Arama Sonuçları Science. - Daraltılmış: Computer security.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dScience.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300;jsessionid=E9894B4963E26D69EAA5A44D6B556EDC?2026-01-22T15:23:10ZComputer security : art and scienceent://SD_ILS/0/SD_ILS:645062026-01-22T15:23:10Z2026-01-22T15:23:10Zby Bishop, Matt (Matthew A.)<br/>Format: Kitap<br/>Computational network science : an algorithmic approachent://SD_ILS/0/SD_ILS:10381842026-01-22T15:23:10Z2026-01-22T15:23:10Zby Hexmoor, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1798312">Click to View</a><br/>Format: Elektronik Kaynak<br/>Biohackers the politics of open scienceent://SD_ILS/0/SD_ILS:10882072026-01-22T15:23:10Z2026-01-22T15:23:10Zby Delfanti, Alessandro.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3386719">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information Science and Applications 2017 ICISA 2017ent://SD_ILS/0/SD_ILS:4817842026-01-22T15:23:10Z2026-01-22T15:23:10Zby Kim, Kuinam. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-4154-9">http://dx.doi.org/10.1007/978-981-10-4154-9</a><br/>Format: Elektronik Kaynak<br/>Hashing in computer science fifty years of slicing and dicingent://SD_ILS/0/SD_ILS:9648692026-01-22T15:23:10Z2026-01-22T15:23:10Zby Konheim, Alan G., 1934-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537352">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information security science : measuring the vulnerability to data compromisesent://SD_ILS/0/SD_ILS:11135002026-01-22T15:23:10Z2026-01-22T15:23:10Zby Young, Carl S., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4567434">Click to View</a><br/>Format: Elektronik Kaynak<br/>The science and technology of counterterrorism : measuring physical and electronic security riskent://SD_ILS/0/SD_ILS:10279872026-01-22T15:23:10Z2026-01-22T15:23:10Zby Young, Carl S., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1641934">Click to View</a><br/>Format: Elektronik Kaynak<br/>Innovations in Computer Science and Engineering Proceedings of the Fourth ICICSE 2016ent://SD_ILS/0/SD_ILS:4817642026-01-22T15:23:10Z2026-01-22T15:23:10Zby Saini, H. S. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3818-1">http://dx.doi.org/10.1007/978-981-10-3818-1</a><br/>Format: Elektronik Kaynak<br/>Advances in cryptology--EUROCRYPT '90 : Workshop on the Theory and Application of Cryptographic Techniques , Aarhus, Denmark, May 21-24, 1990 : proceedingsent://SD_ILS/0/SD_ILS:2761052026-01-22T15:23:10Z2026-01-22T15:23:10Zby EUROCRYPT '90 (1990 : Aarhus, Denmark)<br/>Format: Kitap<br/>Engineering secure and dependable software systemsent://SD_ILS/0/SD_ILS:11483372026-01-22T15:23:10Z2026-01-22T15:23:10Zby Pretschner, Alexander, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5899580">Click to View</a><br/>Format: Elektronik Kaynak<br/>Critical infrastructure protection against hybrid warfare security related challengesent://SD_ILS/0/SD_ILS:11211662026-01-22T15:23:10Z2026-01-22T15:23:10Zby Niglia, Alessandro, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4753392">Click to View</a><br/>Format: Elektronik Kaynak<br/>Best practices in computer network defense : incident detection and responseent://SD_ILS/0/SD_ILS:10276412026-01-22T15:23:10Z2026-01-22T15:23:10Zby Hathaway, Melissa E., editor of compilation.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1637648">Click to View</a><br/>Format: Elektronik Kaynak<br/>Logics and languages for reliability and securityent://SD_ILS/0/SD_ILS:9666272026-01-22T15:23:10Z2026-01-22T15:23:10Zby Esparza, Javier.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=557042">Click to View</a><br/>Format: Elektronik Kaynak<br/>A process for developing a common vocabulary in the information security areaent://SD_ILS/0/SD_ILS:9434782026-01-22T15:23:10Z2026-01-22T15:23:10Zby NATO Advanced Research Workshop on a Process for Developing a Common Vocabulary in the Information Security Area (2006 : Moscow, Russia)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=320313">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information assurance and computer securityent://SD_ILS/0/SD_ILS:9381762026-01-22T15:23:10Z2026-01-22T15:23:10Zby NATO Advanced Research Workshop on Information Assurance and Computer Security (2005 : T?etouan, Morocco)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=287000">Click to View</a><br/>Format: Elektronik Kaynak<br/>Summary of discussions at a planning meeting on cyber-security and the insider threat to classified informationent://SD_ILS/0/SD_ILS:10848892026-01-22T15:23:10Z2026-01-22T15:23:10Zby National Research Council (U.S.). Computer Science and Telecommunications Board.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3377658">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity for Industry 4.0 Analysis for Design and Manufacturingent://SD_ILS/0/SD_ILS:4809242026-01-22T15:23:10Z2026-01-22T15:23:10Zby Thames, Lane. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-50660-9">http://dx.doi.org/10.1007/978-3-319-50660-9</a><br/>Format: Elektronik Kaynak<br/>Simple steps to data encryption a practical guide to secure computingent://SD_ILS/0/SD_ILS:10076232026-01-22T15:23:10Z2026-01-22T15:23:10Zby Loshin, Pete.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115182">Click to View</a><br/>Format: Elektronik Kaynak<br/>SSCP study guide and & DVD training systement://SD_ILS/0/SD_ILS:9395782026-01-22T15:23:10Z2026-01-22T15:23:10Zby Jacobs, Josh.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294375">Click to View</a><br/>Format: Elektronik Kaynak<br/>Applications of secure multiparty computationent://SD_ILS/0/SD_ILS:11329142026-01-22T15:23:10Z2026-01-22T15:23:10Zby Laud, Peeter, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5161932">Click to View</a><br/>Format: Elektronik Kaynak<br/>Nmap 6 network exploration and security auditing cookbook ; a complete guide to mastering Nmap 6 and its scripting engine, covering practical tasks for penetration testers and system administratorsent://SD_ILS/0/SD_ILS:10049612026-01-22T15:23:10Z2026-01-22T15:23:10Zby Calderon Pale, Paulino.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1085230">Click to View</a><br/>Format: Elektronik Kaynak<br/>A bug hunter's diary a guided tour through the wilds of software securityent://SD_ILS/0/SD_ILS:10099452026-01-22T15:23:10Z2026-01-22T15:23:10Zby Klein, Tobias.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137526">Click to View</a><br/>Format: Elektronik Kaynak<br/>Practical anonymity hiding in plain sight onlineent://SD_ILS/0/SD_ILS:10076142026-01-22T15:23:10Z2026-01-22T15:23:10Zby Loshin, Peter.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115167">Click to View</a><br/>Format: Elektronik Kaynak<br/>Yazılım güvenliği saldırı ve savunmaent://SD_ILS/0/SD_ILS:2915692026-01-22T15:23:10Z2026-01-22T15:23:10Zby Demir, Bünyamin<br/>Format: Kitap<br/>Bent functions : results and applications to cryptographyent://SD_ILS/0/SD_ILS:10538312026-01-22T15:23:10Z2026-01-22T15:23:10Zby Tokareva, Natalia, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192079">Click to View</a><br/>Format: Elektronik Kaynak<br/>Understanding bitcoin : cryptography, engineering and economics.ent://SD_ILS/0/SD_ILS:10401802026-01-22T15:23:10Z2026-01-22T15:23:10Zby Franco, Pedro, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1823060">Click to View</a><br/>Format: Elektronik Kaynak<br/>Practical malware analysis the hands-on guide to dissecting malicious softwareent://SD_ILS/0/SD_ILS:10099722026-01-22T15:23:10Z2026-01-22T15:23:10Zby Sikorski, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137570">Click to View</a><br/>Format: Elektronik Kaynak<br/>Introduction to cryptography with open-source softwareent://SD_ILS/0/SD_ILS:10273122026-01-22T15:23:10Z2026-01-22T15:23:10Zby McAndrew, Alasdair, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1633743">Click to View</a><br/>Format: Elektronik Kaynak<br/>Relation based access controlent://SD_ILS/0/SD_ILS:10251322026-01-22T15:23:10Z2026-01-22T15:23:10Zby Zhang, Rui.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1589007">Click to View</a><br/>Format: Elektronik Kaynak<br/>Trusted platform module basics using TPM in embedded systemsent://SD_ILS/0/SD_ILS:9367052026-01-22T15:23:10Z2026-01-22T15:23:10Zby Kinney, Steven.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=274719">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security secrets, intruders and ID tags.ent://SD_ILS/0/SD_ILS:10920432026-01-22T15:23:10Z2026-01-22T15:23:10Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411447">Click to View</a><br/>Format: Elektronik Kaynak<br/>Securing information and communications systems principles, technologies, and applicationsent://SD_ILS/0/SD_ILS:9563262026-01-22T15:23:10Z2026-01-22T15:23:10Zby Furnell, Steven, 1970-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456881">Click to View</a><br/>Format: Elektronik Kaynak<br/>Digital Watermarking Techniques and Trendsent://SD_ILS/0/SD_ILS:4816122026-01-22T15:23:10Z2026-01-22T15:23:10Zby Nematollahi, Mohammad Ali. author.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2095-7">http://dx.doi.org/10.1007/978-981-10-2095-7</a><br/>Format: Elektronik Kaynak<br/>On Privacy-Preserving Protocols for Smart Metering Systems Security and Privacy in Smart Gridsent://SD_ILS/0/SD_ILS:4802902026-01-22T15:23:10Z2026-01-22T15:23:10Zby Borges de Oliveira, Fábio. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40718-0">http://dx.doi.org/10.1007/978-3-319-40718-0</a><br/>Format: Elektronik Kaynak<br/>The basics of information security understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:1335922026-01-22T15:23:10Z2026-01-22T15:23:10Zby Andress, Jason.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Elektronik Kaynak<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:11838152026-01-22T15:23:10Z2026-01-22T15:23:10Zby Andress, Jason.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496537">https://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Elektronik Kaynak<br/>Windows forensic analysis : DVD toolkitent://SD_ILS/0/SD_ILS:11864552026-01-22T15:23:10Z2026-01-22T15:23:10Zby Carvey, Harlan A.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491563">http://www.sciencedirect.com/science/book/9781597491563</a><br/>Format: Elektronik Kaynak<br/>Information Security Practices Emerging Threats and Perspectivesent://SD_ILS/0/SD_ILS:4808202026-01-22T15:23:10Z2026-01-22T15:23:10Zby Traoré, Issa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-48947-6">http://dx.doi.org/10.1007/978-3-319-48947-6</a><br/>Format: Elektronik Kaynak<br/>Multimedia Forensics and Security Foundations, Innovations, and Applicationsent://SD_ILS/0/SD_ILS:4805302026-01-22T15:23:10Z2026-01-22T15:23:10Zby Hassanien, Aboul Ella. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44270-9">http://dx.doi.org/10.1007/978-3-319-44270-9</a><br/>Format: Elektronik Kaynak<br/>Virtualization and forensics : a digital forensic investigator's guide to virtual environmentsent://SD_ILS/0/SD_ILS:11784292026-01-22T15:23:10Z2026-01-22T15:23:10Zby Barrett, Diane.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format: Elektronik Kaynak<br/>Hardware IP Security and Trustent://SD_ILS/0/SD_ILS:4808292026-01-22T15:23:10Z2026-01-22T15:23:10Zby Mishra, Prabhat. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-49025-0">http://dx.doi.org/10.1007/978-3-319-49025-0</a><br/>Format: Elektronik Kaynak<br/>Biometric Security and Privacy Opportunities & Challenges in The Big Data Eraent://SD_ILS/0/SD_ILS:4807192026-01-22T15:23:10Z2026-01-22T15:23:10Zby Jiang, Richard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-47301-7">http://dx.doi.org/10.1007/978-3-319-47301-7</a><br/>Format: Elektronik Kaynak<br/>Securing SQL server protecting your database from attackersent://SD_ILS/0/SD_ILS:1371912026-01-22T15:23:10Z2026-01-22T15:23:10Zby Cherry, Denny.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496254">http://www.sciencedirect.com/science/book/9781597496254</a><br/>Format: Elektronik Kaynak<br/>Cyber attacks : protecting national infrastructureent://SD_ILS/0/SD_ILS:11818252026-01-22T15:23:10Z2026-01-22T15:23:10Zby Amoroso, Edward G.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123849175">https://www.sciencedirect.com/science/book/9780123849175</a><br/>Format: Elektronik Kaynak<br/>Next generation SSH2 implementation : securing data in motionent://SD_ILS/0/SD_ILS:11917632026-01-22T15:23:10Z2026-01-22T15:23:10Zby Liu, Dale.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492836">https://www.sciencedirect.com/science/book/9781597492836</a><br/>Format: Elektronik Kaynak<br/>Techno security's guide to e-discovery and digital forensicsent://SD_ILS/0/SD_ILS:11891132026-01-22T15:23:10Z2026-01-22T15:23:10Zby Wiles, Jack.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492232">http://www.sciencedirect.com/science/book/9781597492232</a><br/>Format: Elektronik Kaynak<br/>Hack proofing Windows 2000ent://SD_ILS/0/SD_ILS:11883812026-01-22T15:23:10Z2026-01-22T15:23:10Zby Todd, Chad.<br/><a href="http://www.sciencedirect.com/science/book/9781931836494">Available from ScienceDirect. Online version available for university members only. This requires an institutional login off-campus</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836494">https://www.sciencedirect.com/science/book/9781931836494</a><br/>Format: Elektronik Kaynak<br/>Computer securityent://SD_ILS/0/SD_ILS:11759622026-01-22T15:23:10Z2026-01-22T15:23:10Zby Carroll, John M. (John Millar), 1925-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780409900323">https://www.sciencedirect.com/science/book/9780409900323</a><br/>Format: Elektronik Kaynak<br/>Stealing the network how to own a continentent://SD_ILS/0/SD_ILS:9395802026-01-22T15:23:10Z2026-01-22T15:23:10Zby Rogers, Russ.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294377">Click to View</a><br/>Format: Elektronik Kaynak<br/>Snort 2.0 intrusion detectionent://SD_ILS/0/SD_ILS:9395752026-01-22T15:23:10Z2026-01-22T15:23:10Zby Beale, Jay.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294371">Click to View</a><br/>Format: Elektronik Kaynak<br/>Low tech hacking street smarts for security professionalsent://SD_ILS/0/SD_ILS:1371062026-01-22T15:23:10Z2026-01-22T15:23:10Zby Wiles, Jack.<br/><a href="http://ezproxy.lb.polyu.edu.hk/login?url=http://www.sciencedirect.com/science/book/9781597496650">ScienceDirect e-book</a>
ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496650">http://www.sciencedirect.com/science/book/9781597496650</a><br/>Format: Elektronik Kaynak<br/>Cisco security professional's guide to secure intrusion detection systemsent://SD_ILS/0/SD_ILS:11884082026-01-22T15:23:10Z2026-01-22T15:23:10Zby Burton, James.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266696">http://www.sciencedirect.com/science/book/9781932266696</a><br/>Format: Elektronik Kaynak<br/>Computer securityent://SD_ILS/0/SD_ILS:11750902026-01-22T15:23:10Z2026-01-22T15:23:10Zby Hsiao, David K., 1933-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123576507">https://www.sciencedirect.com/science/book/9780123576507</a><br/>Format: Elektronik Kaynak<br/>Proceedings of the First International Conference on Intelligent Computing and Communicationent://SD_ILS/0/SD_ILS:4816062026-01-22T15:23:10Z2026-01-22T15:23:10Zby Mandal, Jyotsna Kumar. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2035-3">http://dx.doi.org/10.1007/978-981-10-2035-3</a><br/>Format: Elektronik Kaynak<br/>Embedded systems security practical methods for safe and secure software and systems developmentent://SD_ILS/0/SD_ILS:1333762026-01-22T15:23:10Z2026-01-22T15:23:10Zby Kleidermacher, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123868862">http://www.sciencedirect.com/science/book/9780123868862</a><br/>Format: Elektronik Kaynak<br/>Advances in intelligence and security informaticsent://SD_ILS/0/SD_ILS:1333812026-01-22T15:23:10Z2026-01-22T15:23:10Zby Mao, Wenji.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123972002">http://www.sciencedirect.com/science/book/9780123972002</a><br/>Format: Elektronik Kaynak<br/>Windows Registry Forensics : Advanced Digital Forensic Analysis of the Windows Registry.ent://SD_ILS/0/SD_ILS:11835262026-01-22T15:23:10Z2026-01-22T15:23:10Zby Carvey, Harlan.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495806">https://www.sciencedirect.com/science/book/9781597495806</a><br/>Format: Elektronik Kaynak<br/>SQL injection attacks and defenseent://SD_ILS/0/SD_ILS:11928192026-01-22T15:23:10Z2026-01-22T15:23:10Zby Clarke, Justin.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494243">https://www.sciencedirect.com/science/book/9781597494243</a><br/>Format: Elektronik Kaynak<br/>Malware forensics : investigating and analyzing malicious codeent://SD_ILS/0/SD_ILS:11896362026-01-22T15:23:10Z2026-01-22T15:23:10Zby Aquilina, James M.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492683">http://www.sciencedirect.com/science/book/9781597492683</a><br/>Format: Elektronik Kaynak<br/>WarDriving & wireless penetration testingent://SD_ILS/0/SD_ILS:11882752026-01-22T15:23:10Z2026-01-22T15:23:10Zby Hurley, Chris.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491112">http://www.sciencedirect.com/science/book/9781597491112</a><br/>Format: Elektronik Kaynak<br/>Web application vulnerabilities : detect, exploit, preventent://SD_ILS/0/SD_ILS:11891052026-01-22T15:23:10Z2026-01-22T15:23:10Zby Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492096">http://www.sciencedirect.com/science/book/9781597492096</a><br/>Format: Elektronik Kaynak<br/>Metasploit toolkit for penetration testing, exploit development, and vulnerability researchent://SD_ILS/0/SD_ILS:11863732026-01-22T15:23:10Z2026-01-22T15:23:10Zby Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">http://www.sciencedirect.com/science/book/9781597490740</a><br/>Format: Elektronik Kaynak<br/>How to cheat at securing SQL server 2005.ent://SD_ILS/0/SD_ILS:11864752026-01-22T15:23:10Z2026-01-22T15:23:10ZScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491969">http://www.sciencedirect.com/science/book/9781597491969</a><br/>Format: Elektronik Kaynak<br/>Microsoft Vista for IT security professionalsent://SD_ILS/0/SD_ILS:11864532026-01-22T15:23:10Z2026-01-22T15:23:10Zby Piltzecker, Tony, 1975-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491396">http://www.sciencedirect.com/science/book/9781597491396</a><br/>Format: Elektronik Kaynak<br/>Writing security tools and exploitsent://SD_ILS/0/SD_ILS:11882842026-01-22T15:23:10Z2026-01-22T15:23:10Zby Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499972">http://www.sciencedirect.com/science/book/9781597499972</a><br/>Format: Elektronik Kaynak<br/>Insider threat : protecting the enterprise from sabotage, spying, and theftent://SD_ILS/0/SD_ILS:11882592026-01-22T15:23:10Z2026-01-22T15:23:10Zby Cole, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format: Elektronik Kaynak<br/>Combating spyware in the enterpriseent://SD_ILS/0/SD_ILS:11863552026-01-22T15:23:10Z2026-01-22T15:23:10Zby Baskin, Brian.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490641">https://www.sciencedirect.com/science/book/9781597490641</a><br/>Format: Elektronik Kaynak<br/>How to cheat at Windows system administration using command line scriptsent://SD_ILS/0/SD_ILS:11864252026-01-22T15:23:10Z2026-01-22T15:23:10Zby Bhardwaj, Pawan K.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491051">http://www.sciencedirect.com/science/book/9781597491051</a><br/>Format: Elektronik Kaynak<br/>Host integrity monitoring : using Osiris and Samhainent://SD_ILS/0/SD_ILS:11882452026-01-22T15:23:10Z2026-01-22T15:23:10Zby Wotring, Brian.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490184">http://www.sciencedirect.com/science/book/9781597490184</a><br/>Format: Elektronik Kaynak<br/>Intrusion prevention and active response : deploying network and host IPSent://SD_ILS/0/SD_ILS:11884002026-01-22T15:23:10Z2026-01-22T15:23:10Zby Rash, Michael.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266474">http://www.sciencedirect.com/science/book/9781932266474</a><br/>Format: Elektronik Kaynak<br/>Black Hat physical device security : exploiting hardware and softwareent://SD_ILS/0/SD_ILS:11884102026-01-22T15:23:10Z2026-01-22T15:23:10Zby Miller, Drew, 1978-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266818">http://www.sciencedirect.com/science/book/9781932266818</a><br/>Format: Elektronik Kaynak<br/>Wireless operational securityent://SD_ILS/0/SD_ILS:11881042026-01-22T15:23:10Z2026-01-22T15:23:10Zby Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583170">http://www.sciencedirect.com/science/book/9781555583170</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583170">https://www.sciencedirect.com/science/book/9781555583170</a><br/>Format: Elektronik Kaynak<br/>WarDriving : drive, detect, defend : a guide to wireless securityent://SD_ILS/0/SD_ILS:11883652026-01-22T15:23:10Z2026-01-22T15:23:10Zby Hurley, Chris.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836036">https://www.sciencedirect.com/science/book/9781931836036</a><br/>Format: Elektronik Kaynak<br/>Programmer's ultimate security deskrefent://SD_ILS/0/SD_ILS:11884092026-01-22T15:23:10Z2026-01-22T15:23:10Zby Foster, James C.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781932266726">https://www.sciencedirect.com/science/book/9781932266726</a><br/>Format: Elektronik Kaynak<br/>Hack proofing XMLent://SD_ILS/0/SD_ILS:11883822026-01-22T15:23:10Z2026-01-22T15:23:10Zby 'Ken'@ftu.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836500">http://www.sciencedirect.com/science/book/9781931836500</a><br/>Format: Elektronik Kaynak<br/>Security-Aware Design for Cyber-Physical Systems A Platform-Based Approachent://SD_ILS/0/SD_ILS:4809682026-01-22T15:23:10Z2026-01-22T15:23:10Zby Lin, Chung-Wei. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-51328-7">http://dx.doi.org/10.1007/978-3-319-51328-7</a><br/>Format: Elektronik Kaynak<br/>Smart Grids: Security and Privacy Issuesent://SD_ILS/0/SD_ILS:4805722026-01-22T15:23:10Z2026-01-22T15:23:10Zby Boroojeni, Kianoosh G. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45050-6">http://dx.doi.org/10.1007/978-3-319-45050-6</a><br/>Format: Elektronik Kaynak<br/>Industrial network security securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systemsent://SD_ILS/0/SD_ILS:1372082026-01-22T15:23:10Z2026-01-22T15:23:10Zby Knapp, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496452">http://www.sciencedirect.com/science/book/9781597496452</a><br/>Format: Elektronik Kaynak<br/>Web application obfuscation -/WAFs..Evasion..Filters//alert (/Obfuscation/)-ent://SD_ILS/0/SD_ILS:1372092026-01-22T15:23:10Z2026-01-22T15:23:10Zby Heiderich, Mario.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496049">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektronik Kaynak<br/>Securing the cloud : cloud computer security techniques and tacticsent://SD_ILS/0/SD_ILS:11837432026-01-22T15:23:10Z2026-01-22T15:23:10Zby Winkler, J. R. (Joachim R.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format: Elektronik Kaynak<br/>Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systemsent://SD_ILS/0/SD_ILS:11840112026-01-22T15:23:10Z2026-01-22T15:23:10Zby Knapp, Eric.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496452">https://www.sciencedirect.com/science/book/9781597496452</a><br/>Format: Elektronik Kaynak<br/>The basics of hacking and penetration testing ethical hacking and penetration testing made easyent://SD_ILS/0/SD_ILS:1335942026-01-22T15:23:10Z2026-01-22T15:23:10Zby Engebretson, Pat (Patrick Henry), 1974-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496551">http://www.sciencedirect.com/science/book/9781597496551</a><br/>Format: Elektronik Kaynak<br/>Seven deadliest Microsoft attacksent://SD_ILS/0/SD_ILS:11774792026-01-22T15:23:10Z2026-01-22T15:23:10Zby Kraus, Rob.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495516">https://www.sciencedirect.com/science/book/9781597495516</a><br/>Format: Elektronik Kaynak<br/>Seven deadliest wireless technologies attacksent://SD_ILS/0/SD_ILS:11780192026-01-22T15:23:10Z2026-01-22T15:23:10Zby Haines, Brad.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495417">https://www.sciencedirect.com/science/book/9781597495417</a><br/>Format: Elektronik Kaynak<br/>Seven deadliest USB attacksent://SD_ILS/0/SD_ILS:11780202026-01-22T15:23:10Z2026-01-22T15:23:10Zby Anderson, Brian (Brian James)<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495530">https://www.sciencedirect.com/science/book/9781597495530</a><br/>Format: Elektronik Kaynak<br/>Seven deadliest social network attacksent://SD_ILS/0/SD_ILS:11780312026-01-22T15:23:10Z2026-01-22T15:23:10Zby Timm, Carl.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495455">https://www.sciencedirect.com/science/book/9781597495455</a><br/>Format: Elektronik Kaynak<br/>The basics of hacking and penetration testing : ethical hacking and penetration testing made easyent://SD_ILS/0/SD_ILS:11839502026-01-22T15:23:10Z2026-01-22T15:23:10Zby Engebretson, Pat (Patrick Henry), 1974-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496551">https://www.sciencedirect.com/science/book/9781597496551</a><br/>Format: Elektronik Kaynak<br/>Check Point NGX R65 security administrationent://SD_ILS/0/SD_ILS:11891222026-01-22T15:23:10Z2026-01-22T15:23:10Zby Bonnell, Ralph.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492454">http://www.sciencedirect.com/science/book/9781597492454</a><br/>Format: Elektronik Kaynak<br/>Digital watermarking and steganographyent://SD_ILS/0/SD_ILS:11891962026-01-22T15:23:10Z2026-01-22T15:23:10Zby Cox, I. J. (Ingemar J.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123725851">http://www.sciencedirect.com/science/book/9780123725851</a><br/>Format: Elektronik Kaynak<br/>Infosecurity 2008 threat analysisent://SD_ILS/0/SD_ILS:11900002026-01-22T15:23:10Z2026-01-22T15:23:10Zby Clark, Champ, III.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492249">https://www.sciencedirect.com/science/book/9781597492249</a><br/>Format: Elektronik Kaynak<br/>Open source fuzzing tools.ent://SD_ILS/0/SD_ILS:11864742026-01-22T15:23:10Z2026-01-22T15:23:10Zby Rathaus, Noam.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491952">http://www.sciencedirect.com/science/book/9781597491952</a><br/>Format: Elektronik Kaynak<br/>Botnets : the killer web appent://SD_ILS/0/SD_ILS:11864442026-01-22T15:23:10Z2026-01-22T15:23:10Zby Schiller, Craig A.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491358">https://www.sciencedirect.com/science/book/9781597491358</a><br/>Format: Elektronik Kaynak<br/>Microsoft windows security fundamentalsent://SD_ILS/0/SD_ILS:11857032026-01-22T15:23:10Z2026-01-22T15:23:10Zby Clercq, Jan de, 1968-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583408">https://www.sciencedirect.com/science/book/9781555583408</a><br/>Format: Elektronik Kaynak<br/>How to cheat at designing security for a Windows Server 2003 networkent://SD_ILS/0/SD_ILS:11882812026-01-22T15:23:10Z2026-01-22T15:23:10Zby Amini, Rob.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492430">https://www.sciencedirect.com/science/book/9781597492430</a><br/>Format: Elektronik Kaynak<br/>Trusted platform module basics : using TPM in embedded systemsent://SD_ILS/0/SD_ILS:11856622026-01-22T15:23:10Z2026-01-22T15:23:10Zby Kinney, Steven.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679602">http://www.sciencedirect.com/science/book/9780750679602</a><br/>Format: Elektronik Kaynak<br/>InfoSec career hacking : sell your skillz, not your soulent://SD_ILS/0/SD_ILS:11882442026-01-22T15:23:10Z2026-01-22T15:23:10Zby Bayles, Aaron W.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490115">https://www.sciencedirect.com/science/book/9781597490115</a><br/>Format: Elektronik Kaynak<br/>Cyber spying : tracking your family's (sometimes) secret online livesent://SD_ILS/0/SD_ILS:11883792026-01-22T15:23:10Z2026-01-22T15:23:10Zby Fair, Ted.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836418">https://www.sciencedirect.com/science/book/9781931836418</a><br/>Format: Elektronik Kaynak<br/>Software piracy exposedent://SD_ILS/0/SD_ILS:11884172026-01-22T15:23:10Z2026-01-22T15:23:10Zby Craig, Paul.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781932266986">https://www.sciencedirect.com/science/book/9781932266986</a><br/>Format: Elektronik Kaynak<br/>Aggressive network self-defenseent://SD_ILS/0/SD_ILS:11884902026-01-22T15:23:10Z2026-01-22T15:23:10Zby Wyler, Neil R.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">http://www.sciencedirect.com/science/book/9781931836203</a><br/>Format: Elektronik Kaynak<br/>IM, instant messaging, securityent://SD_ILS/0/SD_ILS:11856392026-01-22T15:23:10Z2026-01-22T15:23:10Zby Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583385">http://www.sciencedirect.com/science/book/9781555583385</a><br/>Format: Elektronik Kaynak<br/>Stealing the network : how to own a continentent://SD_ILS/0/SD_ILS:11883672026-01-22T15:23:10Z2026-01-22T15:23:10Zby 131ah.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836050">http://www.sciencedirect.com/science/book/9781931836050</a><br/>Format: Elektronik Kaynak<br/>Zero day exploit : countdown to darknessent://SD_ILS/0/SD_ILS:11884892026-01-22T15:23:10Z2026-01-22T15:23:10Zby Shein, Rob.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836098">http://www.sciencedirect.com/science/book/9781931836098</a><br/>Format: Elektronik Kaynak<br/>Internet security : a jumpstart for systems administrators and IT managersent://SD_ILS/0/SD_ILS:11880902026-01-22T15:23:10Z2026-01-22T15:23:10Zby Speed, Tim.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582982">http://www.sciencedirect.com/science/book/9781555582982</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity operations handbookent://SD_ILS/0/SD_ILS:11880952026-01-22T15:23:10Z2026-01-22T15:23:10Zby Rittinghouse, John W.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583064">https://www.sciencedirect.com/science/book/9781555583064</a><br/>Format: Elektronik Kaynak<br/>Snort 2.0 intrusion detectionent://SD_ILS/0/SD_ILS:11883872026-01-22T15:23:10Z2026-01-22T15:23:10Zby Beale, Jay.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836746">http://www.sciencedirect.com/science/book/9781931836746</a><br/>Format: Elektronik Kaynak<br/>Stealing the network : how to own the boxent://SD_ILS/0/SD_ILS:11883912026-01-22T15:23:10Z2026-01-22T15:23:10Zby Russell, Ryan, 1969-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836876">https://www.sciencedirect.com/science/book/9781931836876</a><br/>Format: Elektronik Kaynak<br/>Hack proofing ColdFusionent://SD_ILS/0/SD_ILS:11883582026-01-22T15:23:10Z2026-01-22T15:23:10Zby Meyer, Greg.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994770">http://www.sciencedirect.com/science/book/9781928994770</a><br/>Format: Elektronik Kaynak<br/>Hack proofing your identity in the information age : protect your family on the internet!ent://SD_ILS/0/SD_ILS:11853182026-01-22T15:23:10Z2026-01-22T15:23:10Zby Bidwell, Teri.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836517">https://www.sciencedirect.com/science/book/9781931836517</a><br/>Format: Elektronik Kaynak<br/>Hack proofing your Web applicationsent://SD_ILS/0/SD_ILS:11883432026-01-22T15:23:10Z2026-01-22T15:23:10Zby Traxler, Julie.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994312">https://www.sciencedirect.com/science/book/9781928994312</a><br/>Format: Elektronik Kaynak<br/>Hack proofing Linux : a guide to open source securityent://SD_ILS/0/SD_ILS:11884842026-01-22T15:23:10Z2026-01-22T15:23:10Zby Stanger, James.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994343">http://www.sciencedirect.com/science/book/9781928994343</a><br/>Format: Elektronik Kaynak<br/>Hack proofing Sun Solaris 8ent://SD_ILS/0/SD_ILS:11884852026-01-22T15:23:10Z2026-01-22T15:23:10Zby Miles, Wyman.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994442">http://www.sciencedirect.com/science/book/9781928994442</a><br/>Format: Elektronik Kaynak<br/>Advanced Computing and Systems for Security Volume Fourent://SD_ILS/0/SD_ILS:4817312026-01-22T15:23:10Z2026-01-22T15:23:10Zby Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3391-9">http://dx.doi.org/10.1007/978-981-10-3391-9</a><br/>Format: Elektronik Kaynak<br/>Advanced Computing and Systems for Security Volume Threeent://SD_ILS/0/SD_ILS:4817322026-01-22T15:23:10Z2026-01-22T15:23:10Zby Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3409-1">http://dx.doi.org/10.1007/978-981-10-3409-1</a><br/>Format: Elektronik Kaynak<br/>Securing the cloud cloud computer security techniques and tacticsent://SD_ILS/0/SD_ILS:1372012026-01-22T15:23:10Z2026-01-22T15:23:10Zby Winkler, J. R. (Joachim R.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format: Elektronik Kaynak<br/>Securing SQL server : protecting your database from attackersent://SD_ILS/0/SD_ILS:11835102026-01-22T15:23:10Z2026-01-22T15:23:10Zby Cherry, Denny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496254">https://www.sciencedirect.com/science/book/9781597496254</a><br/>Format: Elektronik Kaynak<br/>Thor's Microsoft security bible : a collection of practical security techniquesent://SD_ILS/0/SD_ILS:11839722026-01-22T15:23:10Z2026-01-22T15:23:10Zby Mullen, Timothy M.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495721">http://www.sciencedirect.com/science/book/9781597495721</a><br/>Format: Elektronik Kaynak<br/>Managed code rootkits : hooking into runtime environmentsent://SD_ILS/0/SD_ILS:11818272026-01-22T15:23:10Z2026-01-22T15:23:10Zby Metula, Erez.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495745">http://www.sciencedirect.com/science/book/9781597495745</a><br/>Format: Elektronik Kaynak<br/>System assurance : beyond detecting vulnerabilitiesent://SD_ILS/0/SD_ILS:11832662026-01-22T15:23:10Z2026-01-22T15:23:10Zby Mansourov, Nikolai.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123814142">https://www.sciencedirect.com/science/book/9780123814142</a><br/>Format: Elektronik Kaynak<br/>Microsoft forefront security administration guideent://SD_ILS/0/SD_ILS:11891202026-01-22T15:23:10Z2026-01-22T15:23:10Zby Varsalone, Jesse.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492447">https://www.sciencedirect.com/science/book/9781597492447</a><br/>Format: Elektronik Kaynak<br/>Information assurance : dependability and security in networked systemsent://SD_ILS/0/SD_ILS:11891952026-01-22T15:23:10Z2026-01-22T15:23:10Zby Qian, Yi, 1962-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123735669">https://www.sciencedirect.com/science/book/9780123735669</a><br/>Format: Elektronik Kaynak<br/>FISMA certification & accreditation handbookent://SD_ILS/0/SD_ILS:11882772026-01-22T15:23:10Z2026-01-22T15:23:10Zby Taylor, Laura.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">http://www.sciencedirect.com/science/book/9781597491167</a><br/>Format: Elektronik Kaynak<br/>Physical and logical security convergence powered by enterprise security managementent://SD_ILS/0/SD_ILS:11890882026-01-22T15:23:10Z2026-01-22T15:23:10Zby Contos, Brian T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491228">https://www.sciencedirect.com/science/book/9781597491228</a><br/>Format: Elektronik Kaynak<br/>How to cheat at securing your networkent://SD_ILS/0/SD_ILS:11899832026-01-22T15:23:10Z2026-01-22T15:23:10Zby Dubrawsky, Ido.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492317">https://www.sciencedirect.com/science/book/9781597492317</a><br/>Format: Elektronik Kaynak<br/>Developer's guide to web application securityent://SD_ILS/0/SD_ILS:11863712026-01-22T15:23:10Z2026-01-22T15:23:10Zby Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format: Elektronik Kaynak<br/>Security convergence : managing enterprise security riskent://SD_ILS/0/SD_ILS:11864462026-01-22T15:23:10Z2026-01-22T15:23:10Zby Tyson, Dave.<br/><a href="http://www.sciencedirect.com/science/book/9780750684255">Available from ScienceDirect. Online version available for university members only. This requires an institutional login off-campus</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780750684255">https://www.sciencedirect.com/science/book/9780750684255</a><br/>Format: Elektronik Kaynak<br/>Securing HP NonStop servers in an open systems world : TCP/IP, OSS & SQLent://SD_ILS/0/SD_ILS:11881182026-01-22T15:23:10Z2026-01-22T15:23:10Zby XYPRO Technology Corporation.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583446">http://www.sciencedirect.com/science/book/9781555583446</a><br/>Format: Elektronik Kaynak<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:11882482026-01-22T15:23:10Z2026-01-22T15:23:10Zby Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490214">https://www.sciencedirect.com/science/book/9781597490214</a><br/>Format: Elektronik Kaynak<br/>Essential computer security : everyone's guide to e-mail, internet, and wireless securityent://SD_ILS/0/SD_ILS:11864192026-01-22T15:23:10Z2026-01-22T15:23:10Zby Bradley, Tony, 1969-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491143">https://www.sciencedirect.com/science/book/9781597491143</a><br/>Format: Elektronik Kaynak<br/>Multimedia security technologies for digital rights managementent://SD_ILS/0/SD_ILS:11869942026-01-22T15:23:10Z2026-01-22T15:23:10Zby Zeng, Wenjun, 1967-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123694768">http://www.sciencedirect.com/science/book/9780123694768</a><br/>Format: Elektronik Kaynak<br/>Securing IM and P2P applications for the enterpriseent://SD_ILS/0/SD_ILS:11842632026-01-22T15:23:10Z2026-01-22T15:23:10Zby Piccard, Paul L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490177">http://www.sciencedirect.com/science/book/9781597490177</a>
ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499965">http://www.sciencedirect.com/science/book/9781597499965</a><br/>Format: Elektronik Kaynak<br/>Implementing database security and auditing : a guide for DBAs, information security administrators and auditorsent://SD_ILS/0/SD_ILS:11881152026-01-22T15:23:10Z2026-01-22T15:23:10Zby Ben-Natan, Ron.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">http://www.sciencedirect.com/science/book/9781555583347</a><br/>Format: Elektronik Kaynak<br/>Hacking a terror network : the silent threat of covert channelsent://SD_ILS/0/SD_ILS:11883632026-01-22T15:23:10Z2026-01-22T15:23:10Zby Rogers, Russ.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994985">https://www.sciencedirect.com/science/book/9781928994985</a><br/>Format: Elektronik Kaynak<br/>Buffer overflow attacks : detect, exploit, preventent://SD_ILS/0/SD_ILS:11884072026-01-22T15:23:10Z2026-01-22T15:23:10Zby Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266672">http://www.sciencedirect.com/science/book/9781932266672</a><br/>Format: Elektronik Kaynak<br/>Implementing homeland security for enterprise ITent://SD_ILS/0/SD_ILS:11880992026-01-22T15:23:10Z2026-01-22T15:23:10Zby Erbschloe, Michael.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">http://www.sciencedirect.com/science/book/9781555583125</a><br/>Format: Elektronik Kaynak<br/>Snort 2.1 intrusion detectionent://SD_ILS/0/SD_ILS:11883662026-01-22T15:23:10Z2026-01-22T15:23:10Zby Beale, Jay.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836043">https://www.sciencedirect.com/science/book/9781931836043</a><br/>Format: Elektronik Kaynak<br/>Cyber adversary characterization : auditing the hacker mindent://SD_ILS/0/SD_ILS:11883692026-01-22T15:23:10Z2026-01-22T15:23:10Zby Parker, Tom.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836111">http://www.sciencedirect.com/science/book/9781931836111</a><br/>Format: Elektronik Kaynak<br/>Configuring Symantec Antivirus, Corporate Editionent://SD_ILS/0/SD_ILS:11883892026-01-22T15:23:10Z2026-01-22T15:23:10Zby Hunter, Laura E.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836814">http://www.sciencedirect.com/science/book/9781931836814</a><br/>Format: Elektronik Kaynak<br/>Digital watermarkingent://SD_ILS/0/SD_ILS:11881542026-01-22T15:23:10Z2026-01-22T15:23:10Zby Cox, I. J. (Ingemar J.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607149">http://www.sciencedirect.com/science/book/9781558607149</a><br/>Format: Elektronik Kaynak<br/>Information security best practices : 205 basic rulesent://SD_ILS/0/SD_ILS:11883182026-01-22T15:23:10Z2026-01-22T15:23:10Zby Stefanek, George L.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781878707963">https://www.sciencedirect.com/science/book/9781878707963</a><br/>Format: Elektronik Kaynak<br/>Scene of the cybercrime : computer forensics handbookent://SD_ILS/0/SD_ILS:11884942026-01-22T15:23:10Z2026-01-22T15:23:10Zby Shinder, Debra Littlejohn, author.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836654">https://www.sciencedirect.com/science/book/9781931836654</a><br/>Format: Elektronik Kaynak<br/>Advances in computers. Volume 83ent://SD_ILS/0/SD_ILS:11837822026-01-22T15:23:10Z2026-01-22T15:23:10Zby Zelkowitz, Marvin V., 1945-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123855107">http://www.sciencedirect.com/science/book/9780123855107</a><br/>Format: Elektronik Kaynak<br/>Dissecting the hack : the forb1dd3n networkent://SD_ILS/0/SD_ILS:11813792026-01-22T15:23:10Z2026-01-22T15:23:10Zby Street, Jayson E.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495684">https://www.sciencedirect.com/science/book/9781597495684</a><br/>Format: Elektronik Kaynak<br/>A guide to kernel exploitation : attacking the coreent://SD_ILS/0/SD_ILS:11817702026-01-22T15:23:10Z2026-01-22T15:23:10Zby Perla, Enrico.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494861">https://www.sciencedirect.com/science/book/9781597494861</a><br/>Format: Elektronik Kaynak<br/>Google hacking for penetration testers. Volume 2ent://SD_ILS/0/SD_ILS:11891022026-01-22T15:23:10Z2026-01-22T15:23:10Zby Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491761">https://www.sciencedirect.com/science/book/9781597491761</a><br/>Format: Elektronik Kaynak<br/>Practical embedded security : building secure resource-constrained systemsent://SD_ILS/0/SD_ILS:11891682026-01-22T15:23:10Z2026-01-22T15:23:10Zby Stapko, Timothy John.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780750682152">https://www.sciencedirect.com/science/book/9780750682152</a><br/>Format: Elektronik Kaynak<br/>Securing Windows server 2008 : prevent attacks from outside and inside your organization.ent://SD_ILS/0/SD_ILS:11896212026-01-22T15:23:10Z2026-01-22T15:23:10ZScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492805">https://www.sciencedirect.com/science/book/9781597492805</a><br/>Format: Elektronik Kaynak<br/>Securing Citrix XenApp Server in the enterpriseent://SD_ILS/0/SD_ILS:11896372026-01-22T15:23:10Z2026-01-22T15:23:10Zby Bin Azad, Tariq.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492812">http://www.sciencedirect.com/science/book/9781597492812</a><br/>Format: Elektronik Kaynak<br/>Scene of the cybercrime.ent://SD_ILS/0/SD_ILS:11896652026-01-22T15:23:10Z2026-01-22T15:23:10Zby Cross, Michael, 1965-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492768">https://www.sciencedirect.com/science/book/9781597492768</a><br/>Format: Elektronik Kaynak<br/>OS X exploits and defenseent://SD_ILS/0/SD_ILS:11897052026-01-22T15:23:10Z2026-01-22T15:23:10Zby Baccas, Paul.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492546">http://www.sciencedirect.com/science/book/9781597492546</a><br/>Format: Elektronik Kaynak<br/>Stealing the network : how to own a shadow: the chase for Knuthent://SD_ILS/0/SD_ILS:11882682026-01-22T15:23:10Z2026-01-22T15:23:10Zby Long, Johnny.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490818">http://www.sciencedirect.com/science/book/9781597490818</a><br/>Format: Elektronik Kaynak<br/>Snort : IDS and IPS toolkitent://SD_ILS/0/SD_ILS:11882712026-01-22T15:23:10Z2026-01-22T15:23:10Zby Beale, Jay.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490993">https://www.sciencedirect.com/science/book/9781597490993</a><br/>Format: Elektronik Kaynak<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:11864602026-01-22T15:23:10Z2026-01-22T15:23:10Zby Winkler, Ira.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491686">https://www.sciencedirect.com/science/book/9781597491686</a><br/>Format: Elektronik Kaynak<br/>Syngress force emerging threat analysis : from mischief to maliciousent://SD_ILS/0/SD_ILS:11863392026-01-22T15:23:10Z2026-01-22T15:23:10Zby Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">http://www.sciencedirect.com/science/book/9781597490566</a><br/>Format: Elektronik Kaynak<br/>Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionalsent://SD_ILS/0/SD_ILS:11882422026-01-22T15:23:10Z2026-01-22T15:23:10Zby Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490054">http://www.sciencedirect.com/science/book/9781597490054</a><br/>Format: Elektronik Kaynak<br/>Stealing the network : how to own an identityent://SD_ILS/0/SD_ILS:11882432026-01-22T15:23:10Z2026-01-22T15:23:10Zby Alder, Raven.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490061">https://www.sciencedirect.com/science/book/9781597490061</a><br/>Format: Elektronik Kaynak<br/>Windows Server 2003 security infrastructuresent://SD_ILS/0/SD_ILS:11880842026-01-22T15:23:10Z2026-01-22T15:23:10Zby Clercq, Jan de, 1968-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582838">http://www.sciencedirect.com/science/book/9781555582838</a><br/>Format: Elektronik Kaynak<br/>OSSEC host-based intrusion detection guideent://SD_ILS/0/SD_ILS:11896202026-01-22T15:23:10Z2026-01-22T15:23:10Zby Hay, Andrew.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492409">http://www.sciencedirect.com/science/book/9781597492409</a><br/>Format: Elektronik Kaynak<br/>No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfingent://SD_ILS/0/SD_ILS:11896352026-01-22T15:23:10Z2026-01-22T15:23:10Zby Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492157">https://www.sciencedirect.com/science/book/9781597492157</a><br/>Format: Elektronik Kaynak<br/>Techno Security's guide to managing risks : for IT managers, auditors, and investigatorsent://SD_ILS/0/SD_ILS:11882802026-01-22T15:23:10Z2026-01-22T15:23:10Zby Wiles, Jack.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">http://www.sciencedirect.com/science/book/9781597491389</a><br/>Format: Elektronik Kaynak<br/>The history of information security : a comprehensive handbookent://SD_ILS/0/SD_ILS:11865232026-01-22T15:23:10Z2026-01-22T15:23:10Zby Leeuw, Karl de.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444516084">http://www.sciencedirect.com/science/book/9780444516084</a><br/>Format: Elektronik Kaynak<br/>Hack the stack : using snort and ethereal to master the 8 layers of an insecure networkent://SD_ILS/0/SD_ILS:11864272026-01-22T15:23:10Z2026-01-22T15:23:10Zby Gregg, Michael (Michael C.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">http://www.sciencedirect.com/science/book/9781597491099</a><br/>Format: Elektronik Kaynak<br/>Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasuresent://SD_ILS/0/SD_ILS:11864392026-01-22T15:23:10Z2026-01-22T15:23:10Zby Contos, Brian T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491297">https://www.sciencedirect.com/science/book/9781597491297</a><br/>Format: Elektronik Kaynak<br/>HP Nonstop server security : a practical handbookent://SD_ILS/0/SD_ILS:11881012026-01-22T15:23:10Z2026-01-22T15:23:10Zby Hill, Terri.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583149">http://www.sciencedirect.com/science/book/9781555583149</a><br/>Format: Elektronik Kaynak<br/>Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 1ent://SD_ILS/0/SD_ILS:4815782026-01-22T15:23:10Z2026-01-22T15:23:10Zby Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1675-2">http://dx.doi.org/10.1007/978-981-10-1675-2</a><br/>Format: Elektronik Kaynak<br/>Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 2ent://SD_ILS/0/SD_ILS:4815792026-01-22T15:23:10Z2026-01-22T15:23:10Zby Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1678-3">http://dx.doi.org/10.1007/978-981-10-1678-3</a><br/>Format: Elektronik Kaynak<br/>Hack proofing your networkent://SD_ILS/0/SD_ILS:11883572026-01-22T15:23:10Z2026-01-22T15:23:10Zby Ahmad, David R. Mirza.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994701">https://www.sciencedirect.com/science/book/9781928994701</a><br/>Format: Elektronik Kaynak<br/>