Arama Sonu&ccedil;lar&#305; Computer security. - Daralt&#305;lm&#305;&#351;: 2014 SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dComputer$002bsecurity.$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092014$0025092014$0026ic$003dtrue$0026ps$003d300?dt=list 2026-01-07T10:24:48Z Computer security handbook ent://SD_ILS/0/SD_ILS:1028739 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Bosworth, Seymour, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1652940">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer security : awareness for the home ent://SD_ILS/0/SD_ILS:1127161 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Cyborski, Shannon, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4876967">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013 ent://SD_ILS/0/SD_ILS:1035010 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Ginodman, Veniamin, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1752831">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Threat modeling : designing for security ent://SD_ILS/0/SD_ILS:1027048 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Shostack, Adam.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629177">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Assessing information security : strategies, tactics, logic and framework ent://SD_ILS/0/SD_ILS:1053834 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Vladimirov, A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192124">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber security and IT infrastructure protection ent://SD_ILS/0/SD_ILS:1018941 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1377640">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking point of sale : payment application secrets, threats, and solutions ent://SD_ILS/0/SD_ILS:1027046 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Gomzin, Slava.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629175">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux ent://SD_ILS/0/SD_ILS:1031737 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Buchanan, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1688607">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:1032266 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Andress, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1699255">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Applied network security monitoring : collection, detection, and analysis ent://SD_ILS/0/SD_ILS:1023659 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Sanders, Chris, 1986-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1574451">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking with Kali : practical penetration testing techniques ent://SD_ILS/0/SD_ILS:1007619 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Broad, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115177">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer forensics with FTK : enhance your computer forensics knowledge through illustrations, tips, tricks, and practical real-world scenarios ent://SD_ILS/0/SD_ILS:1029107 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Carbone, Fernando, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1657797">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Untangle network security : secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW ent://SD_ILS/0/SD_ILS:1040510 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;El-Bawab, Abd El-Monem A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1831903">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security architect : careers in information security ent://SD_ILS/0/SD_ILS:1033065 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Collins, Jon, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1713960">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Penetration testing services procurement guide ent://SD_ILS/0/SD_ILS:1037084 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Creasey, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778765">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Procuring penetration testing services. ent://SD_ILS/0/SD_ILS:1037085 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z <a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778766">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> At the nexus of cybersecurity and public policy : some basic concepts and issues ent://SD_ILS/0/SD_ILS:1086454 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Clark, David, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3379336">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity and cyberwar ent://SD_ILS/0/SD_ILS:150630 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Singer, Peter Warren<br/>Format:&#160;Kitap<br/> Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually ent://SD_ILS/0/SD_ILS:1028145 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1644005">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning ent://SD_ILS/0/SD_ILS:1036178 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Hutchens, Justin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1771381">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Datennutzungs- und datenschutzvertr&auml;ge : muster, klauseln, erl&auml;uterungen ent://SD_ILS/0/SD_ILS:1053491 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Moos, Flemming, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2129586">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Data-driven security : analysis, visualization and dashboards ent://SD_ILS/0/SD_ILS:1025819 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Jacobs, Jay.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1599321">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Chinese cybersecurity and defense ent://SD_ILS/0/SD_ILS:1035841 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Ventre, Daniel, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1765106">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security breaches : avoidance and treatment based on ISO27001 ent://SD_ILS/0/SD_ILS:1037082 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Krausz, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778763">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber essentials : a pocket guide ent://SD_ILS/0/SD_ILS:1037088 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778769">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security leader insights for information protection : lessons and strategies from leading security professionals ent://SD_ILS/0/SD_ILS:1032265 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Fahy, Bob, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1699254">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Implementing NetScaler VPX : leverage the features of NetScaler VPX to optimize and deploy responsive web services and applications on multiple virtualization platforms ent://SD_ILS/0/SD_ILS:1029902 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Sandbu, Marius, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1674868">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Core software security : security at the source ent://SD_ILS/0/SD_ILS:1022705 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Ransome, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1547083">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> ISO27001 in a Windows environment : the best practice handbook for a Microsoft Windows environment ent://SD_ILS/0/SD_ILS:1037087 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Honan, Brian, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778768">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber security ent://SD_ILS/0/SD_ILS:1025719 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Voeller, John G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1598809">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Communications and information infrastructure security ent://SD_ILS/0/SD_ILS:1025720 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Voeller, John G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1598810">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security ent://SD_ILS/0/SD_ILS:1038551 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Perez, Andre, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1800888">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network and system security ent://SD_ILS/0/SD_ILS:1018501 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1364061">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Penetration testing : a hands-on introduction to hacking ent://SD_ILS/0/SD_ILS:1045193 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Weidman, Georgia, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1931614">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Targeted cyber attacks : multi-staged attacks driven by exploits and malware ent://SD_ILS/0/SD_ILS:1029784 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Sood, Aditya K., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1673591">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Detection and intelligent systems for homeland security. ent://SD_ILS/0/SD_ILS:1025727 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Voeller, John G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1598817">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Integrated security systems design : a complete reference for building enterprise-wide digital security systems ent://SD_ILS/0/SD_ILS:1037343 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Norman, Thomas, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1781681">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity : managing systems, conducting testing, and investigating intrusions ent://SD_ILS/0/SD_ILS:1021516 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Mowbray, Thomas J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1481185">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity for executives : a practical guide ent://SD_ILS/0/SD_ILS:1032594 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Touhill, Gregory J., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1707094">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac Memory ent://SD_ILS/0/SD_ILS:1034100 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Ligh, Michael Hale, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1740753">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Penetration testing with backbox : an introductory guide to performing crucial penetration testing operations using backbox ent://SD_ILS/0/SD_ILS:1026863 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Uygur, Stefan Umit.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1611819">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cryptography for security and privacy in cloud computing ent://SD_ILS/0/SD_ILS:1020988 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Rass, Stefan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1463547">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Learning Nessus for penetration testing. ent://SD_ILS/0/SD_ILS:1023507 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Kumar, Himanshu.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572937">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hyper-V security : secure your Hyper-V hosts, their guests, and critical services from intruders and malware ent://SD_ILS/0/SD_ILS:1044047 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Siron, Eric, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1911524">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> VMware vSphere resource management essentials : optimum solutions to help you manage your VMware vSphere resources effectively ent://SD_ILS/0/SD_ILS:1028328 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Frappier, Jonathan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1647193">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cloud management and security ent://SD_ILS/0/SD_ILS:1032338 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Abbadi, Imad M., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1701403">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Mastering metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach ent://SD_ILS/0/SD_ILS:1025364 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Jaswal, Nipun, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1593853">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment tools ent://SD_ILS/0/SD_ILS:1031754 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Makan, Keith, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1688642">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Disaster recovery using VMware vSphere replication and vCenter site recovery manager : learn to deploy and use vSphere Replication 5.5 as a standalone disaster recovery solution and to orchestrate disaster recovery using vCenter site recovery manager 5.5 ent://SD_ILS/0/SD_ILS:1032212 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;GB, Abhilash, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1698729">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber security and resiliency policy framework ent://SD_ILS/0/SD_ILS:1039877 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Vaseashta, A. (Ashok), editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1818046">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Examining robustness and vulnerability of networked systems ent://SD_ILS/0/SD_ILS:1033429 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Butenko, Sergiy, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1720838">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Puppet reporting and monitoring : create insightful reports for your server infrastructure using Puppet ent://SD_ILS/0/SD_ILS:1028146 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Duffy, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1644006">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> vSphere design best practices : apply industry-accepted best practices to design reliable high-performance datacenters for your business needs ent://SD_ILS/0/SD_ILS:1031759 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Bolander, Brian, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1688647">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Collaboration with cloud computing : security, social media, and unified communications ent://SD_ILS/0/SD_ILS:1029961 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Messier, Ric, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1675198">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security careers : skills, compensation, and career paths ent://SD_ILS/0/SD_ILS:1025703 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Walker, Stephen W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1598238">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Online security for the business traveler ent://SD_ILS/0/SD_ILS:1036251 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Gonzalez, Deborah, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1772301">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> CyberWar, CyberTerror, CyberCrime and CyberActivism : an in-depth guide to the role of standards in cybersecurity enviroment ent://SD_ILS/0/SD_ILS:1037081 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Mehan, Julie E., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778762">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of digital privacy : simple tools to protect your personal information and your identity online ent://SD_ILS/0/SD_ILS:1023569 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1573362">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber blockades ent://SD_ILS/0/SD_ILS:1039423 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Russell, Alison Lawlor, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1810129">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Perspectives on privacy : increasing regulation in the USA, Canada, Australia and European countries ent://SD_ILS/0/SD_ILS:1018918 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;D&ouml;rr, Dieter, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1377214">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The other quiet professionals : lessons for future cyber forces from the evolution of special forces ent://SD_ILS/0/SD_ILS:1043287 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Paul, Christopher, 1971- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1899339">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Praxishandbuch Datenschutz im unternehmen ent://SD_ILS/0/SD_ILS:1028056 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Behling, Thorsten B., editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1642773">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Learning pentesting for Android devices : a practical guide to learning penetration testing for Android devices and applications ent://SD_ILS/0/SD_ILS:1028152 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Gupta, Aditya, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1644013">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 ent://SD_ILS/0/SD_ILS:1029162 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Carvey, Harlan A., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1659012">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> VMware horizon 6 desktop virtualization solutions : plan, design, and secure your virtual desktop environments with VMware horizon 6 view ent://SD_ILS/0/SD_ILS:1038099 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Cartwright, Ryan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1793938">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber threat! : how to manage the growing risk of cyber attacks ent://SD_ILS/0/SD_ILS:1034296 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Ulsch, N. MacDonnell, 1951- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1742833">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Malware forensics field guide for Linux systems ent://SD_ILS/0/SD_ILS:1007606 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Malin, Cameron H.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115128">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Critical infrastructure protection ent://SD_ILS/0/SD_ILS:1027637 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Edwards, Matthew, editor of compilation.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1637644">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Best practices in computer network defense : incident detection and response ent://SD_ILS/0/SD_ILS:1027641 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Hathaway, Melissa E., editor of compilation.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1637648">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Software systems safety ent://SD_ILS/0/SD_ILS:1048626 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Grumberg, Orna, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2033821">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber warfare : techniques, tactics and tools for security practitioners ent://SD_ILS/0/SD_ILS:1020968 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Andress, Jason.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1463416">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of IT audit : purposes, processes, and practical information ent://SD_ILS/0/SD_ILS:1022729 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Gantz, Stephen D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1550527">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Business continuity and disaster recovery planning for IT professionals ent://SD_ILS/0/SD_ILS:1007620 2026-01-07T10:24:48Z 2026-01-07T10:24:48Z by&#160;Snedaker, Susan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115178">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/>