025-12-22T07:51:38Z2025-12-22T07:51:38Zby O'Farrell, Neal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294155">Click to View</a><br/>Format: Elektronik Kaynak<br/>Special issue on internet securityent://SD_ILS/0/SD_ILS:9315302025-12-22T07:51:38Z2025-12-22T07:51:38Zby Dhillon, Gurpreet.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=232281">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hack proofing Sun Solaris 8ent://SD_ILS/0/SD_ILS:9395002025-12-22T07:51:38Z2025-12-22T07:51:38Zby Vincent, Thomas.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294153">Click to View</a><br/>Format: Elektronik Kaynak<br/>Technology and privacy the new landscapeent://SD_ILS/0/SD_ILS:10811092025-12-22T07:51:38Z2025-12-22T07:51:38Zby Agre, Philip.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3338469">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computers at risk safe computing in the information ageent://SD_ILS/0/SD_ILS:10838592025-12-22T07:51:38Z2025-12-22T07:51:38Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3376465">Click to View</a><br/>Format: Elektronik Kaynak<br/>Engineering secure and dependable software systemsent://SD_ILS/0/SD_ILS:11483372025-12-22T07:51:38Z2025-12-22T07:51:38Zby Pretschner, Alexander, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5899580">Click to View</a><br/>Format: Elektronik Kaynak<br/>Solving cyber risk : protecting your company and societyent://SD_ILS/0/SD_ILS:11439482025-12-22T07:51:38Z2025-12-22T07:51:38Zby Coburn, Andrew (Andrew W.), author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5614240">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersécurité et RGPD : protégez votre PME : guide pratique pour sécuriser votre système informatique et vous conformer au RGPDent://SD_ILS/0/SD_ILS:11415122025-12-22T07:51:38Z2025-12-22T07:51:38Zby Ejzyn, Alain, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5496488">Click to View</a><br/>Format: Elektronik Kaynak<br/>Kali Linux wireless penetration testing : beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attackent://SD_ILS/0/SD_ILS:11370502025-12-22T07:51:38Z2025-12-22T07:51:38Zby Buchanan, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5340668">Click to View</a><br/>Format: Elektronik Kaynak<br/>Ethical hackerent://SD_ILS/0/SD_ILS:11322362025-12-22T07:51:38Z2025-12-22T07:51:38Zby Loh-Hagan, Virginia, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5155680">Click to View</a><br/>Format: Elektronik Kaynak<br/>Critical infrastructure protection in homeland security : defending a networked nationent://SD_ILS/0/SD_ILS:10396662025-12-22T07:51:38Z2025-12-22T07:51:38Zby Lewis, T. G. (Theodore Gyle), 1941- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1813343">Click to View</a><br/>Format: Elektronik Kaynak<br/>Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systemsent://SD_ILS/0/SD_ILS:10424692025-12-22T07:51:38Z2025-12-22T07:51:38Zby Knapp, Eric D., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1887712">Click to View</a><br/>Format: Elektronik Kaynak<br/>Kali Linux wireless penetration testing beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linuxent://SD_ILS/0/SD_ILS:10470892025-12-22T07:51:38Z2025-12-22T07:51:38Zby Ramachandran, Vivek, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2005211">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersécurité des installations industrielles. Chapitre XIII, État des Lieux des Référentiels en Sécurité des Systèmes Numériques Industriels : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450612025-12-22T07:51:38Z2025-12-22T07:51:38Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709811">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersécurité des installations industrielles. Chapitre XIV, Réglementation de la Cybersécurité et Régime Juridique des Systèmes Numériques Industriels : une étude des Dispositions Réglementaires en Cybersécurité en France et Aux États-Unis : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450742025-12-22T07:51:38Z2025-12-22T07:51:38Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709825">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersécurité des installations industrielles. Chapter IV, Malveillance numérique sur les systèmes industriels : histoire de la menace, événements emblématiques, tendances et perspectives : défendre ses systèmes numériquesent://SD_ILS/0/SD_ILS:11450792025-12-22T07:51:38Z2025-12-22T07:51:38Zby Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5709831">Click to View</a><br/>Format: Elektronik Kaynak<br/>Implementing NetScaler VPX : leverage the features of NetScaler VPX to optimize and deploy responsive web services and applications on multiple virtualization platformsent://SD_ILS/0/SD_ILS:10299022025-12-22T07:51:38Z2025-12-22T07:51:38Zby Sandbu, Marius, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1674868">Click to View</a><br/>Format: Elektronik Kaynak<br/>The true cost of information security breaches and cyber crimeent://SD_ILS/0/SD_ILS:10212732025-12-22T07:51:38Z2025-12-22T07:51:38Zby Krausz, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1477418">Click to View</a><br/>Format: Elektronik Kaynak<br/>Safety management for software-based equipmentent://SD_ILS/0/SD_ILS:10134392025-12-22T07:51:38Z2025-12-22T07:51:38Zby Boulanger, Jean-Louis.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1187169">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information security risk assessment toolkit practical assessments through data collection and data analysisent://SD_ILS/0/SD_ILS:10028372025-12-22T07:51:38Z2025-12-22T07:51:38Zby Talabis, Mark Ryan N.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1047930">Click to View</a><br/>Format: Elektronik Kaynak<br/>Logging and log management the authoritative guide to understanding the concepts surrounding logging and log managementent://SD_ILS/0/SD_ILS:10044582025-12-22T07:51:38Z2025-12-22T07:51:38Zby Chuvakin, Anton A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1077419">Click to View</a><br/>Format: Elektronik Kaynak<br/>Enterprise security a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterpriseent://SD_ILS/0/SD_ILS:10059952025-12-22T07:51:38Z2025-12-22T07:51:38Zby Woody, Aaron.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1103988">Click to View</a><br/>Format: Elektronik Kaynak<br/>Linux malware incident response : a practitioner's guide to forensic collection and examination of volatile data : an excerpt from Malware forensics field guide for Linux systemsent://SD_ILS/0/SD_ILS:10076252025-12-22T07:51:38Z2025-12-22T07:51:38Zby Malin, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115185">Click to View</a><br/>Format: Elektronik Kaynak<br/>Advances in intelligence and security informaticsent://SD_ILS/0/SD_ILS:9930232025-12-22T07:51:38Z2025-12-22T07:51:38Zby Mao, Wenji.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=892251">Click to View</a><br/>Format: Elektronik Kaynak<br/>Introduction to cryptography with open-source softwareent://SD_ILS/0/SD_ILS:10273122025-12-22T07:51:38Z2025-12-22T07:51:38Zby McAndrew, Alasdair, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1633743">Click to View</a><br/>Format: Elektronik Kaynak<br/>CISSP practice 2,250 questions, answers, and explanations for passing the testent://SD_ILS/0/SD_ILS:9867742025-12-22T07:51:38Z2025-12-22T07:51:38Zby Vallabhaneni, S. Rao.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=819012">Click to View</a><br/>Format: Elektronik Kaynak<br/>Formal models and techniques for analyzing security protocolsent://SD_ILS/0/SD_ILS:9843592025-12-22T07:51:38Z2025-12-22T07:51:38Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=784604">Click to View</a><br/>Format: Elektronik Kaynak<br/>Moodle security learn how to install and configure Moodle in the most secure way possibleent://SD_ILS/0/SD_ILS:9962652025-12-22T07:51:38Z2025-12-22T07:51:38Zby Miletić, Darko.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=943988">Click to View</a><br/>Format: Elektronik Kaynak<br/>GlassFish security secure your GlassFish installation, web applications, EJB applications, application client module, and web services using Java EE and GlassFish security measuresent://SD_ILS/0/SD_ILS:9964052025-12-22T07:51:38Z2025-12-22T07:51:38Zby Kalali, Masoud.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=944941">Click to View</a><br/>Format: Elektronik Kaynak<br/>The definitive guide to the C&A transformation the first publication of a comprehensive view of the C&A transformationent://SD_ILS/0/SD_ILS:9654532025-12-22T07:51:38Z2025-12-22T07:51:38Zby Mehan, Julie E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=547041">Click to View</a><br/>Format: Elektronik Kaynak<br/>Enterprise information security and privacyent://SD_ILS/0/SD_ILS:9563312025-12-22T07:51:38Z2025-12-22T07:51:38Zby Axelrod, C. Warren.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456886">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information security policy, processes, and practicesent://SD_ILS/0/SD_ILS:9532972025-12-22T07:51:38Z2025-12-22T07:51:38Zby Straub, Detmar W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=435197">Click to View</a><br/>Format: Elektronik Kaynak<br/>The CEH prep guide the comprehensive guide to certified ethical hackingent://SD_ILS/0/SD_ILS:9427542025-12-22T07:51:38Z2025-12-22T07:51:38Zby Krutz, Ronald L., 1938-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=315200">Click to View</a><br/>Format: Elektronik Kaynak<br/>Papers from the first European workshop on technological & security issues in digital rights management (EuDiRights)ent://SD_ILS/0/SD_ILS:9391602025-12-22T07:51:38Z2025-12-22T07:51:38Zby Yagüe, Mariemma.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=291585">Click to View</a><br/>Format: Elektronik Kaynak<br/>Basics of contemporary cryptography for IT practitionersent://SD_ILS/0/SD_ILS:9399792025-12-22T07:51:38Z2025-12-22T07:51:38Zby Ryabko, Boris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=296069">Click to View</a><br/>Format: Elektronik Kaynak<br/>Configuring Check Point NGX VPN-1/FireWall-1ent://SD_ILS/0/SD_ILS:9343582025-12-22T07:51:38Z2025-12-22T07:51:38Zby Stephens, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=258633">Click to View</a><br/>Format: Elektronik Kaynak<br/>Multilevel security and DB2 row-level security revealedent://SD_ILS/0/SD_ILS:10751592025-12-22T07:51:38Z2025-12-22T07:51:38Zby Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306464">Click to View</a><br/>Format: Elektronik Kaynak<br/>Implementing PKI Services on z/OSent://SD_ILS/0/SD_ILS:10755722025-12-22T07:51:38Z2025-12-22T07:51:38Zby Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306877">Click to View</a><br/>Format: Elektronik Kaynak<br/>Finding and fixing vulnerabilities in information systems the vulnerability assessment & mitigation methodologyent://SD_ILS/0/SD_ILS:9277922025-12-22T07:51:38Z2025-12-22T07:51:38Zby Antón, Philip S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=197482">Click to View</a><br/>Format: Elektronik Kaynak<br/>zSeries crypto guide updateent://SD_ILS/0/SD_ILS:10754002025-12-22T07:51:38Z2025-12-22T07:51:38Zby Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306705">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity today and tomorrow pay now or pay laterent://SD_ILS/0/SD_ILS:10825832025-12-22T07:51:38Z2025-12-22T07:51:38Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3375180">Click to View</a><br/>Format: Elektronik Kaynak<br/>An introduction to security in a CSM 1.3 for AIX 5L environmentent://SD_ILS/0/SD_ILS:10754072025-12-22T07:51:38Z2025-12-22T07:51:38Zby Lascu, Octavian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306712">Click to View</a><br/>Format: Elektronik Kaynak<br/>Putting the latest z/OS security features to workent://SD_ILS/0/SD_ILS:10753582025-12-22T07:51:38Z2025-12-22T07:51:38Zby Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306663">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hack proofing Linux: a guide to open source security the only way to stop a hacker is to think like oneent://SD_ILS/0/SD_ILS:9394992025-12-22T07:51:38Z2025-12-22T07:51:38Zby Stanger, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294152">Click to View</a><br/>Format: Elektronik Kaynak<br/>Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systemsent://SD_ILS/0/SD_ILS:11193592025-12-22T07:51:38Z2025-12-22T07:51:38Zby Griffor, Edward, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4711751">Click to View</a><br/>Format: Elektronik Kaynak<br/>Critical infrastructure protection against hybrid warfare security related challengesent://SD_ILS/0/SD_ILS:11211662025-12-22T07:51:38Z2025-12-22T07:51:38Zby Niglia, Alessandro, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4753392">Click to View</a><br/>Format: Elektronik Kaynak<br/>Comprehensive approach as 'sine qua non' for critical infrastructure protectionent://SD_ILS/0/SD_ILS:10448572025-12-22T07:51:38Z2025-12-22T07:51:38Zby Čaleta, Denis, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1920288">Click to View</a><br/>Format: Elektronik Kaynak<br/>Terrorist use of cyberspace and cyber terrorism : new challenges and reponsesent://SD_ILS/0/SD_ILS:11156412025-12-22T07:51:38Z2025-12-22T07:51:38Z<a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4659193">Click to View</a><br/>Format: Elektronik Kaynak<br/>Handbook on securing cyber-physical critical infrastructureent://SD_ILS/0/SD_ILS:9900032025-12-22T07:51:38Z2025-12-22T07:51:38Zby Das, Sajal K.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=858728">Click to View</a><br/>Format: Elektronik Kaynak<br/>Advanced penetration testing for highly-secured environments the ultimate security guide : learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guideent://SD_ILS/0/SD_ILS:9966062025-12-22T07:51:38Z2025-12-22T07:51:38Zby Allen, Lee.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=946941">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information security a manager's guide to thwarting data thieves and hackersent://SD_ILS/0/SD_ILS:9452882025-12-22T07:51:38Z2025-12-22T07:51:38Zby Alexander, Philip, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=339307">Click to View</a><br/>Format: Elektronik Kaynak<br/>A process for developing a common vocabulary in the information security areaent://SD_ILS/0/SD_ILS:9434782025-12-22T07:51:38Z2025-12-22T07:51:38Zby NATO Advanced Research Workshop on a Process for Developing a Common Vocabulary in the Information Security Area (2006 : Moscow, Russia)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=320313">Click to View</a><br/>Format: Elektronik Kaynak<br/>An introduction to cyber modeling and simulationent://SD_ILS/0/SD_ILS:11421232025-12-22T07:51:38Z2025-12-22T07:51:38Zby Couretas, Jerry M., 1966- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5520841">Click to View</a><br/>Format: Elektronik Kaynak<br/>Core software security : security at the sourceent://SD_ILS/0/SD_ILS:10227052025-12-22T07:51:38Z2025-12-22T07:51:38Zby Ransome, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1547083">Click to View</a><br/>Format: Elektronik Kaynak<br/>Safeguarding critical e-documents implementing a program for securing confidential information assetsent://SD_ILS/0/SD_ILS:9871482025-12-22T07:51:38Z2025-12-22T07:51:38Zby Smallwood, Robert F., 1959-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=821999">Click to View</a><br/>Format: Elektronik Kaynak<br/>