Search Results for Anatomy. - Narrowed by: Computer security.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dAnatomy.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?dt=list2026-03-18T12:42:55ZHacking point of sale : payment application secrets, threats, and solutionsent://SD_ILS/0/SD_ILS:10270462026-03-18T12:42:55Z2026-03-18T12:42:55Zby Gomzin, Slava.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1629175">Click to View</a><br/>Format: Electronic Resources<br/>Seven deadliest Microsoft attacksent://SD_ILS/0/SD_ILS:11774792026-03-18T12:42:55Z2026-03-18T12:42:55Zby Kraus, Rob.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495516">https://www.sciencedirect.com/science/book/9781597495516</a><br/>Format: Electronic Resources<br/>Seven deadliest wireless technologies attacksent://SD_ILS/0/SD_ILS:11780192026-03-18T12:42:55Z2026-03-18T12:42:55Zby Haines, Brad.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495417">https://www.sciencedirect.com/science/book/9781597495417</a><br/>Format: Electronic Resources<br/>Seven deadliest USB attacksent://SD_ILS/0/SD_ILS:11780202026-03-18T12:42:55Z2026-03-18T12:42:55Zby Anderson, Brian (Brian James)<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495530">https://www.sciencedirect.com/science/book/9781597495530</a><br/>Format: Electronic Resources<br/>Seven deadliest social network attacksent://SD_ILS/0/SD_ILS:11780312026-03-18T12:42:55Z2026-03-18T12:42:55Zby Timm, Carl.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495455">https://www.sciencedirect.com/science/book/9781597495455</a><br/>Format: Electronic Resources<br/>The tangled Web a guide to securing modern Web applicationsent://SD_ILS/0/SD_ILS:10099762026-03-18T12:42:55Z2026-03-18T12:42:55Zby Zalewski, Michal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137574">Click to View</a><br/>Format: Electronic Resources<br/>Implementing database security and auditing : a guide for DBAs, information security administrators and auditorsent://SD_ILS/0/SD_ILS:11881152026-03-18T12:42:55Z2026-03-18T12:42:55Zby Ben-Natan, Ron.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">http://www.sciencedirect.com/science/book/9781555583347</a><br/>Format: Electronic Resources<br/>Information security best practices : 205 basic rulesent://SD_ILS/0/SD_ILS:11883182026-03-18T12:42:55Z2026-03-18T12:42:55Zby Stefanek, George L.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781878707963">https://www.sciencedirect.com/science/book/9781878707963</a><br/>Format: Electronic Resources<br/>No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfingent://SD_ILS/0/SD_ILS:11896352026-03-18T12:42:55Z2026-03-18T12:42:55Zby Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492157">https://www.sciencedirect.com/science/book/9781597492157</a><br/>Format: Electronic Resources<br/>