Arama Sonu&ccedil;lar&#305; Science. - Daralt&#305;lm&#305;&#351;: Computer security. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dScience.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300;jsessionid=E9894B4963E26D69EAA5A44D6B556EDC? 2026-01-22T15:23:10Z Computer security : art and science ent://SD_ILS/0/SD_ILS:64506 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Bishop, Matt (Matthew A.)<br/>Format:&#160;Kitap<br/> Computational network science : an algorithmic approach ent://SD_ILS/0/SD_ILS:1038184 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Hexmoor, Henry, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1798312">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Biohackers the politics of open science ent://SD_ILS/0/SD_ILS:1088207 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Delfanti, Alessandro.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3386719">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information Science and Applications 2017 ICISA 2017 ent://SD_ILS/0/SD_ILS:481784 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Kim, Kuinam. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-4154-9">http://dx.doi.org/10.1007/978-981-10-4154-9</a><br/>Format:&#160;Elektronik Kaynak<br/> Hashing in computer science fifty years of slicing and dicing ent://SD_ILS/0/SD_ILS:964869 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Konheim, Alan G., 1934-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537352">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security science : measuring the vulnerability to data compromises ent://SD_ILS/0/SD_ILS:1113500 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Young, Carl S., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4567434">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> The science and technology of counterterrorism : measuring physical and electronic security risk ent://SD_ILS/0/SD_ILS:1027987 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Young, Carl S., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1641934">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Innovations in Computer Science and Engineering Proceedings of the Fourth ICICSE 2016 ent://SD_ILS/0/SD_ILS:481764 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Saini, H. S. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3818-1">http://dx.doi.org/10.1007/978-981-10-3818-1</a><br/>Format:&#160;Elektronik Kaynak<br/> Advances in cryptology--EUROCRYPT '90 : Workshop on the Theory and Application of Cryptographic Techniques , Aarhus, Denmark, May 21-24, 1990 : proceedings ent://SD_ILS/0/SD_ILS:276105 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;EUROCRYPT '90 (1990 : Aarhus, Denmark)<br/>Format:&#160;Kitap<br/> Engineering secure and dependable software systems ent://SD_ILS/0/SD_ILS:1148337 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Pretschner, Alexander, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5899580">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Critical infrastructure protection against hybrid warfare security related challenges ent://SD_ILS/0/SD_ILS:1121166 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Niglia, Alessandro, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4753392">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Best practices in computer network defense : incident detection and response ent://SD_ILS/0/SD_ILS:1027641 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Hathaway, Melissa E., editor of compilation.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1637648">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Logics and languages for reliability and security ent://SD_ILS/0/SD_ILS:966627 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Esparza, Javier.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=557042">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> A process for developing a common vocabulary in the information security area ent://SD_ILS/0/SD_ILS:943478 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;NATO Advanced Research Workshop on a Process for Developing a Common Vocabulary in the Information Security Area (2006 : Moscow, Russia)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=320313">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information assurance and computer security ent://SD_ILS/0/SD_ILS:938176 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;NATO Advanced Research Workshop on Information Assurance and Computer Security (2005 : T?etouan, Morocco)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=287000">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Summary of discussions at a planning meeting on cyber-security and the insider threat to classified information ent://SD_ILS/0/SD_ILS:1084889 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;National Research Council (U.S.). Computer Science and Telecommunications Board.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3377658">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity for Industry 4.0 Analysis for Design and Manufacturing ent://SD_ILS/0/SD_ILS:480924 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Thames, Lane. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-50660-9">http://dx.doi.org/10.1007/978-3-319-50660-9</a><br/>Format:&#160;Elektronik Kaynak<br/> Simple steps to data encryption a practical guide to secure computing ent://SD_ILS/0/SD_ILS:1007623 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Loshin, Pete.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115182">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> SSCP study guide and &amp; DVD training system ent://SD_ILS/0/SD_ILS:939578 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Jacobs, Josh.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294375">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Applications of secure multiparty computation ent://SD_ILS/0/SD_ILS:1132914 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Laud, Peeter, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5161932">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Nmap 6 network exploration and security auditing cookbook ; a complete guide to mastering Nmap 6 and its scripting engine, covering practical tasks for penetration testers and system administrators ent://SD_ILS/0/SD_ILS:1004961 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Calderon Pale, Paulino.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1085230">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> A bug hunter's diary a guided tour through the wilds of software security ent://SD_ILS/0/SD_ILS:1009945 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Klein, Tobias.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137526">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Practical anonymity hiding in plain sight online ent://SD_ILS/0/SD_ILS:1007614 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Loshin, Peter.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115167">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Yaz&#305;l&#305;m g&uuml;venli&#287;i sald&#305;r&#305; ve savunma ent://SD_ILS/0/SD_ILS:291569 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Demir, B&uuml;nyamin<br/>Format:&#160;Kitap<br/> Bent functions : results and applications to cryptography ent://SD_ILS/0/SD_ILS:1053831 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Tokareva, Natalia, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192079">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Understanding bitcoin : cryptography, engineering and economics. ent://SD_ILS/0/SD_ILS:1040180 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Franco, Pedro, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1823060">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Practical malware analysis the hands-on guide to dissecting malicious software ent://SD_ILS/0/SD_ILS:1009972 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Sikorski, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137570">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Introduction to cryptography with open-source software ent://SD_ILS/0/SD_ILS:1027312 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;McAndrew, Alasdair, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1633743">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Relation based access control ent://SD_ILS/0/SD_ILS:1025132 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Zhang, Rui.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1589007">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Trusted platform module basics using TPM in embedded systems ent://SD_ILS/0/SD_ILS:936705 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Kinney, Steven.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=274719">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security secrets, intruders and ID tags. ent://SD_ILS/0/SD_ILS:1092043 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411447">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing information and communications systems principles, technologies, and applications ent://SD_ILS/0/SD_ILS:956326 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Furnell, Steven, 1970-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456881">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Digital Watermarking Techniques and Trends ent://SD_ILS/0/SD_ILS:481612 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Nematollahi, Mohammad Ali. author.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2095-7">http://dx.doi.org/10.1007/978-981-10-2095-7</a><br/>Format:&#160;Elektronik Kaynak<br/> On Privacy-Preserving Protocols for Smart Metering Systems Security and Privacy in Smart Grids ent://SD_ILS/0/SD_ILS:480290 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Borges de Oliveira, F&aacute;bio. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40718-0">http://dx.doi.org/10.1007/978-3-319-40718-0</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of information security understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:133592 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Andress, Jason.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:1183815 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Andress, Jason.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496537">https://www.sciencedirect.com/science/book/9781597496537</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows forensic analysis : DVD toolkit ent://SD_ILS/0/SD_ILS:1186455 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Carvey, Harlan A.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491563">http://www.sciencedirect.com/science/book/9781597491563</a><br/>Format:&#160;Elektronik Kaynak<br/> Information Security Practices Emerging Threats and Perspectives ent://SD_ILS/0/SD_ILS:480820 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Traor&eacute;, Issa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-48947-6">http://dx.doi.org/10.1007/978-3-319-48947-6</a><br/>Format:&#160;Elektronik Kaynak<br/> Multimedia Forensics and Security Foundations, Innovations, and Applications ent://SD_ILS/0/SD_ILS:480530 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Hassanien, Aboul Ella. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44270-9">http://dx.doi.org/10.1007/978-3-319-44270-9</a><br/>Format:&#160;Elektronik Kaynak<br/> Virtualization and forensics : a digital forensic investigator's guide to virtual environments ent://SD_ILS/0/SD_ILS:1178429 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Barrett, Diane.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format:&#160;Elektronik Kaynak<br/> Hardware IP Security and Trust ent://SD_ILS/0/SD_ILS:480829 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Mishra, Prabhat. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-49025-0">http://dx.doi.org/10.1007/978-3-319-49025-0</a><br/>Format:&#160;Elektronik Kaynak<br/> Biometric Security and Privacy Opportunities &amp; Challenges in The Big Data Era ent://SD_ILS/0/SD_ILS:480719 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Jiang, Richard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-47301-7">http://dx.doi.org/10.1007/978-3-319-47301-7</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing SQL server protecting your database from attackers ent://SD_ILS/0/SD_ILS:137191 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Cherry, Denny.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496254">http://www.sciencedirect.com/science/book/9781597496254</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber attacks : protecting national infrastructure ent://SD_ILS/0/SD_ILS:1181825 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Amoroso, Edward G.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123849175">https://www.sciencedirect.com/science/book/9780123849175</a><br/>Format:&#160;Elektronik Kaynak<br/> Next generation SSH2 implementation : securing data in motion ent://SD_ILS/0/SD_ILS:1191763 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Liu, Dale.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492836">https://www.sciencedirect.com/science/book/9781597492836</a><br/>Format:&#160;Elektronik Kaynak<br/> Techno security's guide to e-discovery and digital forensics ent://SD_ILS/0/SD_ILS:1189113 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Wiles, Jack.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492232">http://www.sciencedirect.com/science/book/9781597492232</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing Windows 2000 ent://SD_ILS/0/SD_ILS:1188381 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Todd, Chad.<br/><a href="http://www.sciencedirect.com/science/book/9781931836494">Available from ScienceDirect. Online version available for university members only. This requires an institutional login off-campus</a> ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836494">https://www.sciencedirect.com/science/book/9781931836494</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer security ent://SD_ILS/0/SD_ILS:1175962 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Carroll, John M. (John Millar), 1925-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780409900323">https://www.sciencedirect.com/science/book/9780409900323</a><br/>Format:&#160;Elektronik Kaynak<br/> Stealing the network how to own a continent ent://SD_ILS/0/SD_ILS:939580 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Rogers, Russ.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294377">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Snort 2.0 intrusion detection ent://SD_ILS/0/SD_ILS:939575 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Beale, Jay.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294371">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Low tech hacking street smarts for security professionals ent://SD_ILS/0/SD_ILS:137106 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Wiles, Jack.<br/><a href="http://ezproxy.lb.polyu.edu.hk/login?url=http://www.sciencedirect.com/science/book/9781597496650">ScienceDirect e-book</a> ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496650">http://www.sciencedirect.com/science/book/9781597496650</a><br/>Format:&#160;Elektronik Kaynak<br/> Cisco security professional's guide to secure intrusion detection systems ent://SD_ILS/0/SD_ILS:1188408 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Burton, James.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266696">http://www.sciencedirect.com/science/book/9781932266696</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer security ent://SD_ILS/0/SD_ILS:1175090 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Hsiao, David K., 1933-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123576507">https://www.sciencedirect.com/science/book/9780123576507</a><br/>Format:&#160;Elektronik Kaynak<br/> Proceedings of the First International Conference on Intelligent Computing and Communication ent://SD_ILS/0/SD_ILS:481606 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Mandal, Jyotsna Kumar. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2035-3">http://dx.doi.org/10.1007/978-981-10-2035-3</a><br/>Format:&#160;Elektronik Kaynak<br/> Embedded systems security practical methods for safe and secure software and systems development ent://SD_ILS/0/SD_ILS:133376 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Kleidermacher, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123868862">http://www.sciencedirect.com/science/book/9780123868862</a><br/>Format:&#160;Elektronik Kaynak<br/> Advances in intelligence and security informatics ent://SD_ILS/0/SD_ILS:133381 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Mao, Wenji.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123972002">http://www.sciencedirect.com/science/book/9780123972002</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows Registry Forensics : Advanced Digital Forensic Analysis of the Windows Registry. ent://SD_ILS/0/SD_ILS:1183526 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Carvey, Harlan.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495806">https://www.sciencedirect.com/science/book/9781597495806</a><br/>Format:&#160;Elektronik Kaynak<br/> SQL injection attacks and defense ent://SD_ILS/0/SD_ILS:1192819 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Clarke, Justin.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494243">https://www.sciencedirect.com/science/book/9781597494243</a><br/>Format:&#160;Elektronik Kaynak<br/> Malware forensics : investigating and analyzing malicious code ent://SD_ILS/0/SD_ILS:1189636 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Aquilina, James M.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492683">http://www.sciencedirect.com/science/book/9781597492683</a><br/>Format:&#160;Elektronik Kaynak<br/> WarDriving &amp; wireless penetration testing ent://SD_ILS/0/SD_ILS:1188275 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Hurley, Chris.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491112">http://www.sciencedirect.com/science/book/9781597491112</a><br/>Format:&#160;Elektronik Kaynak<br/> Web application vulnerabilities : detect, exploit, prevent ent://SD_ILS/0/SD_ILS:1189105 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492096">http://www.sciencedirect.com/science/book/9781597492096</a><br/>Format:&#160;Elektronik Kaynak<br/> Metasploit toolkit for penetration testing, exploit development, and vulnerability research ent://SD_ILS/0/SD_ILS:1186373 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">http://www.sciencedirect.com/science/book/9781597490740</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at securing SQL server 2005. ent://SD_ILS/0/SD_ILS:1186475 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491969">http://www.sciencedirect.com/science/book/9781597491969</a><br/>Format:&#160;Elektronik Kaynak<br/> Microsoft Vista for IT security professionals ent://SD_ILS/0/SD_ILS:1186453 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Piltzecker, Tony, 1975-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491396">http://www.sciencedirect.com/science/book/9781597491396</a><br/>Format:&#160;Elektronik Kaynak<br/> Writing security tools and exploits ent://SD_ILS/0/SD_ILS:1188284 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499972">http://www.sciencedirect.com/science/book/9781597499972</a><br/>Format:&#160;Elektronik Kaynak<br/> Insider threat : protecting the enterprise from sabotage, spying, and theft ent://SD_ILS/0/SD_ILS:1188259 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Cole, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format:&#160;Elektronik Kaynak<br/> Combating spyware in the enterprise ent://SD_ILS/0/SD_ILS:1186355 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Baskin, Brian.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490641">https://www.sciencedirect.com/science/book/9781597490641</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at Windows system administration using command line scripts ent://SD_ILS/0/SD_ILS:1186425 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Bhardwaj, Pawan K.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491051">http://www.sciencedirect.com/science/book/9781597491051</a><br/>Format:&#160;Elektronik Kaynak<br/> Host integrity monitoring : using Osiris and Samhain ent://SD_ILS/0/SD_ILS:1188245 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Wotring, Brian.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490184">http://www.sciencedirect.com/science/book/9781597490184</a><br/>Format:&#160;Elektronik Kaynak<br/> Intrusion prevention and active response : deploying network and host IPS ent://SD_ILS/0/SD_ILS:1188400 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Rash, Michael.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266474">http://www.sciencedirect.com/science/book/9781932266474</a><br/>Format:&#160;Elektronik Kaynak<br/> Black Hat physical device security : exploiting hardware and software ent://SD_ILS/0/SD_ILS:1188410 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Miller, Drew, 1978-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266818">http://www.sciencedirect.com/science/book/9781932266818</a><br/>Format:&#160;Elektronik Kaynak<br/> Wireless operational security ent://SD_ILS/0/SD_ILS:1188104 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583170">http://www.sciencedirect.com/science/book/9781555583170</a> ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583170">https://www.sciencedirect.com/science/book/9781555583170</a><br/>Format:&#160;Elektronik Kaynak<br/> WarDriving : drive, detect, defend : a guide to wireless security ent://SD_ILS/0/SD_ILS:1188365 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Hurley, Chris.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836036">https://www.sciencedirect.com/science/book/9781931836036</a><br/>Format:&#160;Elektronik Kaynak<br/> Programmer's ultimate security deskref ent://SD_ILS/0/SD_ILS:1188409 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Foster, James C.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781932266726">https://www.sciencedirect.com/science/book/9781932266726</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing XML ent://SD_ILS/0/SD_ILS:1188382 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;'Ken'@ftu.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836500">http://www.sciencedirect.com/science/book/9781931836500</a><br/>Format:&#160;Elektronik Kaynak<br/> Security-Aware Design for Cyber-Physical Systems A Platform-Based Approach ent://SD_ILS/0/SD_ILS:480968 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Lin, Chung-Wei. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-51328-7">http://dx.doi.org/10.1007/978-3-319-51328-7</a><br/>Format:&#160;Elektronik Kaynak<br/> Smart Grids: Security and Privacy Issues ent://SD_ILS/0/SD_ILS:480572 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Boroojeni, Kianoosh G. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45050-6">http://dx.doi.org/10.1007/978-3-319-45050-6</a><br/>Format:&#160;Elektronik Kaynak<br/> Industrial network security securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems ent://SD_ILS/0/SD_ILS:137208 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Knapp, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496452">http://www.sciencedirect.com/science/book/9781597496452</a><br/>Format:&#160;Elektronik Kaynak<br/> Web application obfuscation -/WAFs..Evasion..Filters//alert (/Obfuscation/)- ent://SD_ILS/0/SD_ILS:137209 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Heiderich, Mario.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496049">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing the cloud : cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:1183743 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Winkler, J. R. (Joachim R.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format:&#160;Elektronik Kaynak<br/> Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems ent://SD_ILS/0/SD_ILS:1184011 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Knapp, Eric.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496452">https://www.sciencedirect.com/science/book/9781597496452</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of hacking and penetration testing ethical hacking and penetration testing made easy ent://SD_ILS/0/SD_ILS:133594 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Engebretson, Pat (Patrick Henry), 1974-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496551">http://www.sciencedirect.com/science/book/9781597496551</a><br/>Format:&#160;Elektronik Kaynak<br/> Seven deadliest Microsoft attacks ent://SD_ILS/0/SD_ILS:1177479 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Kraus, Rob.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495516">https://www.sciencedirect.com/science/book/9781597495516</a><br/>Format:&#160;Elektronik Kaynak<br/> Seven deadliest wireless technologies attacks ent://SD_ILS/0/SD_ILS:1178019 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Haines, Brad.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495417">https://www.sciencedirect.com/science/book/9781597495417</a><br/>Format:&#160;Elektronik Kaynak<br/> Seven deadliest USB attacks ent://SD_ILS/0/SD_ILS:1178020 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Anderson, Brian (Brian James)<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495530">https://www.sciencedirect.com/science/book/9781597495530</a><br/>Format:&#160;Elektronik Kaynak<br/> Seven deadliest social network attacks ent://SD_ILS/0/SD_ILS:1178031 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Timm, Carl.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495455">https://www.sciencedirect.com/science/book/9781597495455</a><br/>Format:&#160;Elektronik Kaynak<br/> The basics of hacking and penetration testing : ethical hacking and penetration testing made easy ent://SD_ILS/0/SD_ILS:1183950 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Engebretson, Pat (Patrick Henry), 1974-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496551">https://www.sciencedirect.com/science/book/9781597496551</a><br/>Format:&#160;Elektronik Kaynak<br/> Check Point NGX R65 security administration ent://SD_ILS/0/SD_ILS:1189122 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Bonnell, Ralph.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492454">http://www.sciencedirect.com/science/book/9781597492454</a><br/>Format:&#160;Elektronik Kaynak<br/> Digital watermarking and steganography ent://SD_ILS/0/SD_ILS:1189196 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Cox, I. J. (Ingemar J.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123725851">http://www.sciencedirect.com/science/book/9780123725851</a><br/>Format:&#160;Elektronik Kaynak<br/> Infosecurity 2008 threat analysis ent://SD_ILS/0/SD_ILS:1190000 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Clark, Champ, III.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492249">https://www.sciencedirect.com/science/book/9781597492249</a><br/>Format:&#160;Elektronik Kaynak<br/> Open source fuzzing tools. ent://SD_ILS/0/SD_ILS:1186474 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Rathaus, Noam.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491952">http://www.sciencedirect.com/science/book/9781597491952</a><br/>Format:&#160;Elektronik Kaynak<br/> Botnets : the killer web app ent://SD_ILS/0/SD_ILS:1186444 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Schiller, Craig A.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491358">https://www.sciencedirect.com/science/book/9781597491358</a><br/>Format:&#160;Elektronik Kaynak<br/> Microsoft windows security fundamentals ent://SD_ILS/0/SD_ILS:1185703 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Clercq, Jan de, 1968-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583408">https://www.sciencedirect.com/science/book/9781555583408</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at designing security for a Windows Server 2003 network ent://SD_ILS/0/SD_ILS:1188281 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Amini, Rob.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492430">https://www.sciencedirect.com/science/book/9781597492430</a><br/>Format:&#160;Elektronik Kaynak<br/> Trusted platform module basics : using TPM in embedded systems ent://SD_ILS/0/SD_ILS:1185662 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Kinney, Steven.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679602">http://www.sciencedirect.com/science/book/9780750679602</a><br/>Format:&#160;Elektronik Kaynak<br/> InfoSec career hacking : sell your skillz, not your soul ent://SD_ILS/0/SD_ILS:1188244 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Bayles, Aaron W.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490115">https://www.sciencedirect.com/science/book/9781597490115</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber spying : tracking your family's (sometimes) secret online lives ent://SD_ILS/0/SD_ILS:1188379 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Fair, Ted.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836418">https://www.sciencedirect.com/science/book/9781931836418</a><br/>Format:&#160;Elektronik Kaynak<br/> Software piracy exposed ent://SD_ILS/0/SD_ILS:1188417 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Craig, Paul.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781932266986">https://www.sciencedirect.com/science/book/9781932266986</a><br/>Format:&#160;Elektronik Kaynak<br/> Aggressive network self-defense ent://SD_ILS/0/SD_ILS:1188490 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Wyler, Neil R.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">http://www.sciencedirect.com/science/book/9781931836203</a><br/>Format:&#160;Elektronik Kaynak<br/> IM, instant messaging, security ent://SD_ILS/0/SD_ILS:1185639 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583385">http://www.sciencedirect.com/science/book/9781555583385</a><br/>Format:&#160;Elektronik Kaynak<br/> Stealing the network : how to own a continent ent://SD_ILS/0/SD_ILS:1188367 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;131ah.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836050">http://www.sciencedirect.com/science/book/9781931836050</a><br/>Format:&#160;Elektronik Kaynak<br/> Zero day exploit : countdown to darkness ent://SD_ILS/0/SD_ILS:1188489 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Shein, Rob.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836098">http://www.sciencedirect.com/science/book/9781931836098</a><br/>Format:&#160;Elektronik Kaynak<br/> Internet security : a jumpstart for systems administrators and IT managers ent://SD_ILS/0/SD_ILS:1188090 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Speed, Tim.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582982">http://www.sciencedirect.com/science/book/9781555582982</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity operations handbook ent://SD_ILS/0/SD_ILS:1188095 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Rittinghouse, John W.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583064">https://www.sciencedirect.com/science/book/9781555583064</a><br/>Format:&#160;Elektronik Kaynak<br/> Snort 2.0 intrusion detection ent://SD_ILS/0/SD_ILS:1188387 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Beale, Jay.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836746">http://www.sciencedirect.com/science/book/9781931836746</a><br/>Format:&#160;Elektronik Kaynak<br/> Stealing the network : how to own the box ent://SD_ILS/0/SD_ILS:1188391 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Russell, Ryan, 1969-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836876">https://www.sciencedirect.com/science/book/9781931836876</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing ColdFusion ent://SD_ILS/0/SD_ILS:1188358 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Meyer, Greg.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994770">http://www.sciencedirect.com/science/book/9781928994770</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing your identity in the information age : protect your family on the internet! ent://SD_ILS/0/SD_ILS:1185318 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Bidwell, Teri.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836517">https://www.sciencedirect.com/science/book/9781931836517</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing your Web applications ent://SD_ILS/0/SD_ILS:1188343 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Traxler, Julie.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994312">https://www.sciencedirect.com/science/book/9781928994312</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing Linux : a guide to open source security ent://SD_ILS/0/SD_ILS:1188484 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Stanger, James.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994343">http://www.sciencedirect.com/science/book/9781928994343</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing Sun Solaris 8 ent://SD_ILS/0/SD_ILS:1188485 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Miles, Wyman.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994442">http://www.sciencedirect.com/science/book/9781928994442</a><br/>Format:&#160;Elektronik Kaynak<br/> Advanced Computing and Systems for Security Volume Four ent://SD_ILS/0/SD_ILS:481731 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3391-9">http://dx.doi.org/10.1007/978-981-10-3391-9</a><br/>Format:&#160;Elektronik Kaynak<br/> Advanced Computing and Systems for Security Volume Three ent://SD_ILS/0/SD_ILS:481732 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3409-1">http://dx.doi.org/10.1007/978-981-10-3409-1</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing the cloud cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:137201 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Winkler, J. R. (Joachim R.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing SQL server : protecting your database from attackers ent://SD_ILS/0/SD_ILS:1183510 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Cherry, Denny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496254">https://www.sciencedirect.com/science/book/9781597496254</a><br/>Format:&#160;Elektronik Kaynak<br/> Thor's Microsoft security bible : a collection of practical security techniques ent://SD_ILS/0/SD_ILS:1183972 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Mullen, Timothy M.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495721">http://www.sciencedirect.com/science/book/9781597495721</a><br/>Format:&#160;Elektronik Kaynak<br/> Managed code rootkits : hooking into runtime environments ent://SD_ILS/0/SD_ILS:1181827 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Metula, Erez.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495745">http://www.sciencedirect.com/science/book/9781597495745</a><br/>Format:&#160;Elektronik Kaynak<br/> System assurance : beyond detecting vulnerabilities ent://SD_ILS/0/SD_ILS:1183266 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Mansourov, Nikolai.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123814142">https://www.sciencedirect.com/science/book/9780123814142</a><br/>Format:&#160;Elektronik Kaynak<br/> Microsoft forefront security administration guide ent://SD_ILS/0/SD_ILS:1189120 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Varsalone, Jesse.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492447">https://www.sciencedirect.com/science/book/9781597492447</a><br/>Format:&#160;Elektronik Kaynak<br/> Information assurance : dependability and security in networked systems ent://SD_ILS/0/SD_ILS:1189195 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Qian, Yi, 1962-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123735669">https://www.sciencedirect.com/science/book/9780123735669</a><br/>Format:&#160;Elektronik Kaynak<br/> FISMA certification &amp; accreditation handbook ent://SD_ILS/0/SD_ILS:1188277 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Taylor, Laura.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">http://www.sciencedirect.com/science/book/9781597491167</a><br/>Format:&#160;Elektronik Kaynak<br/> Physical and logical security convergence powered by enterprise security management ent://SD_ILS/0/SD_ILS:1189088 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Contos, Brian T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491228">https://www.sciencedirect.com/science/book/9781597491228</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at securing your network ent://SD_ILS/0/SD_ILS:1189983 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Dubrawsky, Ido.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492317">https://www.sciencedirect.com/science/book/9781597492317</a><br/>Format:&#160;Elektronik Kaynak<br/> Developer's guide to web application security ent://SD_ILS/0/SD_ILS:1186371 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format:&#160;Elektronik Kaynak<br/> Security convergence : managing enterprise security risk ent://SD_ILS/0/SD_ILS:1186446 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Tyson, Dave.<br/><a href="http://www.sciencedirect.com/science/book/9780750684255">Available from ScienceDirect. Online version available for university members only. This requires an institutional login off-campus</a> ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780750684255">https://www.sciencedirect.com/science/book/9780750684255</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing HP NonStop servers in an open systems world : TCP/IP, OSS &amp; SQL ent://SD_ILS/0/SD_ILS:1188118 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;XYPRO Technology Corporation.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583446">http://www.sciencedirect.com/science/book/9781555583446</a><br/>Format:&#160;Elektronik Kaynak<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:1188248 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490214">https://www.sciencedirect.com/science/book/9781597490214</a><br/>Format:&#160;Elektronik Kaynak<br/> Essential computer security : everyone's guide to e-mail, internet, and wireless security ent://SD_ILS/0/SD_ILS:1186419 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Bradley, Tony, 1969-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491143">https://www.sciencedirect.com/science/book/9781597491143</a><br/>Format:&#160;Elektronik Kaynak<br/> Multimedia security technologies for digital rights management ent://SD_ILS/0/SD_ILS:1186994 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Zeng, Wenjun, 1967-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123694768">http://www.sciencedirect.com/science/book/9780123694768</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing IM and P2P applications for the enterprise ent://SD_ILS/0/SD_ILS:1184263 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Piccard, Paul L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490177">http://www.sciencedirect.com/science/book/9781597490177</a> ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499965">http://www.sciencedirect.com/science/book/9781597499965</a><br/>Format:&#160;Elektronik Kaynak<br/> Implementing database security and auditing : a guide for DBAs, information security administrators and auditors ent://SD_ILS/0/SD_ILS:1188115 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Ben-Natan, Ron.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">http://www.sciencedirect.com/science/book/9781555583347</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking a terror network : the silent threat of covert channels ent://SD_ILS/0/SD_ILS:1188363 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Rogers, Russ.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994985">https://www.sciencedirect.com/science/book/9781928994985</a><br/>Format:&#160;Elektronik Kaynak<br/> Buffer overflow attacks : detect, exploit, prevent ent://SD_ILS/0/SD_ILS:1188407 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266672">http://www.sciencedirect.com/science/book/9781932266672</a><br/>Format:&#160;Elektronik Kaynak<br/> Implementing homeland security for enterprise IT ent://SD_ILS/0/SD_ILS:1188099 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Erbschloe, Michael.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">http://www.sciencedirect.com/science/book/9781555583125</a><br/>Format:&#160;Elektronik Kaynak<br/> Snort 2.1 intrusion detection ent://SD_ILS/0/SD_ILS:1188366 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Beale, Jay.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836043">https://www.sciencedirect.com/science/book/9781931836043</a><br/>Format:&#160;Elektronik Kaynak<br/> Cyber adversary characterization : auditing the hacker mind ent://SD_ILS/0/SD_ILS:1188369 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Parker, Tom.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836111">http://www.sciencedirect.com/science/book/9781931836111</a><br/>Format:&#160;Elektronik Kaynak<br/> Configuring Symantec Antivirus, Corporate Edition ent://SD_ILS/0/SD_ILS:1188389 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Hunter, Laura E.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836814">http://www.sciencedirect.com/science/book/9781931836814</a><br/>Format:&#160;Elektronik Kaynak<br/> Digital watermarking ent://SD_ILS/0/SD_ILS:1188154 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Cox, I. J. (Ingemar J.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607149">http://www.sciencedirect.com/science/book/9781558607149</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security best practices : 205 basic rules ent://SD_ILS/0/SD_ILS:1188318 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Stefanek, George L.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781878707963">https://www.sciencedirect.com/science/book/9781878707963</a><br/>Format:&#160;Elektronik Kaynak<br/> Scene of the cybercrime : computer forensics handbook ent://SD_ILS/0/SD_ILS:1188494 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Shinder, Debra Littlejohn, author.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836654">https://www.sciencedirect.com/science/book/9781931836654</a><br/>Format:&#160;Elektronik Kaynak<br/> Advances in computers. Volume 83 ent://SD_ILS/0/SD_ILS:1183782 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Zelkowitz, Marvin V., 1945-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123855107">http://www.sciencedirect.com/science/book/9780123855107</a><br/>Format:&#160;Elektronik Kaynak<br/> Dissecting the hack : the forb1dd3n network ent://SD_ILS/0/SD_ILS:1181379 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Street, Jayson E.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495684">https://www.sciencedirect.com/science/book/9781597495684</a><br/>Format:&#160;Elektronik Kaynak<br/> A guide to kernel exploitation : attacking the core ent://SD_ILS/0/SD_ILS:1181770 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Perla, Enrico.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494861">https://www.sciencedirect.com/science/book/9781597494861</a><br/>Format:&#160;Elektronik Kaynak<br/> Google hacking for penetration testers. Volume 2 ent://SD_ILS/0/SD_ILS:1189102 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491761">https://www.sciencedirect.com/science/book/9781597491761</a><br/>Format:&#160;Elektronik Kaynak<br/> Practical embedded security : building secure resource-constrained systems ent://SD_ILS/0/SD_ILS:1189168 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Stapko, Timothy John.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780750682152">https://www.sciencedirect.com/science/book/9780750682152</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing Windows server 2008 : prevent attacks from outside and inside your organization. ent://SD_ILS/0/SD_ILS:1189621 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492805">https://www.sciencedirect.com/science/book/9781597492805</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing Citrix XenApp Server in the enterprise ent://SD_ILS/0/SD_ILS:1189637 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Bin Azad, Tariq.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492812">http://www.sciencedirect.com/science/book/9781597492812</a><br/>Format:&#160;Elektronik Kaynak<br/> Scene of the cybercrime. ent://SD_ILS/0/SD_ILS:1189665 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Cross, Michael, 1965-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492768">https://www.sciencedirect.com/science/book/9781597492768</a><br/>Format:&#160;Elektronik Kaynak<br/> OS X exploits and defense ent://SD_ILS/0/SD_ILS:1189705 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Baccas, Paul.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492546">http://www.sciencedirect.com/science/book/9781597492546</a><br/>Format:&#160;Elektronik Kaynak<br/> Stealing the network : how to own a shadow: the chase for Knuth ent://SD_ILS/0/SD_ILS:1188268 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490818">http://www.sciencedirect.com/science/book/9781597490818</a><br/>Format:&#160;Elektronik Kaynak<br/> Snort : IDS and IPS toolkit ent://SD_ILS/0/SD_ILS:1188271 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Beale, Jay.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490993">https://www.sciencedirect.com/science/book/9781597490993</a><br/>Format:&#160;Elektronik Kaynak<br/> Zen and the art of information security ent://SD_ILS/0/SD_ILS:1186460 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Winkler, Ira.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491686">https://www.sciencedirect.com/science/book/9781597491686</a><br/>Format:&#160;Elektronik Kaynak<br/> Syngress force emerging threat analysis : from mischief to malicious ent://SD_ILS/0/SD_ILS:1186339 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">http://www.sciencedirect.com/science/book/9781597490566</a><br/>Format:&#160;Elektronik Kaynak<br/> Sockets, shellcode, porting &amp; coding : reverse engineering exploits and tool coding for security professionals ent://SD_ILS/0/SD_ILS:1188242 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490054">http://www.sciencedirect.com/science/book/9781597490054</a><br/>Format:&#160;Elektronik Kaynak<br/> Stealing the network : how to own an identity ent://SD_ILS/0/SD_ILS:1188243 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Alder, Raven.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490061">https://www.sciencedirect.com/science/book/9781597490061</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows Server 2003 security infrastructures ent://SD_ILS/0/SD_ILS:1188084 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Clercq, Jan de, 1968-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582838">http://www.sciencedirect.com/science/book/9781555582838</a><br/>Format:&#160;Elektronik Kaynak<br/> OSSEC host-based intrusion detection guide ent://SD_ILS/0/SD_ILS:1189620 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Hay, Andrew.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492409">http://www.sciencedirect.com/science/book/9781597492409</a><br/>Format:&#160;Elektronik Kaynak<br/> No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfing ent://SD_ILS/0/SD_ILS:1189635 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492157">https://www.sciencedirect.com/science/book/9781597492157</a><br/>Format:&#160;Elektronik Kaynak<br/> Techno Security's guide to managing risks : for IT managers, auditors, and investigators ent://SD_ILS/0/SD_ILS:1188280 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Wiles, Jack.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">http://www.sciencedirect.com/science/book/9781597491389</a><br/>Format:&#160;Elektronik Kaynak<br/> The history of information security : a comprehensive handbook ent://SD_ILS/0/SD_ILS:1186523 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Leeuw, Karl de.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444516084">http://www.sciencedirect.com/science/book/9780444516084</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack the stack : using snort and ethereal to master the 8 layers of an insecure network ent://SD_ILS/0/SD_ILS:1186427 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Gregg, Michael (Michael C.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">http://www.sciencedirect.com/science/book/9781597491099</a><br/>Format:&#160;Elektronik Kaynak<br/> Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures ent://SD_ILS/0/SD_ILS:1186439 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Contos, Brian T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491297">https://www.sciencedirect.com/science/book/9781597491297</a><br/>Format:&#160;Elektronik Kaynak<br/> HP Nonstop server security : a practical handbook ent://SD_ILS/0/SD_ILS:1188101 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Hill, Terri.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583149">http://www.sciencedirect.com/science/book/9781555583149</a><br/>Format:&#160;Elektronik Kaynak<br/> Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 1 ent://SD_ILS/0/SD_ILS:481578 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1675-2">http://dx.doi.org/10.1007/978-981-10-1675-2</a><br/>Format:&#160;Elektronik Kaynak<br/> Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 2 ent://SD_ILS/0/SD_ILS:481579 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1678-3">http://dx.doi.org/10.1007/978-981-10-1678-3</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing your network ent://SD_ILS/0/SD_ILS:1188357 2026-01-22T15:23:10Z 2026-01-22T15:23:10Z by&#160;Ahmad, David R. Mirza.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994701">https://www.sciencedirect.com/science/book/9781928994701</a><br/>Format:&#160;Elektronik Kaynak<br/>