Search Results for Computer security -- Software.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity$002b--$002bSoftware.$0026ps$003d300?dt=list2026-04-10T15:38:40ZLearning Nessus for penetration testing.ent://SD_ILS/0/SD_ILS:10235072026-04-10T15:38:40Z2026-04-10T15:38:40Zby Kumar, Himanshu.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572937">Click to View</a><br/>Format: Electronic Resources<br/>Secure your network for free : using NMAP, wireshark, snort, nessus, and MRTGent://SD_ILS/0/SD_ILS:11882782026-04-10T15:38:40Z2026-04-10T15:38:40Zby Seagren, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491235">http://www.sciencedirect.com/science/book/9781597491235</a><br/>Format: Electronic Resources<br/>Yazılım güvenliği saldırı ve savunmaent://SD_ILS/0/SD_ILS:2915692026-04-10T15:38:40Z2026-04-10T15:38:40Zby Demir, Bünyamin<br/>Format: Books<br/>OAuth 2.0 cookbook : protect your web applications using Spring Securityent://SD_ILS/0/SD_ILS:11307092026-04-10T15:38:40Z2026-04-10T15:38:40Zby Nascimento, Adolfo Eloy, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5110692">Click to View</a><br/>Format: Electronic Resources<br/>Learning Puppet Security : secure your IT environments with the powerful secuity tools of Puppetent://SD_ILS/0/SD_ILS:10469622026-04-10T15:38:40Z2026-04-10T15:38:40Zby Slagle, Jason, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2000943">Click to View</a><br/>Format: Electronic Resources<br/>Nokia firewall, VPN, and IPSO configuration guideent://SD_ILS/0/SD_ILS:11918152026-04-10T15:38:40Z2026-04-10T15:38:40Zby Hay, Andrew, 1973-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492867">https://www.sciencedirect.com/science/book/9781597492867</a><br/>Format: Electronic Resources<br/>pfSense 2 cookbook a practical, example-driven guide to configure even the most advanced features of pfSense 2ent://SD_ILS/0/SD_ILS:9970272026-04-10T15:38:40Z2026-04-10T15:38:40Zby Williamson, Matt.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=950585">Click to View</a><br/>Format: Electronic Resources<br/>Careers for tech girls in computer scienceent://SD_ILS/0/SD_ILS:11429762026-04-10T15:38:40Z2026-04-10T15:38:40Zby Niver, Heather Moore, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5547843">Click to View</a><br/>Format: Electronic Resources<br/>Hard and Soft Computing for Artificial Intelligence, Multimedia and Securityent://SD_ILS/0/SD_ILS:4807862026-04-10T15:38:40Z2026-04-10T15:38:40Zby Kobayashi, Shin-ya. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-48429-7">http://dx.doi.org/10.1007/978-3-319-48429-7</a><br/>Format: Electronic Resources<br/>Introduction to Computer Networkingent://SD_ILS/0/SD_ILS:4810822026-04-10T15:38:40Z2026-04-10T15:38:40Zby Robertazzi, Thomas G. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-53103-8">http://dx.doi.org/10.1007/978-3-319-53103-8</a><br/>Format: Electronic Resources<br/>Administrative assistant's and secretary's handbookent://SD_ILS/0/SD_ILS:9532282026-04-10T15:38:40Z2026-04-10T15:38:40Zby Stroman, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=434976">Click to View</a><br/>Format: Electronic Resources<br/>Advances in Computer and Computational Sciences Proceedings of ICCCCS 2016, Volume 1ent://SD_ILS/0/SD_ILS:4817612026-04-10T15:38:40Z2026-04-10T15:38:40Zby Bhatia, Sanjiv K. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3770-2">http://dx.doi.org/10.1007/978-981-10-3770-2</a><br/>Format: Electronic Resources<br/>Europe and MENA Cooperation Advances in Information and Communication Technologiesent://SD_ILS/0/SD_ILS:4806792026-04-10T15:38:40Z2026-04-10T15:38:40Zby Rocha, Álvaro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46568-5">http://dx.doi.org/10.1007/978-3-319-46568-5</a><br/>Format: Electronic Resources<br/>Advances in computers. Volume 79ent://SD_ILS/0/SD_ILS:11756682026-04-10T15:38:40Z2026-04-10T15:38:40Zby Zelkowitz, Marvin V., 1945-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123810274">https://www.sciencedirect.com/science/book/9780123810274</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/bookseries/00652458/79">https://www.sciencedirect.com/science/bookseries/00652458/79</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/issue/25777-2010-999209999-1783761">https://www.sciencedirect.com/science/issue/25777-2010-999209999-1783761</a><br/>Format: Electronic Resources<br/>Digital video surveillance and securityent://SD_ILS/0/SD_ILS:11775002026-04-10T15:38:40Z2026-04-10T15:38:40Zby Caputo, Anthony C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781856177474">http://www.sciencedirect.com/science/book/9781856177474</a><br/>Format: Electronic Resources<br/>Software piracy exposedent://SD_ILS/0/SD_ILS:11884172026-04-10T15:38:40Z2026-04-10T15:38:40Zby Craig, Paul.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781932266986">https://www.sciencedirect.com/science/book/9781932266986</a><br/>Format: Electronic Resources<br/>Highly dependable softwareent://SD_ILS/0/SD_ILS:11867212026-04-10T15:38:40Z2026-04-10T15:38:40Zby Zelkowitz, Marvin V., 1945-<br/><a href="http://www.sciencedirect.com/science/bookseries/00652458/58">to access electronic resource</a>
ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780120121588">http://www.sciencedirect.com/science/book/9780120121588</a><br/>Format: Electronic Resources<br/>Private and Trustworthy Computation Using Additive Cryptographic Primitivesent://SD_ILS/0/SD_ILS:6780552026-04-10T15:38:40Z2026-04-10T15:38:40Zby Tsoutsos, Nektarios Georgios, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10642986">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10642986</a><br/>Format: Books<br/>Malware Detection and Cyber Security via Compressionent://SD_ILS/0/SD_ILS:6806592026-04-10T15:38:40Z2026-04-10T15:38:40Zby Raff, Edward, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10811037">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10811037</a><br/>Format: Books<br/>Implementation of Computational Resources Focusing on Forecast Model Access for Universitiesent://SD_ILS/0/SD_ILS:6934552026-04-10T15:38:40Z2026-04-10T15:38:40Zby See, Timothy W., Jr., author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10817428">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10817428</a><br/>Format: Books<br/>Recent Advances in Information Systems and Technologies Volume 1ent://SD_ILS/0/SD_ILS:4812962026-04-10T15:38:40Z2026-04-10T15:38:40Zby Rocha, Álvaro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-56535-4">http://dx.doi.org/10.1007/978-3-319-56535-4</a><br/>Format: Electronic Resources<br/>Recent Advances in Information Systems and Technologies Volume 2ent://SD_ILS/0/SD_ILS:4812972026-04-10T15:38:40Z2026-04-10T15:38:40Zby Rocha, Álvaro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-56538-5">http://dx.doi.org/10.1007/978-3-319-56538-5</a><br/>Format: Electronic Resources<br/>Recent Advances in Information Systems and Technologies Volume 3ent://SD_ILS/0/SD_ILS:4812982026-04-10T15:38:40Z2026-04-10T15:38:40Zby Rocha, Álvaro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-56541-5">http://dx.doi.org/10.1007/978-3-319-56541-5</a><br/>Format: Electronic Resources<br/>Assessing Security Architectures to Protect Against Malware in Embedded Narrow Artificial Intelligence Robotsent://SD_ILS/0/SD_ILS:6874232026-04-10T15:38:40Z2026-04-10T15:38:40Zby Sylvertooth, Randall Earl, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10902464">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10902464</a><br/>Format: Books<br/>Information technology security fundamentalsent://SD_ILS/0/SD_ILS:11026972026-04-10T15:38:40Z2026-04-10T15:38:40Zby Sagers, Glen., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4009415">Click to View</a><br/>Format: Electronic Resources<br/>Principles of computer system design : an introductionent://SD_ILS/0/SD_ILS:11928182026-04-10T15:38:40Z2026-04-10T15:38:40Zby Saltzer, J. H., 1939-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123749574">https://www.sciencedirect.com/science/book/9780123749574</a><br/>Format: Electronic Resources<br/>Advances in computers. Vol. 74, Software development.ent://SD_ILS/0/SD_ILS:11894542026-04-10T15:38:40Z2026-04-10T15:38:40Zby Zelkowitz, Marvin V., 1945-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123744265">https://www.sciencedirect.com/science/book/9780123744265</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/bookseries/00652458/74">https://www.sciencedirect.com/science/bookseries/00652458/74</a><br/>Format: Electronic Resources<br/>Techno security's guide to e-discovery and digital forensicsent://SD_ILS/0/SD_ILS:11891132026-04-10T15:38:40Z2026-04-10T15:38:40Zby Wiles, Jack.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492232">http://www.sciencedirect.com/science/book/9781597492232</a><br/>Format: Electronic Resources<br/>Essential computer security : everyone's guide to e-mail, internet, and wireless securityent://SD_ILS/0/SD_ILS:11864192026-04-10T15:38:40Z2026-04-10T15:38:40Zby Bradley, Tony, 1969-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491143">https://www.sciencedirect.com/science/book/9781597491143</a><br/>Format: Electronic Resources<br/>Best damn Windows server 2003 book periodent://SD_ILS/0/SD_ILS:11883702026-04-10T15:38:40Z2026-04-10T15:38:40Zby Snedaker, Susan.<br/>MacEwan University Access <a href="http://www.sciencedirect.com/science/book/9781931836128">(Unlimited Concurrent Users)</a> from ScienceDirect
ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836128">https://www.sciencedirect.com/science/book/9781931836128</a><br/>Format: Electronic Resources<br/>Information securityent://SD_ILS/0/SD_ILS:11853992026-04-10T15:38:40Z2026-04-10T15:38:40Zby Zelkowitz, Marvin V., 1945-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780120121601">https://www.sciencedirect.com/science/book/9780120121601</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/bookseries/00652458/60">https://www.sciencedirect.com/science/bookseries/00652458/60</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/publication?issn=00652458&volume=60">https://www.sciencedirect.com/science/publication?issn=00652458&volume=60</a><br/>Format: Electronic Resources<br/>Architectural issuesent://SD_ILS/0/SD_ILS:11867222026-04-10T15:38:40Z2026-04-10T15:38:40Zby Zelkowitz, Marvin V., 1945-<br/><a href="http://www.sciencedirect.com/science/bookseries/00652458/61">to access electronic resource</a>
ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780120121618">http://www.sciencedirect.com/science/book/9780120121618</a><br/>Format: Electronic Resources<br/>OS X exploits and defenseent://SD_ILS/0/SD_ILS:11897052026-04-10T15:38:40Z2026-04-10T15:38:40Zby Baccas, Paul.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492546">http://www.sciencedirect.com/science/book/9781597492546</a><br/>Format: Electronic Resources<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:11864602026-04-10T15:38:40Z2026-04-10T15:38:40Zby Winkler, Ira.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491686">https://www.sciencedirect.com/science/book/9781597491686</a><br/>Format: Electronic Resources<br/>Virtual machines : versatile platforms for systems and processesent://SD_ILS/0/SD_ILS:11852812026-04-10T15:38:40Z2026-04-10T15:38:40Zby Smith, James E. (James Edward), 1950-<br/>MacEwan University Access <a href="http://www.sciencedirect.com/science/book/9781558609105">(Unlimited Concurrent Users)</a> from ScienceDirect
ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781558609105">https://www.sciencedirect.com/science/book/9781558609105</a><br/>Format: Electronic Resources<br/>No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfingent://SD_ILS/0/SD_ILS:11896352026-04-10T15:38:40Z2026-04-10T15:38:40Zby Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492157">https://www.sciencedirect.com/science/book/9781597492157</a><br/>Format: Electronic Resources<br/>The history of information security : a comprehensive handbookent://SD_ILS/0/SD_ILS:11865232026-04-10T15:38:40Z2026-04-10T15:38:40Zby Leeuw, Karl de.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444516084">http://www.sciencedirect.com/science/book/9780444516084</a><br/>Format: Electronic Resources<br/>Encyclopedia of information systemsent://SD_ILS/0/SD_ILS:11888882026-04-10T15:38:40Z2026-04-10T15:38:40Zby Bidgoli, Hossein.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/referenceworks/9780122272400">http://www.sciencedirect.com/science/referenceworks/9780122272400</a><br/>Format: Electronic Resources<br/>