Search Results for Application software. - Narrowed by: Computer security. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dApplication$002bsoftware.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300?dt=list 2026-04-30T15:56:06Z Spring Security 3.1 secure your web applications from hackers with the step-by-step guide ent://SD_ILS/0/SD_ILS:1006508 2026-04-30T15:56:06Z 2026-04-30T15:56:06Z by&#160;Winch, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108351">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Web application vulnerabilities : detect, exploit, prevent ent://SD_ILS/0/SD_ILS:1189105 2026-04-30T15:56:06Z 2026-04-30T15:56:06Z by&#160;Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492096">http://www.sciencedirect.com/science/book/9781597492096</a><br/>Format:&#160;Electronic Resources<br/> Hacking web apps detecting and preventing web application security problems ent://SD_ILS/0/SD_ILS:1000371 2026-04-30T15:56:06Z 2026-04-30T15:56:06Z by&#160;Shema, Mike.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1012529">Click to View</a><br/>Format:&#160;Electronic Resources<br/> SQL injection attacks and defense ent://SD_ILS/0/SD_ILS:997287 2026-04-30T15:56:06Z 2026-04-30T15:56:06Z by&#160;Clarke, Justin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=953188">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Digital Watermarking Techniques and Trends ent://SD_ILS/0/SD_ILS:481612 2026-04-30T15:56:06Z 2026-04-30T15:56:06Z by&#160;Nematollahi, Mohammad Ali. author.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2095-7">http://dx.doi.org/10.1007/978-981-10-2095-7</a><br/>Format:&#160;Electronic Resources<br/> Web application obfuscation -/WAFs..Evasion..Filters//alert (/Obfuscation/)- ent://SD_ILS/0/SD_ILS:137209 2026-04-30T15:56:06Z 2026-04-30T15:56:06Z by&#160;Heiderich, Mario.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496049">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Programmer's ultimate security deskref ent://SD_ILS/0/SD_ILS:1188409 2026-04-30T15:56:06Z 2026-04-30T15:56:06Z by&#160;Foster, James C.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781932266726">https://www.sciencedirect.com/science/book/9781932266726</a><br/>Format:&#160;Electronic Resources<br/> Microsoft windows security fundamentals ent://SD_ILS/0/SD_ILS:1185703 2026-04-30T15:56:06Z 2026-04-30T15:56:06Z by&#160;Clercq, Jan de, 1968-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583408">https://www.sciencedirect.com/science/book/9781555583408</a><br/>Format:&#160;Electronic Resources<br/> Open source fuzzing tools. ent://SD_ILS/0/SD_ILS:1186474 2026-04-30T15:56:06Z 2026-04-30T15:56:06Z by&#160;Rathaus, Noam.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491952">http://www.sciencedirect.com/science/book/9781597491952</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume Three ent://SD_ILS/0/SD_ILS:481732 2026-04-30T15:56:06Z 2026-04-30T15:56:06Z by&#160;Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3409-1">http://dx.doi.org/10.1007/978-981-10-3409-1</a><br/>Format:&#160;Electronic Resources<br/> Information Fusion for Cyber-Security Analytics ent://SD_ILS/0/SD_ILS:480528 2026-04-30T15:56:06Z 2026-04-30T15:56:06Z by&#160;Alsmadi, Izzat M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44257-0">http://dx.doi.org/10.1007/978-3-319-44257-0</a><br/>Format:&#160;Electronic Resources<br/> Cyber attacks : protecting national infrastructure ent://SD_ILS/0/SD_ILS:1181825 2026-04-30T15:56:06Z 2026-04-30T15:56:06Z by&#160;Amoroso, Edward G.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123849175">https://www.sciencedirect.com/science/book/9780123849175</a><br/>Format:&#160;Electronic Resources<br/> System assurance : beyond detecting vulnerabilities ent://SD_ILS/0/SD_ILS:1183266 2026-04-30T15:56:06Z 2026-04-30T15:56:06Z by&#160;Mansourov, Nikolai.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123814142">https://www.sciencedirect.com/science/book/9780123814142</a><br/>Format:&#160;Electronic Resources<br/> Information security best practices : 205 basic rules ent://SD_ILS/0/SD_ILS:1188318 2026-04-30T15:56:06Z 2026-04-30T15:56:06Z by&#160;Stefanek, George L.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781878707963">https://www.sciencedirect.com/science/book/9781878707963</a><br/>Format:&#160;Electronic Resources<br/> Practical embedded security : building secure resource-constrained systems ent://SD_ILS/0/SD_ILS:1189168 2026-04-30T15:56:06Z 2026-04-30T15:56:06Z by&#160;Stapko, Timothy John.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780750682152">https://www.sciencedirect.com/science/book/9780750682152</a><br/>Format:&#160;Electronic Resources<br/> Syngress force emerging threat analysis : from mischief to malicious ent://SD_ILS/0/SD_ILS:1186339 2026-04-30T15:56:06Z 2026-04-30T15:56:06Z by&#160;Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">http://www.sciencedirect.com/science/book/9781597490566</a><br/>Format:&#160;Electronic Resources<br/> OSSEC host-based intrusion detection guide ent://SD_ILS/0/SD_ILS:1189620 2026-04-30T15:56:06Z 2026-04-30T15:56:06Z by&#160;Hay, Andrew.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492409">http://www.sciencedirect.com/science/book/9781597492409</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 1 ent://SD_ILS/0/SD_ILS:481578 2026-04-30T15:56:06Z 2026-04-30T15:56:06Z by&#160;Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1675-2">http://dx.doi.org/10.1007/978-981-10-1675-2</a><br/>Format:&#160;Electronic Resources<br/>