Arama Sonu&ccedil;lar&#305; Computer security. - Daralt&#305;lm&#305;&#351;: 2016 SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dComputer$002bsecurity.$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092016$0025092016$0026ic$003dtrue$0026ps$003d300;jsessionid=A2395FEE636E3AB1A645BAC6A85C48BF? 2026-01-14T22:04:16Z Conducting computer security assessments at nuclear facilities. ent://SD_ILS/0/SD_ILS:1125913 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z <a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4853352">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer security incident response planning at nuclear facilities ent://SD_ILS/0/SD_ILS:1125914 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;International Atomic Energy Agency.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4853353">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information hiding ent://SD_ILS/0/SD_ILS:1124313 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;Katzenbeisser, Stefan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4821270">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Network performance and security : testing and analyzing using open source and low-cost tools ent://SD_ILS/0/SD_ILS:1109063 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;Chapman, Chris, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4452265">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Breaking into information security : crafting a custom career path to get the job you really want ent://SD_ILS/0/SD_ILS:1104442 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;More, Josh, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4187289">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Data breach preparation and response : breaches are certain, impact is not ent://SD_ILS/0/SD_ILS:1113216 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;Fowler, Kevvie, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4556899">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> OS X incident response : scripting and analysis ent://SD_ILS/0/SD_ILS:1111334 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;Bradley, Jaron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4526010">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security and privacy in the digital era. Volume 1 ent://SD_ILS/0/SD_ILS:1115270 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;Guerrier, Claudine, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4648717">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information technology security fundamentals ent://SD_ILS/0/SD_ILS:1102697 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;Sagers, Glen., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4009415">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Dependable software systems engineering ent://SD_ILS/0/SD_ILS:1111515 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;Esparza, Javier, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4528955">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Dns security : defending the domain name system ent://SD_ILS/0/SD_ILS:1113215 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;Liska, Allan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4556898">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Building a corporate culture of security : strategies for strengthening organizational resiliency ent://SD_ILS/0/SD_ILS:1108349 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;Sullivant, John, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4425984">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security in fixed and wireless networks ent://SD_ILS/0/SD_ILS:1115585 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;Sch&auml;fer, G&uuml;nter, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4658592">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity and applied mathematics ent://SD_ILS/0/SD_ILS:1113169 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;Metcalf, Leigh, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4556234">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber-risk informatics : engineering evaluation with data science ent://SD_ILS/0/SD_ILS:1166068 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;Sahinoglu, Mehmet, 1951-.<br/>Format:&#160;Kitap<br/> Cyber-risk informatics : engineering evaluation with data sciencef ent://SD_ILS/0/SD_ILS:1111177 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;Sahinoglu, Mehmet, 1951- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4519251">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Advanced penetration testing for highly-secured environments. ent://SD_ILS/0/SD_ILS:1111214 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;Allen, Lee, 1946- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4520648">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber security awareness for CEOs and management ent://SD_ILS/0/SD_ILS:1104566 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;Willson, David, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4189279">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Meeting people via WiFi and Bluetooth ent://SD_ILS/0/SD_ILS:1104567 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;Schroeder, Joshua, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4189280">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Chaotic secure communication : principles and technologies ent://SD_ILS/0/SD_ILS:1119254 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;Sun, Kehui, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4707910">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Linux server security : hack and defend ent://SD_ILS/0/SD_ILS:1111179 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;Binnie, Christopher, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4519259">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Selling information security to the board : a primer ent://SD_ILS/0/SD_ILS:1111186 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4519662">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The information systems security officer's guide : establishing and managing a cyber security program ent://SD_ILS/0/SD_ILS:1105580 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;Kovacich, Gerald L., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4334673">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security science : measuring the vulnerability to data compromises ent://SD_ILS/0/SD_ILS:1113500 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;Young, Carl S., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4567434">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Ethical hacker ent://SD_ILS/0/SD_ILS:1132236 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;Loh-Hagan, Virginia, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5155680">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Critical infrastructure protection against hybrid warfare security related challenges ent://SD_ILS/0/SD_ILS:1121166 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;Niglia, Alessandro, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4753392">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Nine steps to succes : an ISO 27001: 2013 implementation overview ent://SD_ILS/0/SD_ILS:1111189 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4519667">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber guerilla ent://SD_ILS/0/SD_ILS:1113262 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;Haaster, Jelle van, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4557157">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The psychology of information security : resolving conflicts between security compliance and human behaviour ent://SD_ILS/0/SD_ILS:1106990 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;Zinatullin, Leron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4395809">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information hiding in communication networks : fundamentals, mechanisms, applications, and countermeasures ent://SD_ILS/0/SD_ILS:1107654 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;Mazurczyk, Wojciech, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4405578">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> SSL and TLS : theory and practice ent://SD_ILS/0/SD_ILS:1124318 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;Oppliger, Rolf, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4821279">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity ent://SD_ILS/0/SD_ILS:1134944 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;Higgins, Melissa, 1953- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5262186">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> You : for sale protecting your personal data and privacy online ent://SD_ILS/0/SD_ILS:1053757 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;Sumner, Stuart, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2187472">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Google hacking for penetration testers ent://SD_ILS/0/SD_ILS:1103874 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;Long, Johnny, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4092861">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Essential skills for hackers ent://SD_ILS/0/SD_ILS:1104568 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4189281">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Malware diffusion models for modern complex networks : theory and applications ent://SD_ILS/0/SD_ILS:1108684 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;Karyotis, Vasileios, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4438752">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows registry forensics : advanced digital forensic analysis of the windows registry ent://SD_ILS/0/SD_ILS:1108686 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;Carvey, Harlan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4438754">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hiding behind the keyboard : uncovering covert communication methods with forensic analysis ent://SD_ILS/0/SD_ILS:1109062 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;Shavers, Brett, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4452264">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> iOS application security : the definitive guide for hackers and developers ent://SD_ILS/0/SD_ILS:1110417 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;Thiel, David, 1980- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4503142">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The car hacker's handbook : a guide for the penetration tester ent://SD_ILS/0/SD_ILS:1110439 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;Smith, Craig (Reverse engineer), author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4503176">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Careers for tech girls in computer science ent://SD_ILS/0/SD_ILS:1142976 2026-01-14T22:04:16Z 2026-01-14T22:04:16Z by&#160;Niver, Heather Moore, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5547843">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/>