Search Results for Computer security. - Narrowed by: 1999 SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025091999$0025091999$0026ic$003dtrue$0026ps$003d300? 2026-01-22T15:31:52Z Terminal compromise ent://SD_ILS/0/SD_ILS:136305 2026-01-22T15:31:52Z 2026-01-22T15:31:52Z by&#160;Schwartau, Winn.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2009627">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2009627</a><br/>Format:&#160;Electronic Resources<br/> Trust in cyberspace ent://SD_ILS/0/SD_ILS:1085960 2026-01-22T15:31:52Z 2026-01-22T15:31:52Z by&#160;Schneider, Fred B.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3378820">Click to View</a><br/>Format:&#160;Electronic Resources<br/> E-com : elektronik ticaretle gelen m&uuml;thi&#351; de&#287;i&#351;&#305;m : e-business uygulamalar&#305; i&#351; d&uuml;nyas&#305;nda neleri de&#287;i&#351;tirecek? ent://SD_ILS/0/SD_ILS:677704 2026-01-22T15:31:52Z 2026-01-22T15:31:52Z by&#160;IBM.<br/>Format:&#160;Books<br/> VLSI implementation of public key cryptography algorithms ent://SD_ILS/0/SD_ILS:683881 2026-01-22T15:31:52Z 2026-01-22T15:31:52Z by&#160;Keshavarzi, Parviz, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10836298">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10836298</a><br/>Format:&#160;Books<br/>