Search Results for Computer engineering. - Narrowed by: Computer security.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bengineering.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300?dt=list2026-03-29T11:13:42ZInnovations in Computer Science and Engineering Proceedings of the Fourth ICICSE 2016ent://SD_ILS/0/SD_ILS:4817642026-03-29T11:13:42Z2026-03-29T11:13:42Zby Saini, H. S. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3818-1">http://dx.doi.org/10.1007/978-981-10-3818-1</a><br/>Format: Electronic Resources<br/>Security Challenges and Approaches in Internet of Thingsent://SD_ILS/0/SD_ILS:4805242026-03-29T11:13:42Z2026-03-29T11:13:42Zby Misra, Sridipta. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44230-3">http://dx.doi.org/10.1007/978-3-319-44230-3</a><br/>Format: Electronic Resources<br/>Safety management for software-based equipmentent://SD_ILS/0/SD_ILS:10134392026-03-29T11:13:42Z2026-03-29T11:13:42Zby Boulanger, Jean-Louis.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1187169">Click to View</a><br/>Format: Electronic Resources<br/>Hack proofing your Web applicationsent://SD_ILS/0/SD_ILS:11883432026-03-29T11:13:42Z2026-03-29T11:13:42Zby Traxler, Julie.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994312">https://www.sciencedirect.com/science/book/9781928994312</a><br/>Format: Electronic Resources<br/>Proceedings of the First International Conference on Intelligent Computing and Communicationent://SD_ILS/0/SD_ILS:4816062026-03-29T11:13:42Z2026-03-29T11:13:42Zby Mandal, Jyotsna Kumar. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2035-3">http://dx.doi.org/10.1007/978-981-10-2035-3</a><br/>Format: Electronic Resources<br/>Smart Grids: Security and Privacy Issuesent://SD_ILS/0/SD_ILS:4805722026-03-29T11:13:42Z2026-03-29T11:13:42Zby Boroojeni, Kianoosh G. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45050-6">http://dx.doi.org/10.1007/978-3-319-45050-6</a><br/>Format: Electronic Resources<br/>Seven deadliest USB attacksent://SD_ILS/0/SD_ILS:11780202026-03-29T11:13:42Z2026-03-29T11:13:42Zby Anderson, Brian (Brian James)<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495530">https://www.sciencedirect.com/science/book/9781597495530</a><br/>Format: Electronic Resources<br/>No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfingent://SD_ILS/0/SD_ILS:11896352026-03-29T11:13:42Z2026-03-29T11:13:42Zby Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492157">https://www.sciencedirect.com/science/book/9781597492157</a><br/>Format: Electronic Resources<br/>Techno Security's guide to managing risks : for IT managers, auditors, and investigatorsent://SD_ILS/0/SD_ILS:11882802026-03-29T11:13:42Z2026-03-29T11:13:42Zby Wiles, Jack.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">http://www.sciencedirect.com/science/book/9781597491389</a><br/>Format: Electronic Resources<br/>Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 1ent://SD_ILS/0/SD_ILS:4815782026-03-29T11:13:42Z2026-03-29T11:13:42Zby Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1675-2">http://dx.doi.org/10.1007/978-981-10-1675-2</a><br/>Format: Electronic Resources<br/>Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 2ent://SD_ILS/0/SD_ILS:4815792026-03-29T11:13:42Z2026-03-29T11:13:42Zby Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1678-3">http://dx.doi.org/10.1007/978-981-10-1678-3</a><br/>Format: Electronic Resources<br/>