Search Results for Computer security -- Software. - Narrowed by: 2017 SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity$002b--$002bSoftware.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092017$0025092017$0026ps$003d300?dt=list 2026-04-09T19:54:46Z OAuth 2.0 cookbook : protect your web applications using Spring Security ent://SD_ILS/0/SD_ILS:1130709 2026-04-09T19:54:46Z 2026-04-09T19:54:46Z by&#160;Nascimento, Adolfo Eloy, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5110692">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hard and Soft Computing for Artificial Intelligence, Multimedia and Security ent://SD_ILS/0/SD_ILS:480786 2026-04-09T19:54:46Z 2026-04-09T19:54:46Z by&#160;Kobayashi, Shin-ya. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-48429-7">http://dx.doi.org/10.1007/978-3-319-48429-7</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Computer Networking ent://SD_ILS/0/SD_ILS:481082 2026-04-09T19:54:46Z 2026-04-09T19:54:46Z by&#160;Robertazzi, Thomas G. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-53103-8">http://dx.doi.org/10.1007/978-3-319-53103-8</a><br/>Format:&#160;Electronic Resources<br/> Europe and MENA Cooperation Advances in Information and Communication Technologies ent://SD_ILS/0/SD_ILS:480679 2026-04-09T19:54:46Z 2026-04-09T19:54:46Z by&#160;Rocha, &Aacute;lvaro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46568-5">http://dx.doi.org/10.1007/978-3-319-46568-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Computer and Computational Sciences Proceedings of ICCCCS 2016, Volume 1 ent://SD_ILS/0/SD_ILS:481761 2026-04-09T19:54:46Z 2026-04-09T19:54:46Z by&#160;Bhatia, Sanjiv K. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3770-2">http://dx.doi.org/10.1007/978-981-10-3770-2</a><br/>Format:&#160;Electronic Resources<br/> Recent Advances in Information Systems and Technologies Volume 1 ent://SD_ILS/0/SD_ILS:481296 2026-04-09T19:54:46Z 2026-04-09T19:54:46Z by&#160;Rocha, &Aacute;lvaro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-56535-4">http://dx.doi.org/10.1007/978-3-319-56535-4</a><br/>Format:&#160;Electronic Resources<br/> Recent Advances in Information Systems and Technologies Volume 2 ent://SD_ILS/0/SD_ILS:481297 2026-04-09T19:54:46Z 2026-04-09T19:54:46Z by&#160;Rocha, &Aacute;lvaro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-56538-5">http://dx.doi.org/10.1007/978-3-319-56538-5</a><br/>Format:&#160;Electronic Resources<br/> Recent Advances in Information Systems and Technologies Volume 3 ent://SD_ILS/0/SD_ILS:481298 2026-04-09T19:54:46Z 2026-04-09T19:54:46Z by&#160;Rocha, &Aacute;lvaro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-56541-5">http://dx.doi.org/10.1007/978-3-319-56541-5</a><br/>Format:&#160;Electronic Resources<br/> Assessing Security Architectures to Protect Against Malware in Embedded Narrow Artificial Intelligence Robots ent://SD_ILS/0/SD_ILS:687423 2026-04-09T19:54:46Z 2026-04-09T19:54:46Z by&#160;Sylvertooth, Randall Earl, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10902464">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10902464</a><br/>Format:&#160;Books<br/>