Arama Sonuçları Management. - Daraltılmış: Computer security.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dManagement.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300?dt=list2026-01-01T21:17:46ZInfosec management fundamentalsent://SD_ILS/0/SD_ILS:10535832026-01-01T21:17:46Z2026-01-01T21:17:46Zby Dalziel, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2146007">Click to View</a><br/>Format: Elektronik Kaynak<br/>Adaptive security management architectureent://SD_ILS/0/SD_ILS:9722382026-01-01T21:17:46Z2026-01-01T21:17:46Zby Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=625004">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cloud management and securityent://SD_ILS/0/SD_ILS:10323382026-01-01T21:17:46Z2026-01-01T21:17:46Zby Abbadi, Imad M., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1701403">Click to View</a><br/>Format: Elektronik Kaynak<br/>Identity management concepts, technologies, and systemsent://SD_ILS/0/SD_ILS:9725072026-01-01T21:17:46Z2026-01-01T21:17:46Zby Bertino, Elisa.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=634511">Click to View</a><br/>Format: Elektronik Kaynak<br/>Safety management for software-based equipmentent://SD_ILS/0/SD_ILS:10134392026-01-01T21:17:46Z2026-01-01T21:17:46Zby Boulanger, Jean-Louis.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1187169">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber security awareness for CEOs and managementent://SD_ILS/0/SD_ILS:11045662026-01-01T21:17:46Z2026-01-01T21:17:46Zby Willson, David, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4189279">Click to View</a><br/>Format: Elektronik Kaynak<br/>Multimedia security technologies for digital rights managementent://SD_ILS/0/SD_ILS:9366402026-01-01T21:17:46Z2026-01-01T21:17:46Zby Zeng, Wenjun, 1967-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=274233">Click to View</a><br/>Format: Elektronik Kaynak<br/>Multimedia security technologies for digital rights managementent://SD_ILS/0/SD_ILS:11869942026-01-01T21:17:46Z2026-01-01T21:17:46Zby Zeng, Wenjun, 1967-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123694768">http://www.sciencedirect.com/science/book/9780123694768</a><br/>Format: Elektronik Kaynak<br/>Information management & computer security. Volume 15, Number 5, Papers from the HAISA 2007 Symposiument://SD_ILS/0/SD_ILS:9441192026-01-01T21:17:46Z2026-01-01T21:17:46Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328737">Click to View</a><br/>Format: Elektronik Kaynak<br/>Risk management for computer security Protecting your network and information assetsent://SD_ILS/0/SD_ILS:9396582026-01-01T21:17:46Z2026-01-01T21:17:46Zby Jones, Andy, 1952-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294671">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information security risk management for ISO 27001/ISO 27002ent://SD_ILS/0/SD_ILS:11481972026-01-01T21:17:46Z2026-01-01T21:17:46Zby Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5894007">Click to View</a><br/>Format: Elektronik Kaynak<br/>OAuth 2.0 identity and access management patternsent://SD_ILS/0/SD_ILS:10234802026-01-01T21:17:46Z2026-01-01T21:17:46Zby Spasovski, Martin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572907">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security risk management building an information security risk management program from the ground upent://SD_ILS/0/SD_ILS:9768042026-01-01T21:17:46Z2026-01-01T21:17:46Zby Wheeler, Evan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=685406">Click to View</a><br/>Format: Elektronik Kaynak<br/>Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasuresent://SD_ILS/0/SD_ILS:9394832026-01-01T21:17:46Z2026-01-01T21:17:46Zby Contos, Brian T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294116">Click to View</a><br/>Format: Elektronik Kaynak<br/>Logging and log management the authoritative guide to understanding the concepts surrounding logging and log managementent://SD_ILS/0/SD_ILS:10044582026-01-01T21:17:46Z2026-01-01T21:17:46Zby Chuvakin, Anton A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1077419">Click to View</a><br/>Format: Elektronik Kaynak<br/>Oracle Identity and Access Manager 11g for administrators administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasksent://SD_ILS/0/SD_ILS:9968352026-01-01T21:17:46Z2026-01-01T21:17:46Zby Kumar, Atul.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948559">Click to View</a><br/>Format: Elektronik Kaynak<br/>Papers from the first European workshop on technological & security issues in digital rights management (EuDiRights)ent://SD_ILS/0/SD_ILS:9391602026-01-01T21:17:46Z2026-01-01T21:17:46Zby Yagüe, Mariemma.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=291585">Click to View</a><br/>Format: Elektronik Kaynak<br/>Federated identity management and web services security with IBM tivoli security solutionsent://SD_ILS/0/SD_ILS:10752162026-01-01T21:17:46Z2026-01-01T21:17:46Zby Bücker, Axel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306521">Click to View</a><br/>Format: Elektronik Kaynak<br/>Physical and logical security convergence powered by enterprise security managementent://SD_ILS/0/SD_ILS:11890882026-01-01T21:17:46Z2026-01-01T21:17:46Zby Contos, Brian T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491228">https://www.sciencedirect.com/science/book/9781597491228</a><br/>Format: Elektronik Kaynak<br/>Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasuresent://SD_ILS/0/SD_ILS:11864392026-01-01T21:17:46Z2026-01-01T21:17:46Zby Contos, Brian T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491297">https://www.sciencedirect.com/science/book/9781597491297</a><br/>Format: Elektronik Kaynak<br/>Special issue on internet securityent://SD_ILS/0/SD_ILS:9315302026-01-01T21:17:46Z2026-01-01T21:17:46Zby Dhillon, Gurpreet.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=232281">Click to View</a><br/>Format: Elektronik Kaynak<br/>Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013ent://SD_ILS/0/SD_ILS:10350102026-01-01T21:17:46Z2026-01-01T21:17:46Zby Ginodman, Veniamin, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1752831">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security issues of IT outsourcingent://SD_ILS/0/SD_ILS:9380182026-01-01T21:17:46Z2026-01-01T21:17:46Zby Gritzalis, Stefanos.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=285536">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information protection playbookent://SD_ILS/0/SD_ILS:10199902026-01-01T21:17:46Z2026-01-01T21:17:46Zby Kane, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1418381">Click to View</a><br/>Format: Elektronik Kaynak<br/>An introduction to security in a CSM 1.3 for AIX 5L environmentent://SD_ILS/0/SD_ILS:10754072026-01-01T21:17:46Z2026-01-01T21:17:46Zby Lascu, Octavian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306712">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security and privacy in the digital era. Volume 1ent://SD_ILS/0/SD_ILS:11152702026-01-01T21:17:46Z2026-01-01T21:17:46Zby Guerrier, Claudine, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4648717">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information security policy, processes, and practicesent://SD_ILS/0/SD_ILS:9532972026-01-01T21:17:46Z2026-01-01T21:17:46Zby Straub, Detmar W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=435197">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security convergence managing enterprise security riskent://SD_ILS/0/SD_ILS:9404342026-01-01T21:17:46Z2026-01-01T21:17:46Zby Tyson, Dave.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=299507">Click to View</a><br/>Format: Elektronik Kaynak<br/>The science and technology of counterterrorism : measuring physical and electronic security riskent://SD_ILS/0/SD_ILS:10279872026-01-01T21:17:46Z2026-01-01T21:17:46Zby Young, Carl S., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1641934">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information security analytics : finding security insights, patterns and anomalies in big dataent://SD_ILS/0/SD_ILS:10416292026-01-01T21:17:46Z2026-01-01T21:17:46Zby Mark, Talabis, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1873129">Click to View</a><br/>Format: Elektronik Kaynak<br/>Collaboration with cloud computing : security, social media, and unified communicationsent://SD_ILS/0/SD_ILS:10299612026-01-01T21:17:46Z2026-01-01T21:17:46Zby Messier, Ric, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1675198">Click to View</a><br/>Format: Elektronik Kaynak<br/>Group policy : fundamentals, security, and the managed desktopent://SD_ILS/0/SD_ILS:11031672026-01-01T21:17:46Z2026-01-01T21:17:46Zby Moskowitz, Jeremy, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040685">Click to View</a><br/>Format: Elektronik Kaynak<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:10322662026-01-01T21:17:46Z2026-01-01T21:17:46Zby Andress, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1699255">Click to View</a><br/>Format: Elektronik Kaynak<br/>Group policy fundamentals, security, and the managed desktopent://SD_ILS/0/SD_ILS:10060892026-01-01T21:17:46Z2026-01-01T21:17:46Zby Moskowitz, Jeremy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1104500">Click to View</a><br/>Format: Elektronik Kaynak<br/>Social media security : leveraging social networking while mitigating riskent://SD_ILS/0/SD_ILS:10076172026-01-01T21:17:46Z2026-01-01T21:17:46Zby Cross, Michael, 1965-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115173">Click to View</a><br/>Format: Elektronik Kaynak<br/>Group policy fundamentals, security, and the managed desktopent://SD_ILS/0/SD_ILS:9634792026-01-01T21:17:46Z2026-01-01T21:17:46Zby Moskowitz, Jeremy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=530009">Click to View</a><br/>Format: Elektronik Kaynak<br/>Embedded systems security practical methods for safe and secure software and systems developmentent://SD_ILS/0/SD_ILS:1333762026-01-01T21:17:46Z2026-01-01T21:17:46Zby Kleidermacher, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123868862">http://www.sciencedirect.com/science/book/9780123868862</a><br/>Format: Elektronik Kaynak<br/>The basics of information security understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:1335922026-01-01T21:17:46Z2026-01-01T21:17:46Zby Andress, Jason.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Elektronik Kaynak<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:11838152026-01-01T21:17:46Z2026-01-01T21:17:46Zby Andress, Jason.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496537">https://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Elektronik Kaynak<br/>Protecting your library's digital sources the essential guide to planning and preservationent://SD_ILS/0/SD_ILS:9300962026-01-01T21:17:46Z2026-01-01T21:17:46Zby Kahn, Miriam (Miriam B.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=218937">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity for Industry 4.0 Analysis for Design and Manufacturingent://SD_ILS/0/SD_ILS:4809242026-01-01T21:17:46Z2026-01-01T21:17:46Zby Thames, Lane. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-50660-9">http://dx.doi.org/10.1007/978-3-319-50660-9</a><br/>Format: Elektronik Kaynak<br/>Security convergence : managing enterprise security riskent://SD_ILS/0/SD_ILS:11864462026-01-01T21:17:46Z2026-01-01T21:17:46Zby Tyson, Dave.<br/><a href="http://www.sciencedirect.com/science/book/9780750684255">Available from ScienceDirect. Online version available for university members only. This requires an institutional login off-campus</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780750684255">https://www.sciencedirect.com/science/book/9780750684255</a><br/>Format: Elektronik Kaynak<br/>Computer securityent://SD_ILS/0/SD_ILS:11759622026-01-01T21:17:46Z2026-01-01T21:17:46Zby Carroll, John M. (John Millar), 1925-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780409900323">https://www.sciencedirect.com/science/book/9780409900323</a><br/>Format: Elektronik Kaynak<br/>Hashing in computer science fifty years of slicing and dicingent://SD_ILS/0/SD_ILS:9648692026-01-01T21:17:46Z2026-01-01T21:17:46Zby Konheim, Alan G., 1934-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537352">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cisco security professional's guide to secure intrusion detection systemsent://SD_ILS/0/SD_ILS:11884082026-01-01T21:17:46Z2026-01-01T21:17:46Zby Burton, James.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266696">http://www.sciencedirect.com/science/book/9781932266696</a><br/>Format: Elektronik Kaynak<br/>Computing and Network Sustainability Proceedings of IRSCNS 2016ent://SD_ILS/0/SD_ILS:4817722026-01-01T21:17:46Z2026-01-01T21:17:46Zby Vishwakarma, H.R . editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3935-5">http://dx.doi.org/10.1007/978-981-10-3935-5</a><br/>Format: Elektronik Kaynak<br/>Advances in intelligence and security informaticsent://SD_ILS/0/SD_ILS:1333812026-01-01T21:17:46Z2026-01-01T21:17:46Zby Mao, Wenji.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123972002">http://www.sciencedirect.com/science/book/9780123972002</a><br/>Format: Elektronik Kaynak<br/>Host integrity monitoring : using Osiris and Samhainent://SD_ILS/0/SD_ILS:11882452026-01-01T21:17:46Z2026-01-01T21:17:46Zby Wotring, Brian.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490184">http://www.sciencedirect.com/science/book/9781597490184</a><br/>Format: Elektronik Kaynak<br/>Intrusion prevention and active response : deploying network and host IPSent://SD_ILS/0/SD_ILS:11884002026-01-01T21:17:46Z2026-01-01T21:17:46Zby Rash, Michael.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266474">http://www.sciencedirect.com/science/book/9781932266474</a><br/>Format: Elektronik Kaynak<br/>Wireless operational securityent://SD_ILS/0/SD_ILS:11881042026-01-01T21:17:46Z2026-01-01T21:17:46Zby Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583170">http://www.sciencedirect.com/science/book/9781555583170</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583170">https://www.sciencedirect.com/science/book/9781555583170</a><br/>Format: Elektronik Kaynak<br/>Information Security Practices Emerging Threats and Perspectivesent://SD_ILS/0/SD_ILS:4808202026-01-01T21:17:46Z2026-01-01T21:17:46Zby Traoré, Issa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-48947-6">http://dx.doi.org/10.1007/978-3-319-48947-6</a><br/>Format: Elektronik Kaynak<br/>Check Point NGX R65 security administrationent://SD_ILS/0/SD_ILS:11891222026-01-01T21:17:46Z2026-01-01T21:17:46Zby Bonnell, Ralph.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492454">http://www.sciencedirect.com/science/book/9781597492454</a><br/>Format: Elektronik Kaynak<br/>Microsoft windows security fundamentalsent://SD_ILS/0/SD_ILS:11857032026-01-01T21:17:46Z2026-01-01T21:17:46Zby Clercq, Jan de, 1968-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583408">https://www.sciencedirect.com/science/book/9781555583408</a><br/>Format: Elektronik Kaynak<br/>How to cheat at designing security for a Windows Server 2003 networkent://SD_ILS/0/SD_ILS:11882812026-01-01T21:17:46Z2026-01-01T21:17:46Zby Amini, Rob.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492430">https://www.sciencedirect.com/science/book/9781597492430</a><br/>Format: Elektronik Kaynak<br/>Trusted platform module basics : using TPM in embedded systemsent://SD_ILS/0/SD_ILS:11856622026-01-01T21:17:46Z2026-01-01T21:17:46Zby Kinney, Steven.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679602">http://www.sciencedirect.com/science/book/9780750679602</a><br/>Format: Elektronik Kaynak<br/>IM, instant messaging, securityent://SD_ILS/0/SD_ILS:11856392026-01-01T21:17:46Z2026-01-01T21:17:46Zby Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583385">http://www.sciencedirect.com/science/book/9781555583385</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity operations handbookent://SD_ILS/0/SD_ILS:11880952026-01-01T21:17:46Z2026-01-01T21:17:46Zby Rittinghouse, John W.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583064">https://www.sciencedirect.com/science/book/9781555583064</a><br/>Format: Elektronik Kaynak<br/>Advanced Computing and Systems for Security Volume Fourent://SD_ILS/0/SD_ILS:4817312026-01-01T21:17:46Z2026-01-01T21:17:46Zby Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3391-9">http://dx.doi.org/10.1007/978-981-10-3391-9</a><br/>Format: Elektronik Kaynak<br/>Information Fusion for Cyber-Security Analyticsent://SD_ILS/0/SD_ILS:4805282026-01-01T21:17:46Z2026-01-01T21:17:46Zby Alsmadi, Izzat M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44257-0">http://dx.doi.org/10.1007/978-3-319-44257-0</a><br/>Format: Elektronik Kaynak<br/>Information technology security fundamentalsent://SD_ILS/0/SD_ILS:11026972026-01-01T21:17:46Z2026-01-01T21:17:46Zby Sagers, Glen., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4009415">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cyber attacks : protecting national infrastructureent://SD_ILS/0/SD_ILS:11818252026-01-01T21:17:46Z2026-01-01T21:17:46Zby Amoroso, Edward G.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123849175">https://www.sciencedirect.com/science/book/9780123849175</a><br/>Format: Elektronik Kaynak<br/>Thor's Microsoft security bible : a collection of practical security techniquesent://SD_ILS/0/SD_ILS:11839722026-01-01T21:17:46Z2026-01-01T21:17:46Zby Mullen, Timothy M.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495721">http://www.sciencedirect.com/science/book/9781597495721</a><br/>Format: Elektronik Kaynak<br/>Managed code rootkits : hooking into runtime environmentsent://SD_ILS/0/SD_ILS:11818272026-01-01T21:17:46Z2026-01-01T21:17:46Zby Metula, Erez.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495745">http://www.sciencedirect.com/science/book/9781597495745</a><br/>Format: Elektronik Kaynak<br/>System assurance : beyond detecting vulnerabilitiesent://SD_ILS/0/SD_ILS:11832662026-01-01T21:17:46Z2026-01-01T21:17:46Zby Mansourov, Nikolai.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123814142">https://www.sciencedirect.com/science/book/9780123814142</a><br/>Format: Elektronik Kaynak<br/>Information assurance : dependability and security in networked systemsent://SD_ILS/0/SD_ILS:11891952026-01-01T21:17:46Z2026-01-01T21:17:46Zby Qian, Yi, 1962-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123735669">https://www.sciencedirect.com/science/book/9780123735669</a><br/>Format: Elektronik Kaynak<br/>Microsoft forefront security administration guideent://SD_ILS/0/SD_ILS:11891202026-01-01T21:17:46Z2026-01-01T21:17:46Zby Varsalone, Jesse.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492447">https://www.sciencedirect.com/science/book/9781597492447</a><br/>Format: Elektronik Kaynak<br/>Techno security's guide to e-discovery and digital forensicsent://SD_ILS/0/SD_ILS:11891132026-01-01T21:17:46Z2026-01-01T21:17:46Zby Wiles, Jack.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492232">http://www.sciencedirect.com/science/book/9781597492232</a><br/>Format: Elektronik Kaynak<br/>Securing IM and P2P applications for the enterpriseent://SD_ILS/0/SD_ILS:11842632026-01-01T21:17:46Z2026-01-01T21:17:46Zby Piccard, Paul L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490177">http://www.sciencedirect.com/science/book/9781597490177</a>
ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499965">http://www.sciencedirect.com/science/book/9781597499965</a><br/>Format: Elektronik Kaynak<br/>Configuring Symantec Antivirus, Corporate Editionent://SD_ILS/0/SD_ILS:11883892026-01-01T21:17:46Z2026-01-01T21:17:46Zby Hunter, Laura E.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836814">http://www.sciencedirect.com/science/book/9781931836814</a><br/>Format: Elektronik Kaynak<br/>Information security best practices : 205 basic rulesent://SD_ILS/0/SD_ILS:11883182026-01-01T21:17:46Z2026-01-01T21:17:46Zby Stefanek, George L.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781878707963">https://www.sciencedirect.com/science/book/9781878707963</a><br/>Format: Elektronik Kaynak<br/>Advances in computers. Volume 83ent://SD_ILS/0/SD_ILS:11837822026-01-01T21:17:46Z2026-01-01T21:17:46Zby Zelkowitz, Marvin V., 1945-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123855107">http://www.sciencedirect.com/science/book/9780123855107</a><br/>Format: Elektronik Kaynak<br/>Securing Windows server 2008 : prevent attacks from outside and inside your organization.ent://SD_ILS/0/SD_ILS:11896212026-01-01T21:17:46Z2026-01-01T21:17:46ZScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492805">https://www.sciencedirect.com/science/book/9781597492805</a><br/>Format: Elektronik Kaynak<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:11864602026-01-01T21:17:46Z2026-01-01T21:17:46Zby Winkler, Ira.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491686">https://www.sciencedirect.com/science/book/9781597491686</a><br/>Format: Elektronik Kaynak<br/>Syngress force emerging threat analysis : from mischief to maliciousent://SD_ILS/0/SD_ILS:11863392026-01-01T21:17:46Z2026-01-01T21:17:46Zby Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">http://www.sciencedirect.com/science/book/9781597490566</a><br/>Format: Elektronik Kaynak<br/>Windows Server 2003 security infrastructuresent://SD_ILS/0/SD_ILS:11880842026-01-01T21:17:46Z2026-01-01T21:17:46Zby Clercq, Jan de, 1968-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582838">http://www.sciencedirect.com/science/book/9781555582838</a><br/>Format: Elektronik Kaynak<br/>The history of information security : a comprehensive handbookent://SD_ILS/0/SD_ILS:11865232026-01-01T21:17:46Z2026-01-01T21:17:46Zby Leeuw, Karl de.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444516084">http://www.sciencedirect.com/science/book/9780444516084</a><br/>Format: Elektronik Kaynak<br/>Techno Security's guide to managing risks : for IT managers, auditors, and investigatorsent://SD_ILS/0/SD_ILS:11882802026-01-01T21:17:46Z2026-01-01T21:17:46Zby Wiles, Jack.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">http://www.sciencedirect.com/science/book/9781597491389</a><br/>Format: Elektronik Kaynak<br/>Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 1ent://SD_ILS/0/SD_ILS:4815782026-01-01T21:17:46Z2026-01-01T21:17:46Zby Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1675-2">http://dx.doi.org/10.1007/978-981-10-1675-2</a><br/>Format: Elektronik Kaynak<br/>Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 2ent://SD_ILS/0/SD_ILS:4815792026-01-01T21:17:46Z2026-01-01T21:17:46Zby Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1678-3">http://dx.doi.org/10.1007/978-981-10-1678-3</a><br/>Format: Elektronik Kaynak<br/>