Search Results for Computer security. - Narrowed by: 2006SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092006$0025092006$0026ic$003dtrue$0026ps$003d300?dt=list2026-04-01T14:11:19ZInformation assurance and computer securityent://SD_ILS/0/SD_ILS:9381762026-04-01T14:11:19Z2026-04-01T14:11:19Zby NATO Advanced Research Workshop on Information Assurance and Computer Security (2005 : T?etouan, Morocco)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=287000">Click to View</a><br/>Format: Electronic Resources<br/>Essential computer security everyone's guide to e-mail, internet, and wireless securityent://SD_ILS/0/SD_ILS:9433502026-04-01T14:11:19Z2026-04-01T14:11:19Zby Bradley, Tony.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=319200">Click to View</a><br/>Format: Electronic Resources<br/>Essential computer security : everyone's guide to e-mail, internet, and wireless securityent://SD_ILS/0/SD_ILS:11864192026-04-01T14:11:19Z2026-04-01T14:11:19Zby Bradley, Tony, 1969-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491143">https://www.sciencedirect.com/science/book/9781597491143</a><br/>Format: Electronic Resources<br/>Security issues of IT outsourcingent://SD_ILS/0/SD_ILS:9380182026-04-01T14:11:19Z2026-04-01T14:11:19Zby Gritzalis, Stefanos.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=285536">Click to View</a><br/>Format: Electronic Resources<br/>Configuring SonicWALL firewallsent://SD_ILS/0/SD_ILS:11882822026-04-01T14:11:19Z2026-04-01T14:11:19Zby Bendell, Dan.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492508">http://www.sciencedirect.com/science/book/9781597492508</a><br/>Format: Electronic Resources<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:11882482026-04-01T14:11:19Z2026-04-01T14:11:19Zby Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490214">https://www.sciencedirect.com/science/book/9781597490214</a><br/>Format: Electronic Resources<br/>Syngress force emerging threat analysis : from mischief to maliciousent://SD_ILS/0/SD_ILS:11863392026-04-01T14:11:19Z2026-04-01T14:11:19Zby Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">http://www.sciencedirect.com/science/book/9781597490566</a><br/>Format: Electronic Resources<br/>Firewall policies and VPN configurationsent://SD_ILS/0/SD_ILS:9359862026-04-01T14:11:19Z2026-04-01T14:11:19Zby Cantrell, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=272100">Click to View</a><br/>Format: Electronic Resources<br/>Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasuresent://SD_ILS/0/SD_ILS:9394832026-04-01T14:11:19Z2026-04-01T14:11:19Zby Contos, Brian T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294116">Click to View</a><br/>Format: Electronic Resources<br/>Configuring SonicWALL firewallsent://SD_ILS/0/SD_ILS:9340732026-04-01T14:11:19Z2026-04-01T14:11:19Zby Lathem, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=256369">Click to View</a><br/>Format: Electronic Resources<br/>How to cheat at managing information securityent://SD_ILS/0/SD_ILS:9347422026-04-01T14:11:19Z2026-04-01T14:11:19Zby Osborne, Mark.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=266207">Click to View</a><br/>Format: Electronic Resources<br/>How to cheat at configuring ISA server 2004ent://SD_ILS/0/SD_ILS:11882612026-04-01T14:11:19Z2026-04-01T14:11:19Zby Shinder, Thomas W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490573">http://www.sciencedirect.com/science/book/9781597490573</a><br/>Format: Electronic Resources<br/>How to cheat at designing security for a Windows Server 2003 networkent://SD_ILS/0/SD_ILS:9338562026-04-01T14:11:19Z2026-04-01T14:11:19Zby Amini, Rob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254832">Click to View</a><br/>Format: Electronic Resources<br/>Securing IM and P2P applications for the enterpriseent://SD_ILS/0/SD_ILS:9338712026-04-01T14:11:19Z2026-04-01T14:11:19Zby Piccard, Paul L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254847">Click to View</a><br/>Format: Electronic Resources<br/>Security and embedded systemsent://SD_ILS/0/SD_ILS:9347252026-04-01T14:11:19Z2026-04-01T14:11:19Zby NATO Advanced Research Workshop on Security and Embedded Systems (2005 August 22-26 : Patrai, Greece)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=265974">Click to View</a><br/>Format: Electronic Resources<br/>Firewall policies and VPN configurationsent://SD_ILS/0/SD_ILS:11882702026-04-01T14:11:19Z2026-04-01T14:11:19Zby Henmi, Anne.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490887">https://www.sciencedirect.com/science/book/9781597490887</a><br/>Format: Electronic Resources<br/>Insider threat : protecting the enterprise from sabotage, spying, and theftent://SD_ILS/0/SD_ILS:11882592026-04-01T14:11:19Z2026-04-01T14:11:19Zby Cole, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format: Electronic Resources<br/>How to cheat at designing security for a Windows Server 2003 networkent://SD_ILS/0/SD_ILS:11882812026-04-01T14:11:19Z2026-04-01T14:11:19Zby Amini, Rob.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492430">https://www.sciencedirect.com/science/book/9781597492430</a><br/>Format: Electronic Resources<br/>Hack the stack : using snort and ethereal to master the 8 layers of an insecure networkent://SD_ILS/0/SD_ILS:11864272026-04-01T14:11:19Z2026-04-01T14:11:19Zby Gregg, Michael (Michael C.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">http://www.sciencedirect.com/science/book/9781597491099</a><br/>Format: Electronic Resources<br/>Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasuresent://SD_ILS/0/SD_ILS:11864392026-04-01T14:11:19Z2026-04-01T14:11:19Zby Contos, Brian T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491297">https://www.sciencedirect.com/science/book/9781597491297</a><br/>Format: Electronic Resources<br/>Multimedia security technologies for digital rights managementent://SD_ILS/0/SD_ILS:9366402026-04-01T14:11:19Z2026-04-01T14:11:19Zby Zeng, Wenjun, 1967-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=274233">Click to View</a><br/>Format: Electronic Resources<br/>Combating spyware in the enterpriseent://SD_ILS/0/SD_ILS:9366452026-04-01T14:11:19Z2026-04-01T14:11:19Zby Baskin, Brian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=274289">Click to View</a><br/>Format: Electronic Resources<br/>Perfect passwords selection, protection, authenticationent://SD_ILS/0/SD_ILS:9338752026-04-01T14:11:19Z2026-04-01T14:11:19Zby Burnett, Mark.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254851">Click to View</a><br/>Format: Electronic Resources<br/>Secure your network for free : using NMAP, wireshark, snort, nessus, and MRTGent://SD_ILS/0/SD_ILS:11882782026-04-01T14:11:19Z2026-04-01T14:11:19Zby Seagren, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491235">http://www.sciencedirect.com/science/book/9781597491235</a><br/>Format: Electronic Resources<br/>Writing security tools and exploitsent://SD_ILS/0/SD_ILS:11882842026-04-01T14:11:19Z2026-04-01T14:11:19Zby Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499972">http://www.sciencedirect.com/science/book/9781597499972</a><br/>Format: Electronic Resources<br/>Combating spyware in the enterpriseent://SD_ILS/0/SD_ILS:11863552026-04-01T14:11:19Z2026-04-01T14:11:19Zby Baskin, Brian.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490641">https://www.sciencedirect.com/science/book/9781597490641</a><br/>Format: Electronic Resources<br/>Multimedia security technologies for digital rights managementent://SD_ILS/0/SD_ILS:11869942026-04-01T14:11:19Z2026-04-01T14:11:19Zby Zeng, Wenjun, 1967-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123694768">http://www.sciencedirect.com/science/book/9780123694768</a><br/>Format: Electronic Resources<br/>Syngress IT security project management handbookent://SD_ILS/0/SD_ILS:9346042026-04-01T14:11:19Z2026-04-01T14:11:19Zby Snedaker, Susan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=261283">Click to View</a><br/>Format: Electronic Resources<br/>Dictionary of information securityent://SD_ILS/0/SD_ILS:9347432026-04-01T14:11:19Z2026-04-01T14:11:19Zby Slade, Robert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=266208">Click to View</a><br/>Format: Electronic Resources<br/>Syngress IT security project management handbookent://SD_ILS/0/SD_ILS:11882652026-04-01T14:11:19Z2026-04-01T14:11:19Zby Snedaker, Susan.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490764">http://www.sciencedirect.com/science/book/9781597490764</a><br/>Format: Electronic Resources<br/>How to cheat at managing information securityent://SD_ILS/0/SD_ILS:11864212026-04-01T14:11:19Z2026-04-01T14:11:19Zby Osborne, Mark.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491105">https://www.sciencedirect.com/science/book/9781597491105</a><br/>Format: Electronic Resources<br/>BigNum math implementing cryptographic multiple precision arithmeticent://SD_ILS/0/SD_ILS:9346052026-04-01T14:11:19Z2026-04-01T14:11:19Zby St. Denis, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=261284">Click to View</a><br/>Format: Electronic Resources<br/>Designing and building enterprise DMZsent://SD_ILS/0/SD_ILS:9433482026-04-01T14:11:19Z2026-04-01T14:11:19Zby Flynn, Hal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=319198">Click to View</a><br/>Format: Electronic Resources<br/>Part-themed issue on internet securityent://SD_ILS/0/SD_ILS:9379892026-04-01T14:11:19Z2026-04-01T14:11:19Zby Yague, Mariemma.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=285507">Click to View</a><br/>Format: Electronic Resources<br/>Designing and building enterprise DMZsent://SD_ILS/0/SD_ILS:11882722026-04-01T14:11:19Z2026-04-01T14:11:19Zby Dubrawsky, Ido.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491006">http://www.sciencedirect.com/science/book/9781597491006</a><br/>Format: Electronic Resources<br/>Security log management : identifying patterns in the chaosent://SD_ILS/0/SD_ILS:11882572026-04-01T14:11:19Z2026-04-01T14:11:19Zby Babbin, Jacob.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490429">http://www.sciencedirect.com/science/book/9781597490429</a><br/>Format: Electronic Resources<br/>Hukuki açıdan Bilgisayar Programlarında 2000 yılı sorunuent://SD_ILS/0/SD_ILS:1230752026-04-01T14:11:19Z2026-04-01T14:11:19Zby Yıldırım, Mustafa F.<br/>Format: Books<br/>Writing security tools and exploitsent://SD_ILS/0/SD_ILS:9338742026-04-01T14:11:19Z2026-04-01T14:11:19Zby Foster, James C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254850">Click to View</a><br/>Format: Electronic Resources<br/>Security for mobile networks and platformsent://SD_ILS/0/SD_ILS:9452042026-04-01T14:11:19Z2026-04-01T14:11:19Zby Aissi, Selim.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338731">Click to View</a><br/>Format: Electronic Resources<br/>Information security and employee behaviour how to reduce risk through employee education, training and awarenessent://SD_ILS/0/SD_ILS:9518692026-04-01T14:11:19Z2026-04-01T14:11:19Zby McIlwraith, Angus.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=429792">Click to View</a><br/>Format: Electronic Resources<br/>Cyberwar-Netwar security in the information ageent://SD_ILS/0/SD_ILS:9352162026-04-01T14:11:19Z2026-04-01T14:11:19Zby NATO Advanced Research Workshop on Cyberwar-Netwar: Security in the Information Age (2003 : Lisbon, Portugal)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=267716">Click to View</a><br/>Format: Electronic Resources<br/>How to cheat at securing a wireless networkent://SD_ILS/0/SD_ILS:9366442026-04-01T14:11:19Z2026-04-01T14:11:19Zby Hurley, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=274288">Click to View</a><br/>Format: Electronic Resources<br/>Click, click, who's really there? protect your family from online predators, pedophiles, privacy loss, and moreent://SD_ILS/0/SD_ILS:9452762026-04-01T14:11:19Z2026-04-01T14:11:19Zby Koh.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338853">Click to View</a><br/>Format: Electronic Resources<br/>Fikir ve sanat eserlerinin korunması : (protection of intellectual property rights)ent://SD_ILS/0/SD_ILS:1233462026-04-01T14:11:19Z2026-04-01T14:11:19Zby Sert, Selin<br/>Format: Books<br/>Security log management identifying patterns in the chaosent://SD_ILS/0/SD_ILS:9338572026-04-01T14:11:19Z2026-04-01T14:11:19Zby Babbin, Jacob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254833">Click to View</a><br/>Format: Electronic Resources<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:9338582026-04-01T14:11:19Z2026-04-01T14:11:19Zby Long, Johnny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254834">Click to View</a><br/>Format: Electronic Resources<br/>Insider threat protecting the enterprise from sabotage, spying, and theftent://SD_ILS/0/SD_ILS:9338732026-04-01T14:11:19Z2026-04-01T14:11:19Zby Cole, Eric.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254849">Click to View</a><br/>Format: Electronic Resources<br/>Bilgisayar ağları ve ağ güvenliğient://SD_ILS/0/SD_ILS:11628622026-04-01T14:11:19Z2026-04-01T14:11:19Zby Uçan, Osman Nuri, 1960-.<br/>Format: Books<br/>Trusted platform module basics using TPM in embedded systemsent://SD_ILS/0/SD_ILS:9367052026-04-01T14:11:19Z2026-04-01T14:11:19Zby Kinney, Steven.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=274719">Click to View</a><br/>Format: Electronic Resources<br/>Understanding Voice over IP securityent://SD_ILS/0/SD_ILS:9381422026-04-01T14:11:19Z2026-04-01T14:11:19Zby Johnston, Alan B.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=286933">Click to View</a><br/>Format: Electronic Resources<br/>Securing HP NonStop servers in an open systems world TCP/IP, OSS & SQLent://SD_ILS/0/SD_ILS:9391972026-04-01T14:11:19Z2026-04-01T14:11:19Zby XYPRO Technology Corporation.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=291716">Click to View</a><br/>Format: Electronic Resources<br/>Verification of infinite-state systems with applications to securityent://SD_ILS/0/SD_ILS:9347182026-04-01T14:11:19Z2026-04-01T14:11:19Zby NATO Advanced Research Workshop on Verification of Infinite-state Systems with Applications to Security (2005 March 17-22 : Timaşoara, Romania)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=265966">Click to View</a><br/>Format: Electronic Resources<br/>How to cheat at Windows system administration using command line scriptsent://SD_ILS/0/SD_ILS:11864252026-04-01T14:11:19Z2026-04-01T14:11:19Zby Bhardwaj, Pawan K.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491051">http://www.sciencedirect.com/science/book/9781597491051</a><br/>Format: Electronic Resources<br/>Trusted platform module basics : using TPM in embedded systemsent://SD_ILS/0/SD_ILS:11856622026-04-01T14:11:19Z2026-04-01T14:11:19Zby Kinney, Steven.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679602">http://www.sciencedirect.com/science/book/9780750679602</a><br/>Format: Electronic Resources<br/>Practical VoIP securityent://SD_ILS/0/SD_ILS:11882632026-04-01T14:11:19Z2026-04-01T14:11:19Zby Porter, Thomas.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490603">https://www.sciencedirect.com/science/book/9781597490603</a><br/>Format: Electronic Resources<br/>Securing IM and P2P applications for the enterpriseent://SD_ILS/0/SD_ILS:11842632026-04-01T14:11:19Z2026-04-01T14:11:19Zby Piccard, Paul L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490177">http://www.sciencedirect.com/science/book/9781597490177</a>
ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499965">http://www.sciencedirect.com/science/book/9781597499965</a><br/>Format: Electronic Resources<br/>Securing HP NonStop servers in an open systems world : TCP/IP, OSS & SQLent://SD_ILS/0/SD_ILS:11881182026-04-01T14:11:19Z2026-04-01T14:11:19Zby XYPRO Technology Corporation.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583446">http://www.sciencedirect.com/science/book/9781555583446</a><br/>Format: Electronic Resources<br/>Winternals defragmentation, recovery, and administration field guideent://SD_ILS/0/SD_ILS:11882672026-04-01T14:11:19Z2026-04-01T14:11:19Zby Kleiman, Dave.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490795">https://www.sciencedirect.com/science/book/9781597490795</a><br/>Format: Electronic Resources<br/>Vesuvius : education, security and prosperity = Educazione, sicurezza e prosperitàent://SD_ILS/0/SD_ILS:11875382026-04-01T14:11:19Z2026-04-01T14:11:19Zby Dobran, F.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780444521040">https://www.sciencedirect.com/science/book/9780444521040</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/bookseries/1871644X/8">https://www.sciencedirect.com/science/bookseries/1871644X/8</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/publication?issn=1871644X&volume=8">https://www.sciencedirect.com/science/publication?issn=1871644X&volume=8</a><br/>Format: Electronic Resources<br/>BigNum math : implementing cryptographic multiple precision arithmeticent://SD_ILS/0/SD_ILS:11882762026-04-01T14:11:19Z2026-04-01T14:11:19Zby St. Denis, Tom.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491129">https://www.sciencedirect.com/science/book/9781597491129</a><br/>Format: Electronic Resources<br/>Perfect passwords : selection, protection, authenticationent://SD_ILS/0/SD_ILS:11882562026-04-01T14:11:19Z2026-04-01T14:11:19Zby Burnett, Mark.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490412">https://www.sciencedirect.com/science/book/9781597490412</a><br/>Format: Electronic Resources<br/>Face processing : advanced modeling and methodsent://SD_ILS/0/SD_ILS:11867812026-04-01T14:11:19Z2026-04-01T14:11:19Zby Zhao, Wenyi.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780120884520">http://www.sciencedirect.com/science/book/9780120884520</a><br/>Format: Electronic Resources<br/>High-technology crime investigator's handbook : establishing and managing a high-technology crime prevention programent://SD_ILS/0/SD_ILS:11880032026-04-01T14:11:19Z2026-04-01T14:11:19Zby Kovacich, Gerald L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679299">http://www.sciencedirect.com/science/book/9780750679299</a><br/>Format: Electronic Resources<br/>