Arama Sonuçları Computers -- Access control.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dComputers$002b--$002bAccess$002bcontrol.$0026ic$003dtrue$0026ps$003d300?dt=list2025-12-28T17:13:24ZAğ ve siber güvenlik temelleri : dijital dünyada güvende kalınent://SD_ILS/0/SD_ILS:12321712025-12-28T17:13:24Z2025-12-28T17:13:24Zby Hınçer, Görkem, yazar.<br/>Format: Kitap<br/>Advances in computers. Volume 108ent://SD_ILS/0/SD_ILS:11356452025-12-28T17:13:24Z2025-12-28T17:13:24Zby Memon, Atif, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5295182">Click to View</a><br/>Format: Elektronik Kaynak<br/>Kali Linux network scanning cookbook : take your penetration-testing skills to the next levelent://SD_ILS/0/SD_ILS:11267622025-12-28T17:13:24Z2025-12-28T17:13:24Zby Hixon, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4867412">Click to View</a><br/>Format: Elektronik Kaynak<br/>The basics of digital privacy : simple tools to protect your personal information and your identity onlineent://SD_ILS/0/SD_ILS:10235692025-12-28T17:13:24Z2025-12-28T17:13:24Zby Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1573362">Click to View</a><br/>Format: Elektronik Kaynak<br/>Metasploit penetration testing cookbookent://SD_ILS/0/SD_ILS:10212802025-12-28T17:13:24Z2025-12-28T17:13:24Zby Agarwal, Monika.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1477469">Click to View</a><br/>Format: Elektronik Kaynak<br/>Learning Metasploit exploitation and developmentent://SD_ILS/0/SD_ILS:10157102025-12-28T17:13:24Z2025-12-28T17:13:24Zby Balapure, Aditya.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1236046">Click to View</a><br/>Format: Elektronik Kaynak<br/>Linux firewalls attack detection and response with iptables, psad, and fwsnortent://SD_ILS/0/SD_ILS:10584532025-12-28T17:13:24Z2025-12-28T17:13:24Zby Rash, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3017624">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security assessment case studies for implementing the NSA lAMent://SD_ILS/0/SD_ILS:9395702025-12-28T17:13:24Z2025-12-28T17:13:24Zby Rogers, Russ.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294358">Click to View</a><br/>Format: Elektronik Kaynak<br/>Mastering metasploit : take your penetration testing and IT security skills to a whole new level with the secrets of Metasploitent://SD_ILS/0/SD_ILS:11389602025-12-28T17:13:24Z2025-12-28T17:13:24Zby Jaswal, Nipun, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5419743">Click to View</a><br/>Format: Elektronik Kaynak<br/>evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework Metasploit Penetration testing cookbookent://SD_ILS/0/SD_ILS:11362162025-12-28T17:13:24Z2025-12-28T17:13:24Zby Teixeira, Daniel, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5314606">Click to View</a><br/>Format: Elektronik Kaynak<br/>Mastering wireless penetration testing for highly secured environments : scan, exploit, and crack wireless networks by using the most advanced techniques from security professionalsent://SD_ILS/0/SD_ILS:10451872025-12-28T17:13:24Z2025-12-28T17:13:24Zby Johns, A. (Aaron), author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1931593">Click to View</a><br/>Format: Elektronik Kaynak<br/>Git essentials : create, merge, and distribute code with Git, the most powerful and flexible versioning system availableent://SD_ILS/0/SD_ILS:10489972025-12-28T17:13:24Z2025-12-28T17:13:24Zby Santacroce, Ferdinando, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2038062">Click to View</a><br/>Format: Elektronik Kaynak<br/>Mastering metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approachent://SD_ILS/0/SD_ILS:10253642025-12-28T17:13:24Z2025-12-28T17:13:24Zby Jaswal, Nipun, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1593853">Click to View</a><br/>Format: Elektronik Kaynak<br/>Metasploit penetration testing cookbook over 70 recipes to master the most widely used penetration testing frameworkent://SD_ILS/0/SD_ILS:9971912025-12-28T17:13:24Z2025-12-28T17:13:24Zby Singh, Abhinav.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=952079">Click to View</a><br/>Format: Elektronik Kaynak<br/>Access control, security, and trust : a logical approachent://SD_ILS/0/SD_ILS:10284172025-12-28T17:13:24Z2025-12-28T17:13:24Zby Chin, Shiu-Kai, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1648320">Click to View</a><br/>Format: Elektronik Kaynak<br/>OpenAM written and tested with OpenAM Snapshot 9 : the single sign-on (SSO) tool for securing your web applications in a fast and easy wayent://SD_ILS/0/SD_ILS:9962682025-12-28T17:13:24Z2025-12-28T17:13:24Zby Thangasamy, Indira.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=943991">Click to View</a><br/>Format: Elektronik Kaynak<br/>BackTrack 5 wireless penetration testing beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5ent://SD_ILS/0/SD_ILS:9968252025-12-28T17:13:24Z2025-12-28T17:13:24Zby Ramachandran, Vivek.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948547">Click to View</a><br/>Format: Elektronik Kaynak<br/>Oracle Identity and Access Manager 11g for administrators administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasksent://SD_ILS/0/SD_ILS:9968352025-12-28T17:13:24Z2025-12-28T17:13:24Zby Kumar, Atul.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948559">Click to View</a><br/>Format: Elektronik Kaynak<br/>Relation based access controlent://SD_ILS/0/SD_ILS:10251322025-12-28T17:13:24Z2025-12-28T17:13:24Zby Zhang, Rui.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1589007">Click to View</a><br/>Format: Elektronik Kaynak<br/>Access denied the practice and policy of global Internet filteringent://SD_ILS/0/SD_ILS:10813972025-12-28T17:13:24Z2025-12-28T17:13:24Zby Deibert, Ronald.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3338769">Click to View</a><br/>Format: Elektronik Kaynak<br/>Role-based access controlent://SD_ILS/0/SD_ILS:9309912025-12-28T17:13:24Z2025-12-28T17:13:24Zby Ferraiolo, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227631">Click to View</a><br/>Format: Elektronik Kaynak<br/>Metasploit the penetration tester's guideent://SD_ILS/0/SD_ILS:10099662025-12-28T17:13:24Z2025-12-28T17:13:24Zby Kennedy, David, 1982-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137562">Click to View</a><br/>Format: Elektronik Kaynak<br/>Managed code rootkits : hooking into runtime environmentsent://SD_ILS/0/SD_ILS:11818272025-12-28T17:13:24Z2025-12-28T17:13:24Zby Metula, Erez.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495745">http://www.sciencedirect.com/science/book/9781597495745</a><br/>Format: Elektronik Kaynak<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:11839662025-12-28T17:13:24Z2025-12-28T17:13:24Zby Faircloth, Jeremy.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496278">http://www.sciencedirect.com/science/book/9781597496278</a><br/>Format: Elektronik Kaynak<br/>Perfect passwords : selection, protection, authenticationent://SD_ILS/0/SD_ILS:11882562025-12-28T17:13:24Z2025-12-28T17:13:24Zby Burnett, Mark.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490412">https://www.sciencedirect.com/science/book/9781597490412</a><br/>Format: Elektronik Kaynak<br/>The rise of the computer state : the threat to our freedoms, our ethics and our democratic processent://SD_ILS/0/SD_ILS:11256412025-12-28T17:13:24Z2025-12-28T17:13:24Zby Burnham, David (David Michael), author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4850348">Click to View</a><br/>Format: Elektronik Kaynak<br/>OAuth 2.0 identity and access management patternsent://SD_ILS/0/SD_ILS:10234802025-12-28T17:13:24Z2025-12-28T17:13:24Zby Spasovski, Martin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572907">Click to View</a><br/>Format: Elektronik Kaynak<br/>Instant Java password and authentication securityent://SD_ILS/0/SD_ILS:10234862025-12-28T17:13:24Z2025-12-28T17:13:24Zby Mayoral, Fernando.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572913">Click to View</a><br/>Format: Elektronik Kaynak<br/>Federated identity primerent://SD_ILS/0/SD_ILS:10046722025-12-28T17:13:24Z2025-12-28T17:13:24Zby Rountree, Derrick.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1081145">Click to View</a><br/>Format: Elektronik Kaynak<br/>Perfect passwords selection, protection, authenticationent://SD_ILS/0/SD_ILS:9338752025-12-28T17:13:24Z2025-12-28T17:13:24Zby Burnett, Mark.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254851">Click to View</a><br/>Format: Elektronik Kaynak<br/>Kali Linux wireless penetration testing : beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attackent://SD_ILS/0/SD_ILS:11370502025-12-28T17:13:24Z2025-12-28T17:13:24Zby Buchanan, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5340668">Click to View</a><br/>Format: Elektronik Kaynak<br/>Kali Linux wireless penetration testing beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linuxent://SD_ILS/0/SD_ILS:10470892025-12-28T17:13:24Z2025-12-28T17:13:24Zby Ramachandran, Vivek, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2005211">Click to View</a><br/>Format: Elektronik Kaynak<br/>Check Point NG next generation security administrationent://SD_ILS/0/SD_ILS:9394472025-12-28T17:13:24Z2025-12-28T17:13:24Zby Simonis, Drew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294029">Click to View</a><br/>Format: Elektronik Kaynak<br/>Sanal ortamda sansürent://SD_ILS/0/SD_ILS:1101772025-12-28T17:13:24Z2025-12-28T17:13:24Zby Schiffrin, Natalia<br/>Format: Kitap<br/>Role-based access controlent://SD_ILS/0/SD_ILS:9452212025-12-28T17:13:24Z2025-12-28T17:13:24Zby Ferraiolo, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338751">Click to View</a><br/>Format: Elektronik Kaynak<br/>Ulusal bilgi güvenliği : strateji ve kurumsal yapılanmaent://SD_ILS/0/SD_ILS:2864042025-12-28T17:13:24Z2025-12-28T17:13:24Zby Güngör, Murat<br/>Format: Kitap<br/>Network security : private communication in a public worldent://SD_ILS/0/SD_ILS:11693802025-12-28T17:13:24Z2025-12-28T17:13:24Zby Kaufman, Charlie.<br/>Format: Kitap<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:11184652025-12-28T17:13:24Z2025-12-28T17:13:24Zby Faircloth, Jeremy, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4694443">Click to View</a><br/>Format: Elektronik Kaynak<br/>Integrated security systems design : a complete reference for building enterprise-wide digital security systemsent://SD_ILS/0/SD_ILS:10373432025-12-28T17:13:24Z2025-12-28T17:13:24Zby Norman, Thomas, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1781681">Click to View</a><br/>Format: Elektronik Kaynak<br/>Wicked cool Ruby scripts useful scripts that solve difficult problemsent://SD_ILS/0/SD_ILS:10584612025-12-28T17:13:24Z2025-12-28T17:13:24Zby Pugh, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3017632">Click to View</a><br/>Format: Elektronik Kaynak<br/>Integrated security systems design concepts, specifications, and implementationent://SD_ILS/0/SD_ILS:9382982025-12-28T17:13:24Z2025-12-28T17:13:24Zby Norman, Thomas L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=287955">Click to View</a><br/>Format: Elektronik Kaynak<br/>Practical deployment of Cisco Identity Services Engine (ISE) : real-world examples of AAA deploymentsent://SD_ILS/0/SD_ILS:11038752025-12-28T17:13:24Z2025-12-28T17:13:24Zby Richter, Andy, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4092862">Click to View</a><br/>Format: Elektronik Kaynak<br/>Identity management for internet of thingsent://SD_ILS/0/SD_ILS:11107002025-12-28T17:13:24Z2025-12-28T17:13:24Zby Mahalle, Parikshit N., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4509473">Click to View</a><br/>Format: Elektronik Kaynak<br/>Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtuallyent://SD_ILS/0/SD_ILS:10281452025-12-28T17:13:24Z2025-12-28T17:13:24Zby Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1644005">Click to View</a><br/>Format: Elektronik Kaynak<br/>Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linuxent://SD_ILS/0/SD_ILS:10317372025-12-28T17:13:24Z2025-12-28T17:13:24Zby Buchanan, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1688607">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information protection playbookent://SD_ILS/0/SD_ILS:10199902025-12-28T17:13:24Z2025-12-28T17:13:24Zby Kane, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1418381">Click to View</a><br/>Format: Elektronik Kaynak<br/>Instant Spring Security starter learn the fundamentals of web authentication and authorization using Spring Securityent://SD_ILS/0/SD_ILS:10162682025-12-28T17:13:24Z2025-12-28T17:13:24Zby Jagielski, Piotr.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1274894">Click to View</a><br/>Format: Elektronik Kaynak<br/>A multidisciplinary introduction to information securityent://SD_ILS/0/SD_ILS:10284162025-12-28T17:13:24Z2025-12-28T17:13:24Zby Mjølsnes, Stig F., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1648315">Click to View</a><br/>Format: Elektronik Kaynak<br/>Essential computer security everyone's guide to e-mail, internet, and wireless securityent://SD_ILS/0/SD_ILS:9433502025-12-28T17:13:24Z2025-12-28T17:13:24Zby Bradley, Tony.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=319200">Click to View</a><br/>Format: Elektronik Kaynak<br/>User's guide to cryptography and standardsent://SD_ILS/0/SD_ILS:9310172025-12-28T17:13:24Z2025-12-28T17:13:24Zby Dent, Alexander W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227658">Click to View</a><br/>Format: Elektronik Kaynak<br/>Outsourcing information securityent://SD_ILS/0/SD_ILS:9310182025-12-28T17:13:24Z2025-12-28T17:13:24Zby Axelrod, C. Warren.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227659">Click to View</a><br/>Format: Elektronik Kaynak<br/>Access contested security, identity, and resistance in Asian cyberspace information revolution and global politicsent://SD_ILS/0/SD_ILS:10819582025-12-28T17:13:24Z2025-12-28T17:13:24Zby Deibert, Ronald.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3339362">Click to View</a><br/>Format: Elektronik Kaynak<br/>Identity and access management solutions using WebSphere Portal V5.1, Tivoli Identity Manager V4.5.1, and Tivoli Access Manager V5.1ent://SD_ILS/0/SD_ILS:10752412025-12-28T17:13:24Z2025-12-28T17:13:24Zby Ganci, John.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306546">Click to View</a><br/>Format: Elektronik Kaynak<br/>Critical information infrastructure protection and the law an overview of key issuesent://SD_ILS/0/SD_ILS:10832252025-12-28T17:13:24Z2025-12-28T17:13:24Zby Personick, Stewart D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3375827">Click to View</a><br/>Format: Elektronik Kaynak<br/>Official (ISC)2 guide to the CAP CBKent://SD_ILS/0/SD_ILS:9990032025-12-28T17:13:24Z2025-12-28T17:13:24Zby Howard, Patrick D.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=981531">Click to View</a><br/>Format: Elektronik Kaynak<br/>Infosecurity 2008 threat analysisent://SD_ILS/0/SD_ILS:11900002025-12-28T17:13:24Z2025-12-28T17:13:24Zby Clark, Champ, III.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492249">https://www.sciencedirect.com/science/book/9781597492249</a><br/>Format: Elektronik Kaynak<br/>Integrated security systems design : concepts, specifications, and implementationent://SD_ILS/0/SD_ILS:11879972025-12-28T17:13:24Z2025-12-28T17:13:24Zby Norman, Thomas L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679091">http://www.sciencedirect.com/science/book/9780750679091</a><br/>Format: Elektronik Kaynak<br/>Essential computer security : everyone's guide to e-mail, internet, and wireless securityent://SD_ILS/0/SD_ILS:11864192025-12-28T17:13:24Z2025-12-28T17:13:24Zby Bradley, Tony, 1969-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491143">https://www.sciencedirect.com/science/book/9781597491143</a><br/>Format: Elektronik Kaynak<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:11882482025-12-28T17:13:24Z2025-12-28T17:13:24Zby Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490214">https://www.sciencedirect.com/science/book/9781597490214</a><br/>Format: Elektronik Kaynak<br/>Snort : IDS and IPS toolkitent://SD_ILS/0/SD_ILS:11882712025-12-28T17:13:24Z2025-12-28T17:13:24Zby Beale, Jay.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490993">https://www.sciencedirect.com/science/book/9781597490993</a><br/>Format: Elektronik Kaynak<br/>The Evolution of Malware in America's Adversaries: A Study of Evolving Cyber Threatsent://SD_ILS/0/SD_ILS:6929822025-12-28T17:13:24Z2025-12-28T17:13:24Zby Maillet, Joseph, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10815628">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10815628</a><br/>Format: Kitap<br/>Advances in computers. Volume 48, Distributed information resourcesent://SD_ILS/0/SD_ILS:11895012025-12-28T17:13:24Z2025-12-28T17:13:24Zby Zelkowitz, Marvin V., 1945-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780120121489">http://www.sciencedirect.com/science/book/9780120121489</a>
ScienceDirect <a href="http://www.sciencedirect.com/science/bookseries/00652458/48">http://www.sciencedirect.com/science/bookseries/00652458/48</a><br/>Format: Elektronik Kaynak<br/>Advances in computers. Volume 44ent://SD_ILS/0/SD_ILS:11904842025-12-28T17:13:24Z2025-12-28T17:13:24Zby Zelkowitz, Marvin V., 1945-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780120121441">http://www.sciencedirect.com/science/book/9780120121441</a>
ScienceDirect <a href="http://www.sciencedirect.com/science/bookseries/00652458/44">http://www.sciencedirect.com/science/bookseries/00652458/44</a><br/>Format: Elektronik Kaynak<br/>Securing Windows server 2008 : prevent attacks from outside and inside your organization.ent://SD_ILS/0/SD_ILS:11896212025-12-28T17:13:24Z2025-12-28T17:13:24ZScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492805">https://www.sciencedirect.com/science/book/9781597492805</a><br/>Format: Elektronik Kaynak<br/>Computer securityent://SD_ILS/0/SD_ILS:11759622025-12-28T17:13:24Z2025-12-28T17:13:24Zby Carroll, John M. (John Millar), 1925-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780409900323">https://www.sciencedirect.com/science/book/9780409900323</a><br/>Format: Elektronik Kaynak<br/>Advances in computers. Volume 12ent://SD_ILS/0/SD_ILS:11897562025-12-28T17:13:24Z2025-12-28T17:13:24Zby Rubinoff, Morris.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780120121120">https://www.sciencedirect.com/science/book/9780120121120</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/bookseries/00652458/12">https://www.sciencedirect.com/science/bookseries/00652458/12</a>
ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780120121120">http://www.sciencedirect.com/science/book/9780120121120</a>
ScienceDirect <a href="http://www.sciencedirect.com/science/bookseries/00652458/12">http://www.sciencedirect.com/science/bookseries/00652458/12</a><br/>Format: Elektronik Kaynak<br/>