Search Results for Computer security. - Narrowed by: 2009 SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092009$0025092009$0026ps$003d300?dt=list 2026-04-04T13:09:47Z Computer and information security handbook ent://SD_ILS/0/SD_ILS:955637 2026-04-04T13:09:47Z 2026-04-04T13:09:47Z by&#160;Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=453166">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:1192594 2026-04-04T13:09:47Z 2026-04-04T13:09:47Z by&#160;Vacca, John R.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123743541">https://www.sciencedirect.com/science/book/9780123743541</a><br/>Format:&#160;Electronic Resources<br/> Next generation SSH2 implementation : securing data in motion ent://SD_ILS/0/SD_ILS:1191763 2026-04-04T13:09:47Z 2026-04-04T13:09:47Z by&#160;Liu, Dale.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492836">https://www.sciencedirect.com/science/book/9781597492836</a><br/>Format:&#160;Electronic Resources<br/> Unauthorised access physical penetration testing for IT security teams ent://SD_ILS/0/SD_ILS:958776 2026-04-04T13:09:47Z 2026-04-04T13:09:47Z by&#160;Allsopp, Wil.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=470412">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Aldatma sanat&#305; : g&uuml;venli&#287;in insan boyutunun kullan&#305;lmas&#305; ent://SD_ILS/0/SD_ILS:1158369 2026-04-04T13:09:47Z 2026-04-04T13:09:47Z by&#160;Mitnick, Kevin D.<br/>Format:&#160;Books<br/> Information security breaches : avoidance and treatment based on ISO27001 ent://SD_ILS/0/SD_ILS:1037082 2026-04-04T13:09:47Z 2026-04-04T13:09:47Z by&#160;Krausz, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778763">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Distributed systems security issues, processes, and solutions ent://SD_ILS/0/SD_ILS:954183 2026-04-04T13:09:47Z 2026-04-04T13:09:47Z by&#160;Belapurkar, Abhijit.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=437429">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Aldatma sanat&#305; : g&uuml;venli&#287;in insan boyutunun kullan&#305;lmas&#305; ent://SD_ILS/0/SD_ILS:282929 2026-04-04T13:09:47Z 2026-04-04T13:09:47Z by&#160;Mitnick, Kevin D.<br/>Format:&#160;Books<br/> Gray hat Python Python programming for hackers and reverse engineers ent://SD_ILS/0/SD_ILS:1009952 2026-04-04T13:09:47Z 2026-04-04T13:09:47Z by&#160;Seitz, Justin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137535">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The definitive guide to the C&amp;A transformation the first publication of a comprehensive view of the C&amp;A transformation ent://SD_ILS/0/SD_ILS:965453 2026-04-04T13:09:47Z 2026-04-04T13:09:47Z by&#160;Mehan, Julie E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=547041">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Enterprise information security and privacy ent://SD_ILS/0/SD_ILS:956331 2026-04-04T13:09:47Z 2026-04-04T13:09:47Z by&#160;Axelrod, C. Warren.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456886">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Eleventh hour security+ : exam SYO-201 study guide ent://SD_ILS/0/SD_ILS:1192838 2026-04-04T13:09:47Z 2026-04-04T13:09:47Z by&#160;Dubrawsky, Ido.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494274">https://www.sciencedirect.com/science/book/9781597494274</a><br/>Format:&#160;Electronic Resources<br/> SQL injection attacks and defense ent://SD_ILS/0/SD_ILS:1192819 2026-04-04T13:09:47Z 2026-04-04T13:09:47Z by&#160;Clarke, Justin.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494243">https://www.sciencedirect.com/science/book/9781597494243</a><br/>Format:&#160;Electronic Resources<br/> ISO27001 in a Windows environment : the best practice handbook for a Microsoft Windows environment ent://SD_ILS/0/SD_ILS:1037087 2026-04-04T13:09:47Z 2026-04-04T13:09:47Z by&#160;Honan, Brian, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1778768">Click to View</a><br/>Format:&#160;Electronic Resources<br/> ModSecurity 2.5 securing your Apache installation and web applications ent://SD_ILS/0/SD_ILS:997104 2026-04-04T13:09:47Z 2026-04-04T13:09:47Z by&#160;Mischel, Magnus.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=951160">Click to View</a><br/>Format:&#160;Electronic Resources<br/> GFI network security and PCI compliance power tools ent://SD_ILS/0/SD_ILS:1191827 2026-04-04T13:09:47Z 2026-04-04T13:09:47Z by&#160;Posey, Brien.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492850">https://www.sciencedirect.com/science/book/9781597492850</a><br/>Format:&#160;Electronic Resources<br/> Algorithms, architectures and information systems security ent://SD_ILS/0/SD_ILS:960202 2026-04-04T13:09:47Z 2026-04-04T13:09:47Z by&#160;Bhattacharya, Bhargab B.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=477109">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Modelling cyber security approaches, methodology, strategies ent://SD_ILS/0/SD_ILS:962577 2026-04-04T13:09:47Z 2026-04-04T13:09:47Z by&#160;NATO Advanced Research Workshop on Operational Network Intelligence: Today and Tomorrow (2009 : Venice, Italy)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=501456">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Identity, security and democracy the wider social and ethical implications of automated systems for human identification ent://SD_ILS/0/SD_ILS:953075 2026-04-04T13:09:47Z 2026-04-04T13:09:47Z by&#160;NATO Advanced Research Workshop on Identity, Security and Democracy: the Wider Social and Ethical Implications of Automated Systems for Human Identification (2006 : Jerusalem)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=433448">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities ent://SD_ILS/0/SD_ILS:1085692 2026-04-04T13:09:47Z 2026-04-04T13:09:47Z by&#160;Dam, Kenneth W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3378552">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Disappearing cryptography : information hiding : steganography &amp; watermarking ent://SD_ILS/0/SD_ILS:1192050 2026-04-04T13:09:47Z 2026-04-04T13:09:47Z by&#160;Wayner, Peter, 1964-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123744791">https://www.sciencedirect.com/science/book/9780123744791</a><br/>Format:&#160;Electronic Resources<br/> Cisco router and switch forensics : investigating and analyzing malicious network activity ent://SD_ILS/0/SD_ILS:1192800 2026-04-04T13:09:47Z 2026-04-04T13:09:47Z by&#160;Liu, Dale.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494182">https://www.sciencedirect.com/science/book/9781597494182</a><br/>Format:&#160;Electronic Resources<br/> SAP security configuration and deployment : the IT administrator's guide to best practices ent://SD_ILS/0/SD_ILS:1191622 2026-04-04T13:09:47Z 2026-04-04T13:09:47Z by&#160;Wun-Young, Leslie.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492843">http://www.sciencedirect.com/science/book/9781597492843</a><br/>Format:&#160;Electronic Resources<br/> Cyberdeterrence and cyberwar ent://SD_ILS/0/SD_ILS:959680 2026-04-04T13:09:47Z 2026-04-04T13:09:47Z by&#160;Libicki, Martin C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=475081">Click to View</a><br/>Format:&#160;Electronic Resources<br/> SSL and TLS theory and practice ent://SD_ILS/0/SD_ILS:996571 2026-04-04T13:09:47Z 2026-04-04T13:09:47Z by&#160;Oppliger, Rolf.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=946557">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Lessons from the identity trail anonymity, privacy and identity in a networked society ent://SD_ILS/0/SD_ILS:1066804 2026-04-04T13:09:47Z 2026-04-04T13:09:47Z by&#160;Kerr, Ian (Ian R.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3054189">Click to View</a><br/>Format:&#160;Electronic Resources<br/> From problem toward solution wireless sensor networks security ent://SD_ILS/0/SD_ILS:1059326 2026-04-04T13:09:47Z 2026-04-04T13:09:47Z by&#160;Jiang, Zhen.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3018991">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Technological turf wars a case study of the computer antivirus industry ent://SD_ILS/0/SD_ILS:952969 2026-04-04T13:09:47Z 2026-04-04T13:09:47Z by&#160;Johnston, Jessica R., 1952-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=432873">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information warfare ent://SD_ILS/0/SD_ILS:1006247 2026-04-04T13:09:47Z 2026-04-04T13:09:47Z by&#160;Ventre, Daniel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1106528">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Virtualization for security : including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting ent://SD_ILS/0/SD_ILS:1191997 2026-04-04T13:09:47Z 2026-04-04T13:09:47Z by&#160;Hoopes, John.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597493055">https://www.sciencedirect.com/science/book/9781597493055</a><br/>Format:&#160;Electronic Resources<br/> Nokia firewall, VPN, and IPSO configuration guide ent://SD_ILS/0/SD_ILS:1191815 2026-04-04T13:09:47Z 2026-04-04T13:09:47Z by&#160;Hay, Andrew, 1973-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492867">https://www.sciencedirect.com/science/book/9781597492867</a><br/>Format:&#160;Electronic Resources<br/> Nuclear energy : an introduction to the concepts, systems, and applications of nuclear processes ent://SD_ILS/0/SD_ILS:1191830 2026-04-04T13:09:47Z 2026-04-04T13:09:47Z by&#160;Murray, Raymond L., 1920-2011.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123705471">http://www.sciencedirect.com/science/book/9780123705471</a><br/>Format:&#160;Electronic Resources<br/> Multi-camera networks : principles and applications ent://SD_ILS/0/SD_ILS:1192079 2026-04-04T13:09:47Z 2026-04-04T13:09:47Z by&#160;Aghajan, Hamid K.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123746337">http://www.sciencedirect.com/science/book/9780123746337</a><br/>Format:&#160;Electronic Resources<br/> Principles of computer system design : an introduction ent://SD_ILS/0/SD_ILS:1192818 2026-04-04T13:09:47Z 2026-04-04T13:09:47Z by&#160;Saltzer, J. H., 1939-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123749574">https://www.sciencedirect.com/science/book/9780123749574</a><br/>Format:&#160;Electronic Resources<br/> TCP/IP sockets in C : practical guide for programmers ent://SD_ILS/0/SD_ILS:1192065 2026-04-04T13:09:47Z 2026-04-04T13:09:47Z by&#160;Donahoo, Michael J.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123745408">https://www.sciencedirect.com/science/book/9780123745408</a><br/>Format:&#160;Electronic Resources<br/>