Search Results for Anatomy. - Narrowed by: Computer security. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dAnatomy.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?dt=list 2026-03-18T12:42:55Z Hacking point of sale : payment application secrets, threats, and solutions ent://SD_ILS/0/SD_ILS:1027046 2026-03-18T12:42:55Z 2026-03-18T12:42:55Z by&#160;Gomzin, Slava.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629175">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest Microsoft attacks ent://SD_ILS/0/SD_ILS:1177479 2026-03-18T12:42:55Z 2026-03-18T12:42:55Z by&#160;Kraus, Rob.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495516">https://www.sciencedirect.com/science/book/9781597495516</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest wireless technologies attacks ent://SD_ILS/0/SD_ILS:1178019 2026-03-18T12:42:55Z 2026-03-18T12:42:55Z by&#160;Haines, Brad.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495417">https://www.sciencedirect.com/science/book/9781597495417</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest USB attacks ent://SD_ILS/0/SD_ILS:1178020 2026-03-18T12:42:55Z 2026-03-18T12:42:55Z by&#160;Anderson, Brian (Brian James)<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495530">https://www.sciencedirect.com/science/book/9781597495530</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest social network attacks ent://SD_ILS/0/SD_ILS:1178031 2026-03-18T12:42:55Z 2026-03-18T12:42:55Z by&#160;Timm, Carl.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495455">https://www.sciencedirect.com/science/book/9781597495455</a><br/>Format:&#160;Electronic Resources<br/> The tangled Web a guide to securing modern Web applications ent://SD_ILS/0/SD_ILS:1009976 2026-03-18T12:42:55Z 2026-03-18T12:42:55Z by&#160;Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137574">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Implementing database security and auditing : a guide for DBAs, information security administrators and auditors ent://SD_ILS/0/SD_ILS:1188115 2026-03-18T12:42:55Z 2026-03-18T12:42:55Z by&#160;Ben-Natan, Ron.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">http://www.sciencedirect.com/science/book/9781555583347</a><br/>Format:&#160;Electronic Resources<br/> Information security best practices : 205 basic rules ent://SD_ILS/0/SD_ILS:1188318 2026-03-18T12:42:55Z 2026-03-18T12:42:55Z by&#160;Stefanek, George L.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781878707963">https://www.sciencedirect.com/science/book/9781878707963</a><br/>Format:&#160;Electronic Resources<br/> No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfing ent://SD_ILS/0/SD_ILS:1189635 2026-03-18T12:42:55Z 2026-03-18T12:42:55Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492157">https://www.sciencedirect.com/science/book/9781597492157</a><br/>Format:&#160;Electronic Resources<br/>