Search Results for Computer security. - Narrowed by: 2006 SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092006$0025092006$0026ic$003dtrue$0026ps$003d300?dt=list 2026-04-01T14:11:19Z Information assurance and computer security ent://SD_ILS/0/SD_ILS:938176 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;NATO Advanced Research Workshop on Information Assurance and Computer Security (2005 : T?etouan, Morocco)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=287000">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Essential computer security everyone's guide to e-mail, internet, and wireless security ent://SD_ILS/0/SD_ILS:943350 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Bradley, Tony.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=319200">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Essential computer security : everyone's guide to e-mail, internet, and wireless security ent://SD_ILS/0/SD_ILS:1186419 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Bradley, Tony, 1969-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491143">https://www.sciencedirect.com/science/book/9781597491143</a><br/>Format:&#160;Electronic Resources<br/> Security issues of IT outsourcing ent://SD_ILS/0/SD_ILS:938018 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Gritzalis, Stefanos.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=285536">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Configuring SonicWALL firewalls ent://SD_ILS/0/SD_ILS:1188282 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Bendell, Dan.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492508">http://www.sciencedirect.com/science/book/9781597492508</a><br/>Format:&#160;Electronic Resources<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:1188248 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490214">https://www.sciencedirect.com/science/book/9781597490214</a><br/>Format:&#160;Electronic Resources<br/> Syngress force emerging threat analysis : from mischief to malicious ent://SD_ILS/0/SD_ILS:1186339 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">http://www.sciencedirect.com/science/book/9781597490566</a><br/>Format:&#160;Electronic Resources<br/> Firewall policies and VPN configurations ent://SD_ILS/0/SD_ILS:935986 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Cantrell, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=272100">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasures ent://SD_ILS/0/SD_ILS:939483 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Contos, Brian T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294116">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Configuring SonicWALL firewalls ent://SD_ILS/0/SD_ILS:934073 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Lathem, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=256369">Click to View</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at managing information security ent://SD_ILS/0/SD_ILS:934742 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Osborne, Mark.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=266207">Click to View</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at configuring ISA server 2004 ent://SD_ILS/0/SD_ILS:1188261 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Shinder, Thomas W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490573">http://www.sciencedirect.com/science/book/9781597490573</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at designing security for a Windows Server 2003 network ent://SD_ILS/0/SD_ILS:933856 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Amini, Rob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254832">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing IM and P2P applications for the enterprise ent://SD_ILS/0/SD_ILS:933871 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Piccard, Paul L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254847">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security and embedded systems ent://SD_ILS/0/SD_ILS:934725 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;NATO Advanced Research Workshop on Security and Embedded Systems (2005 August 22-26 : Patrai, Greece)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=265974">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Firewall policies and VPN configurations ent://SD_ILS/0/SD_ILS:1188270 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Henmi, Anne.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490887">https://www.sciencedirect.com/science/book/9781597490887</a><br/>Format:&#160;Electronic Resources<br/> Insider threat : protecting the enterprise from sabotage, spying, and theft ent://SD_ILS/0/SD_ILS:1188259 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Cole, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at designing security for a Windows Server 2003 network ent://SD_ILS/0/SD_ILS:1188281 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Amini, Rob.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492430">https://www.sciencedirect.com/science/book/9781597492430</a><br/>Format:&#160;Electronic Resources<br/> Hack the stack : using snort and ethereal to master the 8 layers of an insecure network ent://SD_ILS/0/SD_ILS:1186427 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Gregg, Michael (Michael C.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">http://www.sciencedirect.com/science/book/9781597491099</a><br/>Format:&#160;Electronic Resources<br/> Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures ent://SD_ILS/0/SD_ILS:1186439 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Contos, Brian T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491297">https://www.sciencedirect.com/science/book/9781597491297</a><br/>Format:&#160;Electronic Resources<br/> Multimedia security technologies for digital rights management ent://SD_ILS/0/SD_ILS:936640 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Zeng, Wenjun, 1967-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=274233">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Combating spyware in the enterprise ent://SD_ILS/0/SD_ILS:936645 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Baskin, Brian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=274289">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Perfect passwords selection, protection, authentication ent://SD_ILS/0/SD_ILS:933875 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Burnett, Mark.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254851">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Secure your network for free : using NMAP, wireshark, snort, nessus, and MRTG ent://SD_ILS/0/SD_ILS:1188278 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Seagren, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491235">http://www.sciencedirect.com/science/book/9781597491235</a><br/>Format:&#160;Electronic Resources<br/> Writing security tools and exploits ent://SD_ILS/0/SD_ILS:1188284 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499972">http://www.sciencedirect.com/science/book/9781597499972</a><br/>Format:&#160;Electronic Resources<br/> Combating spyware in the enterprise ent://SD_ILS/0/SD_ILS:1186355 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Baskin, Brian.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490641">https://www.sciencedirect.com/science/book/9781597490641</a><br/>Format:&#160;Electronic Resources<br/> Multimedia security technologies for digital rights management ent://SD_ILS/0/SD_ILS:1186994 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Zeng, Wenjun, 1967-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123694768">http://www.sciencedirect.com/science/book/9780123694768</a><br/>Format:&#160;Electronic Resources<br/> Syngress IT security project management handbook ent://SD_ILS/0/SD_ILS:934604 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Snedaker, Susan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=261283">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Dictionary of information security ent://SD_ILS/0/SD_ILS:934743 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Slade, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=266208">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Syngress IT security project management handbook ent://SD_ILS/0/SD_ILS:1188265 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Snedaker, Susan.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490764">http://www.sciencedirect.com/science/book/9781597490764</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at managing information security ent://SD_ILS/0/SD_ILS:1186421 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Osborne, Mark.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491105">https://www.sciencedirect.com/science/book/9781597491105</a><br/>Format:&#160;Electronic Resources<br/> BigNum math implementing cryptographic multiple precision arithmetic ent://SD_ILS/0/SD_ILS:934605 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;St. Denis, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=261284">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Designing and building enterprise DMZs ent://SD_ILS/0/SD_ILS:943348 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Flynn, Hal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=319198">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Part-themed issue on internet security ent://SD_ILS/0/SD_ILS:937989 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Yague, Mariemma.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=285507">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Designing and building enterprise DMZs ent://SD_ILS/0/SD_ILS:1188272 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Dubrawsky, Ido.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491006">http://www.sciencedirect.com/science/book/9781597491006</a><br/>Format:&#160;Electronic Resources<br/> Security log management : identifying patterns in the chaos ent://SD_ILS/0/SD_ILS:1188257 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Babbin, Jacob.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490429">http://www.sciencedirect.com/science/book/9781597490429</a><br/>Format:&#160;Electronic Resources<br/> Hukuki a&ccedil;&#305;dan Bilgisayar Programlar&#305;nda 2000 y&#305;l&#305; sorunu ent://SD_ILS/0/SD_ILS:123075 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Y&#305;ld&#305;r&#305;m, Mustafa F.<br/>Format:&#160;Books<br/> Writing security tools and exploits ent://SD_ILS/0/SD_ILS:933874 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Foster, James C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254850">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security for mobile networks and platforms ent://SD_ILS/0/SD_ILS:945204 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Aissi, Selim.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338731">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information security and employee behaviour how to reduce risk through employee education, training and awareness ent://SD_ILS/0/SD_ILS:951869 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;McIlwraith, Angus.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=429792">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyberwar-Netwar security in the information age ent://SD_ILS/0/SD_ILS:935216 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;NATO Advanced Research Workshop on Cyberwar-Netwar: Security in the Information Age (2003 : Lisbon, Portugal)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=267716">Click to View</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at securing a wireless network ent://SD_ILS/0/SD_ILS:936644 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Hurley, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=274288">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Click, click, who's really there? protect your family from online predators, pedophiles, privacy loss, and more ent://SD_ILS/0/SD_ILS:945276 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Koh.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338853">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Fikir ve sanat eserlerinin korunmas&#305; : (protection of intellectual property rights) ent://SD_ILS/0/SD_ILS:123346 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Sert, Selin<br/>Format:&#160;Books<br/> Security log management identifying patterns in the chaos ent://SD_ILS/0/SD_ILS:933857 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Babbin, Jacob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254833">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:933858 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Long, Johnny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254834">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Insider threat protecting the enterprise from sabotage, spying, and theft ent://SD_ILS/0/SD_ILS:933873 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Cole, Eric.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254849">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Bilgisayar a&#287;lar&#305; ve a&#287; g&uuml;venli&#287;i ent://SD_ILS/0/SD_ILS:1162862 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;U&ccedil;an, Osman Nuri, 1960-.<br/>Format:&#160;Books<br/> Trusted platform module basics using TPM in embedded systems ent://SD_ILS/0/SD_ILS:936705 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Kinney, Steven.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=274719">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Understanding Voice over IP security ent://SD_ILS/0/SD_ILS:938142 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Johnston, Alan B.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=286933">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing HP NonStop servers in an open systems world TCP/IP, OSS &amp; SQL ent://SD_ILS/0/SD_ILS:939197 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;XYPRO Technology Corporation.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=291716">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Verification of infinite-state systems with applications to security ent://SD_ILS/0/SD_ILS:934718 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;NATO Advanced Research Workshop on Verification of Infinite-state Systems with Applications to Security (2005 March 17-22 : Tima&#351;oara, Romania)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=265966">Click to View</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at Windows system administration using command line scripts ent://SD_ILS/0/SD_ILS:1186425 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Bhardwaj, Pawan K.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491051">http://www.sciencedirect.com/science/book/9781597491051</a><br/>Format:&#160;Electronic Resources<br/> Trusted platform module basics : using TPM in embedded systems ent://SD_ILS/0/SD_ILS:1185662 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Kinney, Steven.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679602">http://www.sciencedirect.com/science/book/9780750679602</a><br/>Format:&#160;Electronic Resources<br/> Practical VoIP security ent://SD_ILS/0/SD_ILS:1188263 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Porter, Thomas.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490603">https://www.sciencedirect.com/science/book/9781597490603</a><br/>Format:&#160;Electronic Resources<br/> Securing IM and P2P applications for the enterprise ent://SD_ILS/0/SD_ILS:1184263 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Piccard, Paul L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490177">http://www.sciencedirect.com/science/book/9781597490177</a> ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499965">http://www.sciencedirect.com/science/book/9781597499965</a><br/>Format:&#160;Electronic Resources<br/> Securing HP NonStop servers in an open systems world : TCP/IP, OSS &amp; SQL ent://SD_ILS/0/SD_ILS:1188118 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;XYPRO Technology Corporation.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583446">http://www.sciencedirect.com/science/book/9781555583446</a><br/>Format:&#160;Electronic Resources<br/> Winternals defragmentation, recovery, and administration field guide ent://SD_ILS/0/SD_ILS:1188267 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Kleiman, Dave.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490795">https://www.sciencedirect.com/science/book/9781597490795</a><br/>Format:&#160;Electronic Resources<br/> Vesuvius : education, security and prosperity = Educazione, sicurezza e prosperit&agrave; ent://SD_ILS/0/SD_ILS:1187538 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Dobran, F.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780444521040">https://www.sciencedirect.com/science/book/9780444521040</a> ScienceDirect <a href="https://www.sciencedirect.com/science/bookseries/1871644X/8">https://www.sciencedirect.com/science/bookseries/1871644X/8</a> ScienceDirect <a href="https://www.sciencedirect.com/science/publication?issn=1871644X&volume=8">https://www.sciencedirect.com/science/publication?issn=1871644X&volume=8</a><br/>Format:&#160;Electronic Resources<br/> BigNum math : implementing cryptographic multiple precision arithmetic ent://SD_ILS/0/SD_ILS:1188276 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;St. Denis, Tom.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491129">https://www.sciencedirect.com/science/book/9781597491129</a><br/>Format:&#160;Electronic Resources<br/> Perfect passwords : selection, protection, authentication ent://SD_ILS/0/SD_ILS:1188256 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Burnett, Mark.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490412">https://www.sciencedirect.com/science/book/9781597490412</a><br/>Format:&#160;Electronic Resources<br/> Face processing : advanced modeling and methods ent://SD_ILS/0/SD_ILS:1186781 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Zhao, Wenyi.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780120884520">http://www.sciencedirect.com/science/book/9780120884520</a><br/>Format:&#160;Electronic Resources<br/> High-technology crime investigator's handbook : establishing and managing a high-technology crime prevention program ent://SD_ILS/0/SD_ILS:1188003 2026-04-01T14:11:19Z 2026-04-01T14:11:19Z by&#160;Kovacich, Gerald L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679299">http://www.sciencedirect.com/science/book/9780750679299</a><br/>Format:&#160;Electronic Resources<br/>