Arama Sonuçları Computer security. - Daraltılmış: 2014SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dComputer$002bsecurity.$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092014$0025092014$0026ic$003dtrue$0026ps$003d300?dt=list2026-01-07T10:24:48ZComputer security handbookent://SD_ILS/0/SD_ILS:10287392026-01-07T10:24:48Z2026-01-07T10:24:48Zby Bosworth, Seymour, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1652940">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer security : awareness for the homeent://SD_ILS/0/SD_ILS:11271612026-01-07T10:24:48Z2026-01-07T10:24:48Zby Cyborski, Shannon, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4876967">Click to View</a><br/>Format: Elektronik Kaynak<br/>Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013ent://SD_ILS/0/SD_ILS:10350102026-01-07T10:24:48Z2026-01-07T10:24:48Zby Ginodman, Veniamin, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1752831">Click to View</a><br/>Format: Elektronik Kaynak<br/>Threat modeling : designing for securityent://SD_ILS/0/SD_ILS:10270482026-01-07T10:24:48Z2026-01-07T10:24:48Zby Shostack, Adam.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629177">Click to View</a><br/>Format: Elektronik Kaynak<br/>Assessing information security : strategies, tactics, logic and frameworkent://SD_ILS/0/SD_ILS:10538342026-01-07T10:24:48Z2026-01-07T10:24:48Zby Vladimirov, A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192124">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber security and IT infrastructure protectionent://SD_ILS/0/SD_ILS:10189412026-01-07T10:24:48Z2026-01-07T10:24:48Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1377640">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking point of sale : payment application secrets, threats, and solutionsent://SD_ILS/0/SD_ILS:10270462026-01-07T10:24:48Z2026-01-07T10:24:48Zby Gomzin, Slava.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629175">Click to View</a><br/>Format: Elektronik Kaynak<br/>Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linuxent://SD_ILS/0/SD_ILS:10317372026-01-07T10:24:48Z2026-01-07T10:24:48Zby Buchanan, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1688607">Click to View</a><br/>Format: Elektronik Kaynak<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:10322662026-01-07T10:24:48Z2026-01-07T10:24:48Zby Andress, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1699255">Click to View</a><br/>Format: Elektronik Kaynak<br/>Applied network security monitoring : collection, detection, and analysisent://SD_ILS/0/SD_ILS:10236592026-01-07T10:24:48Z2026-01-07T10:24:48Zby Sanders, Chris, 1986-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1574451">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hacking with Kali : practical penetration testing techniquesent://SD_ILS/0/SD_ILS:10076192026-01-07T10:24:48Z2026-01-07T10:24:48Zby Broad, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115177">Click to View</a><br/>Format: Elektronik Kaynak<br/>Computer forensics with FTK : enhance your computer forensics knowledge through illustrations, tips, tricks, and practical real-world scenariosent://SD_ILS/0/SD_ILS:10291072026-01-07T10:24:48Z2026-01-07T10:24:48Zby Carbone, Fernando, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1657797">Click to View</a><br/>Format: Elektronik Kaynak<br/>Untangle network security : secure your network against threats and vulnerabilities using the unparalleled Untangle NGFWent://SD_ILS/0/SD_ILS:10405102026-01-07T10:24:48Z2026-01-07T10:24:48Zby El-Bawab, Abd El-Monem A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1831903">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security architect : careers in information securityent://SD_ILS/0/SD_ILS:10330652026-01-07T10:24:48Z2026-01-07T10:24:48Zby Collins, Jon, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1713960">Click to View</a><br/>Format: Elektronik Kaynak<br/>Penetration testing services procurement guideent://SD_ILS/0/SD_ILS:10370842026-01-07T10:24:48Z2026-01-07T10:24:48Zby Creasey, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778765">Click to View</a><br/>Format: Elektronik Kaynak<br/>Procuring penetration testing services.ent://SD_ILS/0/SD_ILS:10370852026-01-07T10:24:48Z2026-01-07T10:24:48Z<a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778766">Click to View</a><br/>Format: Elektronik Kaynak<br/>At the nexus of cybersecurity and public policy : some basic concepts and issuesent://SD_ILS/0/SD_ILS:10864542026-01-07T10:24:48Z2026-01-07T10:24:48Zby Clark, David, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3379336">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity and cyberwarent://SD_ILS/0/SD_ILS:1506302026-01-07T10:24:48Z2026-01-07T10:24:48Zby Singer, Peter Warren<br/>Format: Kitap<br/>Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtuallyent://SD_ILS/0/SD_ILS:10281452026-01-07T10:24:48Z2026-01-07T10:24:48Zby Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1644005">Click to View</a><br/>Format: Elektronik Kaynak<br/>Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanningent://SD_ILS/0/SD_ILS:10361782026-01-07T10:24:48Z2026-01-07T10:24:48Zby Hutchens, Justin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1771381">Click to View</a><br/>Format: Elektronik Kaynak<br/>Datennutzungs- und datenschutzverträge : muster, klauseln, erläuterungenent://SD_ILS/0/SD_ILS:10534912026-01-07T10:24:48Z2026-01-07T10:24:48Zby Moos, Flemming, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2129586">Click to View</a><br/>Format: Elektronik Kaynak<br/>Data-driven security : analysis, visualization and dashboardsent://SD_ILS/0/SD_ILS:10258192026-01-07T10:24:48Z2026-01-07T10:24:48Zby Jacobs, Jay.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1599321">Click to View</a><br/>Format: Elektronik Kaynak<br/>Chinese cybersecurity and defenseent://SD_ILS/0/SD_ILS:10358412026-01-07T10:24:48Z2026-01-07T10:24:48Zby Ventre, Daniel, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1765106">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information security breaches : avoidance and treatment based on ISO27001ent://SD_ILS/0/SD_ILS:10370822026-01-07T10:24:48Z2026-01-07T10:24:48Zby Krausz, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778763">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber essentials : a pocket guideent://SD_ILS/0/SD_ILS:10370882026-01-07T10:24:48Z2026-01-07T10:24:48Zby Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778769">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security leader insights for information protection : lessons and strategies from leading security professionalsent://SD_ILS/0/SD_ILS:10322652026-01-07T10:24:48Z2026-01-07T10:24:48Zby Fahy, Bob, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1699254">Click to View</a><br/>Format: Elektronik Kaynak<br/>Implementing NetScaler VPX : leverage the features of NetScaler VPX to optimize and deploy responsive web services and applications on multiple virtualization platformsent://SD_ILS/0/SD_ILS:10299022026-01-07T10:24:48Z2026-01-07T10:24:48Zby Sandbu, Marius, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1674868">Click to View</a><br/>Format: Elektronik Kaynak<br/>Core software security : security at the sourceent://SD_ILS/0/SD_ILS:10227052026-01-07T10:24:48Z2026-01-07T10:24:48Zby Ransome, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1547083">Click to View</a><br/>Format: Elektronik Kaynak<br/>ISO27001 in a Windows environment : the best practice handbook for a Microsoft Windows environmentent://SD_ILS/0/SD_ILS:10370872026-01-07T10:24:48Z2026-01-07T10:24:48Zby Honan, Brian, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778768">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber securityent://SD_ILS/0/SD_ILS:10257192026-01-07T10:24:48Z2026-01-07T10:24:48Zby Voeller, John G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1598809">Click to View</a><br/>Format: Elektronik Kaynak<br/>Communications and information infrastructure securityent://SD_ILS/0/SD_ILS:10257202026-01-07T10:24:48Z2026-01-07T10:24:48Zby Voeller, John G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1598810">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network securityent://SD_ILS/0/SD_ILS:10385512026-01-07T10:24:48Z2026-01-07T10:24:48Zby Perez, Andre, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1800888">Click to View</a><br/>Format: Elektronik Kaynak<br/>Network and system securityent://SD_ILS/0/SD_ILS:10185012026-01-07T10:24:48Z2026-01-07T10:24:48Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1364061">Click to View</a><br/>Format: Elektronik Kaynak<br/>Penetration testing : a hands-on introduction to hackingent://SD_ILS/0/SD_ILS:10451932026-01-07T10:24:48Z2026-01-07T10:24:48Zby Weidman, Georgia, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1931614">Click to View</a><br/>Format: Elektronik Kaynak<br/>Targeted cyber attacks : multi-staged attacks driven by exploits and malwareent://SD_ILS/0/SD_ILS:10297842026-01-07T10:24:48Z2026-01-07T10:24:48Zby Sood, Aditya K., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1673591">Click to View</a><br/>Format: Elektronik Kaynak<br/>Detection and intelligent systems for homeland security.ent://SD_ILS/0/SD_ILS:10257272026-01-07T10:24:48Z2026-01-07T10:24:48Zby Voeller, John G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1598817">Click to View</a><br/>Format: Elektronik Kaynak<br/>Integrated security systems design : a complete reference for building enterprise-wide digital security systemsent://SD_ILS/0/SD_ILS:10373432026-01-07T10:24:48Z2026-01-07T10:24:48Zby Norman, Thomas, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1781681">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity : managing systems, conducting testing, and investigating intrusionsent://SD_ILS/0/SD_ILS:10215162026-01-07T10:24:48Z2026-01-07T10:24:48Zby Mowbray, Thomas J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1481185">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity for executives : a practical guideent://SD_ILS/0/SD_ILS:10325942026-01-07T10:24:48Z2026-01-07T10:24:48Zby Touhill, Gregory J., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1707094">Click to View</a><br/>Format: Elektronik Kaynak<br/>The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac Memoryent://SD_ILS/0/SD_ILS:10341002026-01-07T10:24:48Z2026-01-07T10:24:48Zby Ligh, Michael Hale, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1740753">Click to View</a><br/>Format: Elektronik Kaynak<br/>Penetration testing with backbox : an introductory guide to performing crucial penetration testing operations using backboxent://SD_ILS/0/SD_ILS:10268632026-01-07T10:24:48Z2026-01-07T10:24:48Zby Uygur, Stefan Umit.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1611819">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cryptography for security and privacy in cloud computingent://SD_ILS/0/SD_ILS:10209882026-01-07T10:24:48Z2026-01-07T10:24:48Zby Rass, Stefan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1463547">Click to View</a><br/>Format: Elektronik Kaynak<br/>Learning Nessus for penetration testing.ent://SD_ILS/0/SD_ILS:10235072026-01-07T10:24:48Z2026-01-07T10:24:48Zby Kumar, Himanshu.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572937">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hyper-V security : secure your Hyper-V hosts, their guests, and critical services from intruders and malwareent://SD_ILS/0/SD_ILS:10440472026-01-07T10:24:48Z2026-01-07T10:24:48Zby Siron, Eric, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1911524">Click to View</a><br/>Format: Elektronik Kaynak<br/>VMware vSphere resource management essentials : optimum solutions to help you manage your VMware vSphere resources effectivelyent://SD_ILS/0/SD_ILS:10283282026-01-07T10:24:48Z2026-01-07T10:24:48Zby Frappier, Jonathan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1647193">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cloud management and securityent://SD_ILS/0/SD_ILS:10323382026-01-07T10:24:48Z2026-01-07T10:24:48Zby Abbadi, Imad M., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1701403">Click to View</a><br/>Format: Elektronik Kaynak<br/>Mastering metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approachent://SD_ILS/0/SD_ILS:10253642026-01-07T10:24:48Z2026-01-07T10:24:48Zby Jaswal, Nipun, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1593853">Click to View</a><br/>Format: Elektronik Kaynak<br/>Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment toolsent://SD_ILS/0/SD_ILS:10317542026-01-07T10:24:48Z2026-01-07T10:24:48Zby Makan, Keith, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1688642">Click to View</a><br/>Format: Elektronik Kaynak<br/>Disaster recovery using VMware vSphere replication and vCenter site recovery manager : learn to deploy and use vSphere Replication 5.5 as a standalone disaster recovery solution and to orchestrate disaster recovery using vCenter site recovery manager 5.5ent://SD_ILS/0/SD_ILS:10322122026-01-07T10:24:48Z2026-01-07T10:24:48Zby GB, Abhilash, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1698729">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber security and resiliency policy frameworkent://SD_ILS/0/SD_ILS:10398772026-01-07T10:24:48Z2026-01-07T10:24:48Zby Vaseashta, A. (Ashok), editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1818046">Click to View</a><br/>Format: Elektronik Kaynak<br/>Examining robustness and vulnerability of networked systemsent://SD_ILS/0/SD_ILS:10334292026-01-07T10:24:48Z2026-01-07T10:24:48Zby Butenko, Sergiy, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1720838">Click to View</a><br/>Format: Elektronik Kaynak<br/>Puppet reporting and monitoring : create insightful reports for your server infrastructure using Puppetent://SD_ILS/0/SD_ILS:10281462026-01-07T10:24:48Z2026-01-07T10:24:48Zby Duffy, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1644006">Click to View</a><br/>Format: Elektronik Kaynak<br/>vSphere design best practices : apply industry-accepted best practices to design reliable high-performance datacenters for your business needsent://SD_ILS/0/SD_ILS:10317592026-01-07T10:24:48Z2026-01-07T10:24:48Zby Bolander, Brian, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1688647">Click to View</a><br/>Format: Elektronik Kaynak<br/>Collaboration with cloud computing : security, social media, and unified communicationsent://SD_ILS/0/SD_ILS:10299612026-01-07T10:24:48Z2026-01-07T10:24:48Zby Messier, Ric, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1675198">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security careers : skills, compensation, and career pathsent://SD_ILS/0/SD_ILS:10257032026-01-07T10:24:48Z2026-01-07T10:24:48Zby Walker, Stephen W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1598238">Click to View</a><br/>Format: Elektronik Kaynak<br/>Online security for the business travelerent://SD_ILS/0/SD_ILS:10362512026-01-07T10:24:48Z2026-01-07T10:24:48Zby Gonzalez, Deborah, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1772301">Click to View</a><br/>Format: Elektronik Kaynak<br/>CyberWar, CyberTerror, CyberCrime and CyberActivism : an in-depth guide to the role of standards in cybersecurity enviromentent://SD_ILS/0/SD_ILS:10370812026-01-07T10:24:48Z2026-01-07T10:24:48Zby Mehan, Julie E., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778762">Click to View</a><br/>Format: Elektronik Kaynak<br/>The basics of digital privacy : simple tools to protect your personal information and your identity onlineent://SD_ILS/0/SD_ILS:10235692026-01-07T10:24:48Z2026-01-07T10:24:48Zby Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1573362">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber blockadesent://SD_ILS/0/SD_ILS:10394232026-01-07T10:24:48Z2026-01-07T10:24:48Zby Russell, Alison Lawlor, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1810129">Click to View</a><br/>Format: Elektronik Kaynak<br/>Perspectives on privacy : increasing regulation in the USA, Canada, Australia and European countriesent://SD_ILS/0/SD_ILS:10189182026-01-07T10:24:48Z2026-01-07T10:24:48Zby Dörr, Dieter, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1377214">Click to View</a><br/>Format: Elektronik Kaynak<br/>The other quiet professionals : lessons for future cyber forces from the evolution of special forcesent://SD_ILS/0/SD_ILS:10432872026-01-07T10:24:48Z2026-01-07T10:24:48Zby Paul, Christopher, 1971- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1899339">Click to View</a><br/>Format: Elektronik Kaynak<br/>Praxishandbuch Datenschutz im unternehmenent://SD_ILS/0/SD_ILS:10280562026-01-07T10:24:48Z2026-01-07T10:24:48Zby Behling, Thorsten B., editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1642773">Click to View</a><br/>Format: Elektronik Kaynak<br/>Learning pentesting for Android devices : a practical guide to learning penetration testing for Android devices and applicationsent://SD_ILS/0/SD_ILS:10281522026-01-07T10:24:48Z2026-01-07T10:24:48Zby Gupta, Aditya, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1644013">Click to View</a><br/>Format: Elektronik Kaynak<br/>Windows forensic analysis toolkit : advanced analysis techniques for Windows 8ent://SD_ILS/0/SD_ILS:10291622026-01-07T10:24:48Z2026-01-07T10:24:48Zby Carvey, Harlan A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1659012">Click to View</a><br/>Format: Elektronik Kaynak<br/>VMware horizon 6 desktop virtualization solutions : plan, design, and secure your virtual desktop environments with VMware horizon 6 viewent://SD_ILS/0/SD_ILS:10380992026-01-07T10:24:48Z2026-01-07T10:24:48Zby Cartwright, Ryan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1793938">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber threat! : how to manage the growing risk of cyber attacksent://SD_ILS/0/SD_ILS:10342962026-01-07T10:24:48Z2026-01-07T10:24:48Zby Ulsch, N. MacDonnell, 1951- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1742833">Click to View</a><br/>Format: Elektronik Kaynak<br/>Malware forensics field guide for Linux systemsent://SD_ILS/0/SD_ILS:10076062026-01-07T10:24:48Z2026-01-07T10:24:48Zby Malin, Cameron H.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115128">Click to View</a><br/>Format: Elektronik Kaynak<br/>Critical infrastructure protectionent://SD_ILS/0/SD_ILS:10276372026-01-07T10:24:48Z2026-01-07T10:24:48Zby Edwards, Matthew, editor of compilation.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1637644">Click to View</a><br/>Format: Elektronik Kaynak<br/>Best practices in computer network defense : incident detection and responseent://SD_ILS/0/SD_ILS:10276412026-01-07T10:24:48Z2026-01-07T10:24:48Zby Hathaway, Melissa E., editor of compilation.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1637648">Click to View</a><br/>Format: Elektronik Kaynak<br/>Software systems safetyent://SD_ILS/0/SD_ILS:10486262026-01-07T10:24:48Z2026-01-07T10:24:48Zby Grumberg, Orna, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2033821">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber warfare : techniques, tactics and tools for security practitionersent://SD_ILS/0/SD_ILS:10209682026-01-07T10:24:48Z2026-01-07T10:24:48Zby Andress, Jason.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1463416">Click to View</a><br/>Format: Elektronik Kaynak<br/>The basics of IT audit : purposes, processes, and practical informationent://SD_ILS/0/SD_ILS:10227292026-01-07T10:24:48Z2026-01-07T10:24:48Zby Gantz, Stephen D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1550527">Click to View</a><br/>Format: Elektronik Kaynak<br/>Business continuity and disaster recovery planning for IT professionalsent://SD_ILS/0/SD_ILS:10076202026-01-07T10:24:48Z2026-01-07T10:24:48Zby Snedaker, Susan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115178">Click to View</a><br/>Format: Elektronik Kaynak<br/>