Search Results for Computer security. - Narrowed by: 2001SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092001$0025092001$0026ps$003d300?dt=list2026-04-03T23:15:14ZHack proofing Windows 2000ent://SD_ILS/0/SD_ILS:9395012026-04-03T23:15:14Z2026-04-03T23:15:14Zby Todd, Chad.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294154">Click to View</a><br/>Format: Electronic Resources<br/>Hack proofing Sun Solaris 8ent://SD_ILS/0/SD_ILS:11884852026-04-03T23:15:14Z2026-04-03T23:15:14Zby Miles, Wyman.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994442">http://www.sciencedirect.com/science/book/9781928994442</a><br/>Format: Electronic Resources<br/>Hack proofing your Web applicationsent://SD_ILS/0/SD_ILS:11883432026-04-03T23:15:14Z2026-04-03T23:15:14Zby Traxler, Julie.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994312">https://www.sciencedirect.com/science/book/9781928994312</a><br/>Format: Electronic Resources<br/>Hack proofing Windows 2000ent://SD_ILS/0/SD_ILS:11883812026-04-03T23:15:14Z2026-04-03T23:15:14Zby Todd, Chad.<br/><a href="http://www.sciencedirect.com/science/book/9781931836494">Available from ScienceDirect. Online version available for university members only. This requires an institutional login off-campus</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836494">https://www.sciencedirect.com/science/book/9781931836494</a><br/>Format: Electronic Resources<br/>Configuring ISA server 2000 building firewalls for windows 2000ent://SD_ILS/0/SD_ILS:9394602026-04-03T23:15:14Z2026-04-03T23:15:14Zby Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294054">Click to View</a><br/>Format: Electronic Resources<br/>Hack proofing Sun Solaris 8ent://SD_ILS/0/SD_ILS:9395002026-04-03T23:15:14Z2026-04-03T23:15:14Zby Vincent, Thomas.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294153">Click to View</a><br/>Format: Electronic Resources<br/>Hack proofing Linux: a guide to open source security the only way to stop a hacker is to think like oneent://SD_ILS/0/SD_ILS:9394992026-04-03T23:15:14Z2026-04-03T23:15:14Zby Stanger, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294152">Click to View</a><br/>Format: Electronic Resources<br/>Hack proofing Linux : a guide to open source securityent://SD_ILS/0/SD_ILS:11884842026-04-03T23:15:14Z2026-04-03T23:15:14Zby Stanger, James.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994343">http://www.sciencedirect.com/science/book/9781928994343</a><br/>Format: Electronic Resources<br/>Hack proofing your Web applications the only way to stop a hacker is to think like oneent://SD_ILS/0/SD_ILS:9395052026-04-03T23:15:14Z2026-04-03T23:15:14Zby Forristal, Jeff.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294159">Click to View</a><br/>Format: Electronic Resources<br/>Siber istihbarat : sanal ve dijital casusuluğun anatomisient://SD_ILS/0/SD_ILS:11975812026-04-03T23:15:14Z2026-04-03T23:15:14Zby Ersanel, Nedret.<br/>Format: Books<br/>Hukuki açıdan Bilgisayar Programlarında 2000 yılı sorunuent://SD_ILS/0/SD_ILS:1230752026-04-03T23:15:14Z2026-04-03T23:15:14Zby Yıldırım, Mustafa F.<br/>Format: Books<br/>A technical guide to IPSec virtual private networksent://SD_ILS/0/SD_ILS:10476252026-04-03T23:15:14Z2026-04-03T23:15:14Zby Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2010400">Click to View</a><br/>Format: Electronic Resources<br/>Hack proofing your wireless networkent://SD_ILS/0/SD_ILS:9395072026-04-03T23:15:14Z2026-04-03T23:15:14Zby Owens, Les.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294161">Click to View</a><br/>Format: Electronic Resources<br/>Hack proofing your e-commerce site the only way to stop a hacker is to think like oneent://SD_ILS/0/SD_ILS:9395032026-04-03T23:15:14Z2026-04-03T23:15:14Zby Russell, Ryan, 1969-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294156">Click to View</a><br/>Format: Electronic Resources<br/>Hack proofing your e-commerce site : the only way to stop a hacker is to think like one].ent://SD_ILS/0/SD_ILS:11883422026-04-03T23:15:14Z2026-04-03T23:15:14Zby Russell, Ryan.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994275">http://www.sciencedirect.com/science/book/9781928994275</a><br/>Format: Electronic Resources<br/>Advances in computers. Volume 55ent://SD_ILS/0/SD_ILS:11904652026-04-03T23:15:14Z2026-04-03T23:15:14Zby Zelkowitz, Marvin V., 1945-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780120121557">https://www.sciencedirect.com/science/book/9780120121557</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/bookseries/00652458/55">https://www.sciencedirect.com/science/bookseries/00652458/55</a><br/>Format: Electronic Resources<br/>