Arama Sonu&ccedil;lar&#305; Computers -- Access control. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dComputers$002b--$002bAccess$002bcontrol.$0026ic$003dtrue$0026ps$003d300?dt=list 2025-12-28T17:13:24Z A&#287; ve siber g&uuml;venlik temelleri : dijital d&uuml;nyada g&uuml;vende kal&#305;n ent://SD_ILS/0/SD_ILS:1232171 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;H&#305;n&ccedil;er, G&ouml;rkem, yazar.<br/>Format:&#160;Kitap<br/> Advances in computers. Volume 108 ent://SD_ILS/0/SD_ILS:1135645 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Memon, Atif, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5295182">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Kali Linux network scanning cookbook : take your penetration-testing skills to the next level ent://SD_ILS/0/SD_ILS:1126762 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Hixon, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4867412">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of digital privacy : simple tools to protect your personal information and your identity online ent://SD_ILS/0/SD_ILS:1023569 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1573362">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Metasploit penetration testing cookbook ent://SD_ILS/0/SD_ILS:1021280 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Agarwal, Monika.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1477469">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Learning Metasploit exploitation and development ent://SD_ILS/0/SD_ILS:1015710 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Balapure, Aditya.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1236046">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Linux firewalls attack detection and response with iptables, psad, and fwsnort ent://SD_ILS/0/SD_ILS:1058453 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Rash, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3017624">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security assessment case studies for implementing the NSA lAM ent://SD_ILS/0/SD_ILS:939570 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Rogers, Russ.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294358">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Mastering metasploit : take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit ent://SD_ILS/0/SD_ILS:1138960 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Jaswal, Nipun, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5419743">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework Metasploit Penetration testing cookbook ent://SD_ILS/0/SD_ILS:1136216 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Teixeira, Daniel, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5314606">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Mastering wireless penetration testing for highly secured environments : scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals ent://SD_ILS/0/SD_ILS:1045187 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Johns, A. (Aaron), author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1931593">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Git essentials : create, merge, and distribute code with Git, the most powerful and flexible versioning system available ent://SD_ILS/0/SD_ILS:1048997 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Santacroce, Ferdinando, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2038062">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Mastering metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach ent://SD_ILS/0/SD_ILS:1025364 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Jaswal, Nipun, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1593853">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Metasploit penetration testing cookbook over 70 recipes to master the most widely used penetration testing framework ent://SD_ILS/0/SD_ILS:997191 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Singh, Abhinav.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=952079">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Access control, security, and trust : a logical approach ent://SD_ILS/0/SD_ILS:1028417 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Chin, Shiu-Kai, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1648320">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> OpenAM written and tested with OpenAM Snapshot 9 : the single sign-on (SSO) tool for securing your web applications in a fast and easy way ent://SD_ILS/0/SD_ILS:996268 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Thangasamy, Indira.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=943991">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> BackTrack 5 wireless penetration testing beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 ent://SD_ILS/0/SD_ILS:996825 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Ramachandran, Vivek.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948547">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Oracle Identity and Access Manager 11g for administrators administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasks ent://SD_ILS/0/SD_ILS:996835 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Kumar, Atul.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948559">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Relation based access control ent://SD_ILS/0/SD_ILS:1025132 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Zhang, Rui.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1589007">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Access denied the practice and policy of global Internet filtering ent://SD_ILS/0/SD_ILS:1081397 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Deibert, Ronald.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3338769">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Role-based access control ent://SD_ILS/0/SD_ILS:930991 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Ferraiolo, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227631">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Metasploit the penetration tester's guide ent://SD_ILS/0/SD_ILS:1009966 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Kennedy, David, 1982-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137562">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Managed code rootkits : hooking into runtime environments ent://SD_ILS/0/SD_ILS:1181827 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Metula, Erez.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495745">http://www.sciencedirect.com/science/book/9781597495745</a><br/>Format:&#160;Elektronik Kaynak<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:1183966 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Faircloth, Jeremy.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496278">http://www.sciencedirect.com/science/book/9781597496278</a><br/>Format:&#160;Elektronik Kaynak<br/> Perfect passwords : selection, protection, authentication ent://SD_ILS/0/SD_ILS:1188256 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Burnett, Mark.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490412">https://www.sciencedirect.com/science/book/9781597490412</a><br/>Format:&#160;Elektronik Kaynak<br/> The rise of the computer state : the threat to our freedoms, our ethics and our democratic process ent://SD_ILS/0/SD_ILS:1125641 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Burnham, David (David Michael), author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4850348">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> OAuth 2.0 identity and access management patterns ent://SD_ILS/0/SD_ILS:1023480 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Spasovski, Martin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572907">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Instant Java password and authentication security ent://SD_ILS/0/SD_ILS:1023486 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Mayoral, Fernando.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572913">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Federated identity primer ent://SD_ILS/0/SD_ILS:1004672 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Rountree, Derrick.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1081145">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Perfect passwords selection, protection, authentication ent://SD_ILS/0/SD_ILS:933875 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Burnett, Mark.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254851">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Kali Linux wireless penetration testing : beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack ent://SD_ILS/0/SD_ILS:1137050 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Buchanan, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5340668">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Kali Linux wireless penetration testing beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux ent://SD_ILS/0/SD_ILS:1047089 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Ramachandran, Vivek, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2005211">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Check Point NG next generation security administration ent://SD_ILS/0/SD_ILS:939447 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Simonis, Drew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294029">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Sanal ortamda sans&uuml;r ent://SD_ILS/0/SD_ILS:110177 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Schiffrin, Natalia<br/>Format:&#160;Kitap<br/> Role-based access control ent://SD_ILS/0/SD_ILS:945221 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Ferraiolo, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338751">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Ulusal bilgi g&uuml;venli&#287;i : strateji ve kurumsal yap&#305;lanma ent://SD_ILS/0/SD_ILS:286404 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;G&uuml;ng&ouml;r, Murat<br/>Format:&#160;Kitap<br/> Network security : private communication in a public world ent://SD_ILS/0/SD_ILS:1169380 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Kaufman, Charlie.<br/>Format:&#160;Kitap<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:1118465 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Faircloth, Jeremy, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4694443">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Integrated security systems design : a complete reference for building enterprise-wide digital security systems ent://SD_ILS/0/SD_ILS:1037343 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Norman, Thomas, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1781681">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Wicked cool Ruby scripts useful scripts that solve difficult problems ent://SD_ILS/0/SD_ILS:1058461 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Pugh, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3017632">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Integrated security systems design concepts, specifications, and implementation ent://SD_ILS/0/SD_ILS:938298 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Norman, Thomas L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=287955">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Practical deployment of Cisco Identity Services Engine (ISE) : real-world examples of AAA deployments ent://SD_ILS/0/SD_ILS:1103875 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Richter, Andy, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4092862">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Identity management for internet of things ent://SD_ILS/0/SD_ILS:1110700 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Mahalle, Parikshit N., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4509473">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually ent://SD_ILS/0/SD_ILS:1028145 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1644005">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux ent://SD_ILS/0/SD_ILS:1031737 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Buchanan, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1688607">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information protection playbook ent://SD_ILS/0/SD_ILS:1019990 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Kane, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1418381">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Instant Spring Security starter learn the fundamentals of web authentication and authorization using Spring Security ent://SD_ILS/0/SD_ILS:1016268 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Jagielski, Piotr.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1274894">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> A multidisciplinary introduction to information security ent://SD_ILS/0/SD_ILS:1028416 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Mj&oslash;lsnes, Stig F., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1648315">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Essential computer security everyone's guide to e-mail, internet, and wireless security ent://SD_ILS/0/SD_ILS:943350 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Bradley, Tony.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=319200">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> User's guide to cryptography and standards ent://SD_ILS/0/SD_ILS:931017 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Dent, Alexander W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227658">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Outsourcing information security ent://SD_ILS/0/SD_ILS:931018 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Axelrod, C. Warren.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227659">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Access contested security, identity, and resistance in Asian cyberspace information revolution and global politics ent://SD_ILS/0/SD_ILS:1081958 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Deibert, Ronald.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3339362">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Identity and access management solutions using WebSphere Portal V5.1, Tivoli Identity Manager V4.5.1, and Tivoli Access Manager V5.1 ent://SD_ILS/0/SD_ILS:1075241 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Ganci, John.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306546">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Critical information infrastructure protection and the law an overview of key issues ent://SD_ILS/0/SD_ILS:1083225 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Personick, Stewart D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3375827">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Official (ISC)2 guide to the CAP CBK ent://SD_ILS/0/SD_ILS:999003 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Howard, Patrick D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=981531">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Infosecurity 2008 threat analysis ent://SD_ILS/0/SD_ILS:1190000 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Clark, Champ, III.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492249">https://www.sciencedirect.com/science/book/9781597492249</a><br/>Format:&#160;Elektronik Kaynak<br/> Integrated security systems design : concepts, specifications, and implementation ent://SD_ILS/0/SD_ILS:1187997 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Norman, Thomas L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679091">http://www.sciencedirect.com/science/book/9780750679091</a><br/>Format:&#160;Elektronik Kaynak<br/> Essential computer security : everyone's guide to e-mail, internet, and wireless security ent://SD_ILS/0/SD_ILS:1186419 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Bradley, Tony, 1969-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491143">https://www.sciencedirect.com/science/book/9781597491143</a><br/>Format:&#160;Elektronik Kaynak<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:1188248 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490214">https://www.sciencedirect.com/science/book/9781597490214</a><br/>Format:&#160;Elektronik Kaynak<br/> Snort : IDS and IPS toolkit ent://SD_ILS/0/SD_ILS:1188271 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Beale, Jay.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490993">https://www.sciencedirect.com/science/book/9781597490993</a><br/>Format:&#160;Elektronik Kaynak<br/> The Evolution of Malware in America's Adversaries: A Study of Evolving Cyber Threats ent://SD_ILS/0/SD_ILS:692982 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Maillet, Joseph, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10815628">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10815628</a><br/>Format:&#160;Kitap<br/> Advances in computers. Volume 48, Distributed information resources ent://SD_ILS/0/SD_ILS:1189501 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Zelkowitz, Marvin V., 1945-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780120121489">http://www.sciencedirect.com/science/book/9780120121489</a> ScienceDirect <a href="http://www.sciencedirect.com/science/bookseries/00652458/48">http://www.sciencedirect.com/science/bookseries/00652458/48</a><br/>Format:&#160;Elektronik Kaynak<br/> Advances in computers. Volume 44 ent://SD_ILS/0/SD_ILS:1190484 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Zelkowitz, Marvin V., 1945-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780120121441">http://www.sciencedirect.com/science/book/9780120121441</a> ScienceDirect <a href="http://www.sciencedirect.com/science/bookseries/00652458/44">http://www.sciencedirect.com/science/bookseries/00652458/44</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing Windows server 2008 : prevent attacks from outside and inside your organization. ent://SD_ILS/0/SD_ILS:1189621 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492805">https://www.sciencedirect.com/science/book/9781597492805</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer security ent://SD_ILS/0/SD_ILS:1175962 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Carroll, John M. (John Millar), 1925-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780409900323">https://www.sciencedirect.com/science/book/9780409900323</a><br/>Format:&#160;Elektronik Kaynak<br/> Advances in computers. Volume 12 ent://SD_ILS/0/SD_ILS:1189756 2025-12-28T17:13:24Z 2025-12-28T17:13:24Z by&#160;Rubinoff, Morris.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780120121120">https://www.sciencedirect.com/science/book/9780120121120</a> ScienceDirect <a href="https://www.sciencedirect.com/science/bookseries/00652458/12">https://www.sciencedirect.com/science/bookseries/00652458/12</a> ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780120121120">http://www.sciencedirect.com/science/book/9780120121120</a> ScienceDirect <a href="http://www.sciencedirect.com/science/bookseries/00652458/12">http://www.sciencedirect.com/science/bookseries/00652458/12</a><br/>Format:&#160;Elektronik Kaynak<br/>