Search Results for Computer security -- Software. - Narrowed by: 2017SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity$002b--$002bSoftware.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092017$0025092017$0026ps$003d300?dt=list2026-04-09T19:54:46ZOAuth 2.0 cookbook : protect your web applications using Spring Securityent://SD_ILS/0/SD_ILS:11307092026-04-09T19:54:46Z2026-04-09T19:54:46Zby Nascimento, Adolfo Eloy, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5110692">Click to View</a><br/>Format: Electronic Resources<br/>Hard and Soft Computing for Artificial Intelligence, Multimedia and Securityent://SD_ILS/0/SD_ILS:4807862026-04-09T19:54:46Z2026-04-09T19:54:46Zby Kobayashi, Shin-ya. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-48429-7">http://dx.doi.org/10.1007/978-3-319-48429-7</a><br/>Format: Electronic Resources<br/>Introduction to Computer Networkingent://SD_ILS/0/SD_ILS:4810822026-04-09T19:54:46Z2026-04-09T19:54:46Zby Robertazzi, Thomas G. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-53103-8">http://dx.doi.org/10.1007/978-3-319-53103-8</a><br/>Format: Electronic Resources<br/>Europe and MENA Cooperation Advances in Information and Communication Technologiesent://SD_ILS/0/SD_ILS:4806792026-04-09T19:54:46Z2026-04-09T19:54:46Zby Rocha, Álvaro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46568-5">http://dx.doi.org/10.1007/978-3-319-46568-5</a><br/>Format: Electronic Resources<br/>Advances in Computer and Computational Sciences Proceedings of ICCCCS 2016, Volume 1ent://SD_ILS/0/SD_ILS:4817612026-04-09T19:54:46Z2026-04-09T19:54:46Zby Bhatia, Sanjiv K. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3770-2">http://dx.doi.org/10.1007/978-981-10-3770-2</a><br/>Format: Electronic Resources<br/>Recent Advances in Information Systems and Technologies Volume 1ent://SD_ILS/0/SD_ILS:4812962026-04-09T19:54:46Z2026-04-09T19:54:46Zby Rocha, Álvaro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-56535-4">http://dx.doi.org/10.1007/978-3-319-56535-4</a><br/>Format: Electronic Resources<br/>Recent Advances in Information Systems and Technologies Volume 2ent://SD_ILS/0/SD_ILS:4812972026-04-09T19:54:46Z2026-04-09T19:54:46Zby Rocha, Álvaro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-56538-5">http://dx.doi.org/10.1007/978-3-319-56538-5</a><br/>Format: Electronic Resources<br/>Recent Advances in Information Systems and Technologies Volume 3ent://SD_ILS/0/SD_ILS:4812982026-04-09T19:54:46Z2026-04-09T19:54:46Zby Rocha, Álvaro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-56541-5">http://dx.doi.org/10.1007/978-3-319-56541-5</a><br/>Format: Electronic Resources<br/>Assessing Security Architectures to Protect Against Malware in Embedded Narrow Artificial Intelligence Robotsent://SD_ILS/0/SD_ILS:6874232026-04-09T19:54:46Z2026-04-09T19:54:46Zby Sylvertooth, Randall Earl, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10902464">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10902464</a><br/>Format: Books<br/>