Search Results for Computer security. - Narrowed by: 2009SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092009$0025092009$0026ps$003d300?dt=list2026-04-04T13:09:47ZComputer and information security handbookent://SD_ILS/0/SD_ILS:9556372026-04-04T13:09:47Z2026-04-04T13:09:47Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=453166">Click to View</a><br/>Format: Electronic Resources<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:11925942026-04-04T13:09:47Z2026-04-04T13:09:47Zby Vacca, John R.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123743541">https://www.sciencedirect.com/science/book/9780123743541</a><br/>Format: Electronic Resources<br/>Next generation SSH2 implementation : securing data in motionent://SD_ILS/0/SD_ILS:11917632026-04-04T13:09:47Z2026-04-04T13:09:47Zby Liu, Dale.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492836">https://www.sciencedirect.com/science/book/9781597492836</a><br/>Format: Electronic Resources<br/>Unauthorised access physical penetration testing for IT security teamsent://SD_ILS/0/SD_ILS:9587762026-04-04T13:09:47Z2026-04-04T13:09:47Zby Allsopp, Wil.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=470412">Click to View</a><br/>Format: Electronic Resources<br/>Aldatma sanatı : güvenliğin insan boyutunun kullanılmasıent://SD_ILS/0/SD_ILS:11583692026-04-04T13:09:47Z2026-04-04T13:09:47Zby Mitnick, Kevin D.<br/>Format: Books<br/>Information security breaches : avoidance and treatment based on ISO27001ent://SD_ILS/0/SD_ILS:10370822026-04-04T13:09:47Z2026-04-04T13:09:47Zby Krausz, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778763">Click to View</a><br/>Format: Electronic Resources<br/>Distributed systems security issues, processes, and solutionsent://SD_ILS/0/SD_ILS:9541832026-04-04T13:09:47Z2026-04-04T13:09:47Zby Belapurkar, Abhijit.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=437429">Click to View</a><br/>Format: Electronic Resources<br/>Aldatma sanatı : güvenliğin insan boyutunun kullanılmasıent://SD_ILS/0/SD_ILS:2829292026-04-04T13:09:47Z2026-04-04T13:09:47Zby Mitnick, Kevin D.<br/>Format: Books<br/>Gray hat Python Python programming for hackers and reverse engineersent://SD_ILS/0/SD_ILS:10099522026-04-04T13:09:47Z2026-04-04T13:09:47Zby Seitz, Justin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137535">Click to View</a><br/>Format: Electronic Resources<br/>The definitive guide to the C&A transformation the first publication of a comprehensive view of the C&A transformationent://SD_ILS/0/SD_ILS:9654532026-04-04T13:09:47Z2026-04-04T13:09:47Zby Mehan, Julie E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=547041">Click to View</a><br/>Format: Electronic Resources<br/>Enterprise information security and privacyent://SD_ILS/0/SD_ILS:9563312026-04-04T13:09:47Z2026-04-04T13:09:47Zby Axelrod, C. Warren.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456886">Click to View</a><br/>Format: Electronic Resources<br/>Eleventh hour security+ : exam SYO-201 study guideent://SD_ILS/0/SD_ILS:11928382026-04-04T13:09:47Z2026-04-04T13:09:47Zby Dubrawsky, Ido.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494274">https://www.sciencedirect.com/science/book/9781597494274</a><br/>Format: Electronic Resources<br/>SQL injection attacks and defenseent://SD_ILS/0/SD_ILS:11928192026-04-04T13:09:47Z2026-04-04T13:09:47Zby Clarke, Justin.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494243">https://www.sciencedirect.com/science/book/9781597494243</a><br/>Format: Electronic Resources<br/>ISO27001 in a Windows environment : the best practice handbook for a Microsoft Windows environmentent://SD_ILS/0/SD_ILS:10370872026-04-04T13:09:47Z2026-04-04T13:09:47Zby Honan, Brian, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778768">Click to View</a><br/>Format: Electronic Resources<br/>ModSecurity 2.5 securing your Apache installation and web applicationsent://SD_ILS/0/SD_ILS:9971042026-04-04T13:09:47Z2026-04-04T13:09:47Zby Mischel, Magnus.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=951160">Click to View</a><br/>Format: Electronic Resources<br/>GFI network security and PCI compliance power toolsent://SD_ILS/0/SD_ILS:11918272026-04-04T13:09:47Z2026-04-04T13:09:47Zby Posey, Brien.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492850">https://www.sciencedirect.com/science/book/9781597492850</a><br/>Format: Electronic Resources<br/>Algorithms, architectures and information systems securityent://SD_ILS/0/SD_ILS:9602022026-04-04T13:09:47Z2026-04-04T13:09:47Zby Bhattacharya, Bhargab B.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=477109">Click to View</a><br/>Format: Electronic Resources<br/>Modelling cyber security approaches, methodology, strategiesent://SD_ILS/0/SD_ILS:9625772026-04-04T13:09:47Z2026-04-04T13:09:47Zby NATO Advanced Research Workshop on Operational Network Intelligence: Today and Tomorrow (2009 : Venice, Italy)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=501456">Click to View</a><br/>Format: Electronic Resources<br/>Identity, security and democracy the wider social and ethical implications of automated systems for human identificationent://SD_ILS/0/SD_ILS:9530752026-04-04T13:09:47Z2026-04-04T13:09:47Zby NATO Advanced Research Workshop on Identity, Security and Democracy: the Wider Social and Ethical Implications of Automated Systems for Human Identification (2006 : Jerusalem)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=433448">Click to View</a><br/>Format: Electronic Resources<br/>Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilitiesent://SD_ILS/0/SD_ILS:10856922026-04-04T13:09:47Z2026-04-04T13:09:47Zby Dam, Kenneth W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3378552">Click to View</a><br/>Format: Electronic Resources<br/>Disappearing cryptography : information hiding : steganography & watermarkingent://SD_ILS/0/SD_ILS:11920502026-04-04T13:09:47Z2026-04-04T13:09:47Zby Wayner, Peter, 1964-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123744791">https://www.sciencedirect.com/science/book/9780123744791</a><br/>Format: Electronic Resources<br/>Cisco router and switch forensics : investigating and analyzing malicious network activityent://SD_ILS/0/SD_ILS:11928002026-04-04T13:09:47Z2026-04-04T13:09:47Zby Liu, Dale.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494182">https://www.sciencedirect.com/science/book/9781597494182</a><br/>Format: Electronic Resources<br/>SAP security configuration and deployment : the IT administrator's guide to best practicesent://SD_ILS/0/SD_ILS:11916222026-04-04T13:09:47Z2026-04-04T13:09:47Zby Wun-Young, Leslie.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492843">http://www.sciencedirect.com/science/book/9781597492843</a><br/>Format: Electronic Resources<br/>Cyberdeterrence and cyberwarent://SD_ILS/0/SD_ILS:9596802026-04-04T13:09:47Z2026-04-04T13:09:47Zby Libicki, Martin C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=475081">Click to View</a><br/>Format: Electronic Resources<br/>SSL and TLS theory and practiceent://SD_ILS/0/SD_ILS:9965712026-04-04T13:09:47Z2026-04-04T13:09:47Zby Oppliger, Rolf.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=946557">Click to View</a><br/>Format: Electronic Resources<br/>Lessons from the identity trail anonymity, privacy and identity in a networked societyent://SD_ILS/0/SD_ILS:10668042026-04-04T13:09:47Z2026-04-04T13:09:47Zby Kerr, Ian (Ian R.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3054189">Click to View</a><br/>Format: Electronic Resources<br/>From problem toward solution wireless sensor networks securityent://SD_ILS/0/SD_ILS:10593262026-04-04T13:09:47Z2026-04-04T13:09:47Zby Jiang, Zhen.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3018991">Click to View</a><br/>Format: Electronic Resources<br/>Technological turf wars a case study of the computer antivirus industryent://SD_ILS/0/SD_ILS:9529692026-04-04T13:09:47Z2026-04-04T13:09:47Zby Johnston, Jessica R., 1952-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=432873">Click to View</a><br/>Format: Electronic Resources<br/>Information warfareent://SD_ILS/0/SD_ILS:10062472026-04-04T13:09:47Z2026-04-04T13:09:47Zby Ventre, Daniel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1106528">Click to View</a><br/>Format: Electronic Resources<br/>Virtualization for security : including sandboxing, disaster recovery, high availability, forensic analysis, and honeypottingent://SD_ILS/0/SD_ILS:11919972026-04-04T13:09:47Z2026-04-04T13:09:47Zby Hoopes, John.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597493055">https://www.sciencedirect.com/science/book/9781597493055</a><br/>Format: Electronic Resources<br/>Nokia firewall, VPN, and IPSO configuration guideent://SD_ILS/0/SD_ILS:11918152026-04-04T13:09:47Z2026-04-04T13:09:47Zby Hay, Andrew, 1973-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492867">https://www.sciencedirect.com/science/book/9781597492867</a><br/>Format: Electronic Resources<br/>Nuclear energy : an introduction to the concepts, systems, and applications of nuclear processesent://SD_ILS/0/SD_ILS:11918302026-04-04T13:09:47Z2026-04-04T13:09:47Zby Murray, Raymond L., 1920-2011.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123705471">http://www.sciencedirect.com/science/book/9780123705471</a><br/>Format: Electronic Resources<br/>Multi-camera networks : principles and applicationsent://SD_ILS/0/SD_ILS:11920792026-04-04T13:09:47Z2026-04-04T13:09:47Zby Aghajan, Hamid K.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123746337">http://www.sciencedirect.com/science/book/9780123746337</a><br/>Format: Electronic Resources<br/>Principles of computer system design : an introductionent://SD_ILS/0/SD_ILS:11928182026-04-04T13:09:47Z2026-04-04T13:09:47Zby Saltzer, J. H., 1939-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123749574">https://www.sciencedirect.com/science/book/9780123749574</a><br/>Format: Electronic Resources<br/>TCP/IP sockets in C : practical guide for programmersent://SD_ILS/0/SD_ILS:11920652026-04-04T13:09:47Z2026-04-04T13:09:47Zby Donahoo, Michael J.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123745408">https://www.sciencedirect.com/science/book/9780123745408</a><br/>Format: Electronic Resources<br/>