Search Results for Application software. - Narrowed by: Computer security.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dApplication$002bsoftware.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300?dt=list2026-04-30T15:56:06ZSpring Security 3.1 secure your web applications from hackers with the step-by-step guideent://SD_ILS/0/SD_ILS:10065082026-04-30T15:56:06Z2026-04-30T15:56:06Zby Winch, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1108351">Click to View</a><br/>Format: Electronic Resources<br/>Web application vulnerabilities : detect, exploit, preventent://SD_ILS/0/SD_ILS:11891052026-04-30T15:56:06Z2026-04-30T15:56:06Zby Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492096">http://www.sciencedirect.com/science/book/9781597492096</a><br/>Format: Electronic Resources<br/>Hacking web apps detecting and preventing web application security problemsent://SD_ILS/0/SD_ILS:10003712026-04-30T15:56:06Z2026-04-30T15:56:06Zby Shema, Mike.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1012529">Click to View</a><br/>Format: Electronic Resources<br/>SQL injection attacks and defenseent://SD_ILS/0/SD_ILS:9972872026-04-30T15:56:06Z2026-04-30T15:56:06Zby Clarke, Justin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=953188">Click to View</a><br/>Format: Electronic Resources<br/>Digital Watermarking Techniques and Trendsent://SD_ILS/0/SD_ILS:4816122026-04-30T15:56:06Z2026-04-30T15:56:06Zby Nematollahi, Mohammad Ali. author.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2095-7">http://dx.doi.org/10.1007/978-981-10-2095-7</a><br/>Format: Electronic Resources<br/>Web application obfuscation -/WAFs..Evasion..Filters//alert (/Obfuscation/)-ent://SD_ILS/0/SD_ILS:1372092026-04-30T15:56:06Z2026-04-30T15:56:06Zby Heiderich, Mario.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496049">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Programmer's ultimate security deskrefent://SD_ILS/0/SD_ILS:11884092026-04-30T15:56:06Z2026-04-30T15:56:06Zby Foster, James C.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781932266726">https://www.sciencedirect.com/science/book/9781932266726</a><br/>Format: Electronic Resources<br/>Microsoft windows security fundamentalsent://SD_ILS/0/SD_ILS:11857032026-04-30T15:56:06Z2026-04-30T15:56:06Zby Clercq, Jan de, 1968-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583408">https://www.sciencedirect.com/science/book/9781555583408</a><br/>Format: Electronic Resources<br/>Open source fuzzing tools.ent://SD_ILS/0/SD_ILS:11864742026-04-30T15:56:06Z2026-04-30T15:56:06Zby Rathaus, Noam.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491952">http://www.sciencedirect.com/science/book/9781597491952</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume Threeent://SD_ILS/0/SD_ILS:4817322026-04-30T15:56:06Z2026-04-30T15:56:06Zby Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3409-1">http://dx.doi.org/10.1007/978-981-10-3409-1</a><br/>Format: Electronic Resources<br/>Information Fusion for Cyber-Security Analyticsent://SD_ILS/0/SD_ILS:4805282026-04-30T15:56:06Z2026-04-30T15:56:06Zby Alsmadi, Izzat M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44257-0">http://dx.doi.org/10.1007/978-3-319-44257-0</a><br/>Format: Electronic Resources<br/>Cyber attacks : protecting national infrastructureent://SD_ILS/0/SD_ILS:11818252026-04-30T15:56:06Z2026-04-30T15:56:06Zby Amoroso, Edward G.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123849175">https://www.sciencedirect.com/science/book/9780123849175</a><br/>Format: Electronic Resources<br/>System assurance : beyond detecting vulnerabilitiesent://SD_ILS/0/SD_ILS:11832662026-04-30T15:56:06Z2026-04-30T15:56:06Zby Mansourov, Nikolai.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123814142">https://www.sciencedirect.com/science/book/9780123814142</a><br/>Format: Electronic Resources<br/>Information security best practices : 205 basic rulesent://SD_ILS/0/SD_ILS:11883182026-04-30T15:56:06Z2026-04-30T15:56:06Zby Stefanek, George L.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781878707963">https://www.sciencedirect.com/science/book/9781878707963</a><br/>Format: Electronic Resources<br/>Practical embedded security : building secure resource-constrained systemsent://SD_ILS/0/SD_ILS:11891682026-04-30T15:56:06Z2026-04-30T15:56:06Zby Stapko, Timothy John.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780750682152">https://www.sciencedirect.com/science/book/9780750682152</a><br/>Format: Electronic Resources<br/>Syngress force emerging threat analysis : from mischief to maliciousent://SD_ILS/0/SD_ILS:11863392026-04-30T15:56:06Z2026-04-30T15:56:06Zby Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">http://www.sciencedirect.com/science/book/9781597490566</a><br/>Format: Electronic Resources<br/>OSSEC host-based intrusion detection guideent://SD_ILS/0/SD_ILS:11896202026-04-30T15:56:06Z2026-04-30T15:56:06Zby Hay, Andrew.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492409">http://www.sciencedirect.com/science/book/9781597492409</a><br/>Format: Electronic Resources<br/>Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 1ent://SD_ILS/0/SD_ILS:4815782026-04-30T15:56:06Z2026-04-30T15:56:06Zby Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1675-2">http://dx.doi.org/10.1007/978-981-10-1675-2</a><br/>Format: Electronic Resources<br/>