Search Results for Computer security. - Narrowed by: 2010SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092010$0025092010$0026ic$003dtrue$0026ps$003d300?2026-01-18T20:51:46ZSecurity in ad hoc and sensor networksent://SD_ILS/0/SD_ILS:10302542026-01-18T20:51:46Z2026-01-18T20:51:46Zby Beyah, Raheem (Raheem A.), 1976-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1679353">Click to View</a><br/>Format: Electronic Resources<br/>Toward better usability, security, and privacy of information technology report of a workshopent://SD_ILS/0/SD_ILS:10858152026-01-18T20:51:46Z2026-01-18T20:51:46Zby National Research Council (U.S.). Steering Committee on the Usability, Security, and Privacy of Computer Systems.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3378675">Click to View</a><br/>Format: Electronic Resources<br/>Adaptive security management architectureent://SD_ILS/0/SD_ILS:9722382026-01-18T20:51:46Z2026-01-18T20:51:46Zby Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=625004">Click to View</a><br/>Format: Electronic Resources<br/>Managing information securityent://SD_ILS/0/SD_ILS:10183422026-01-18T20:51:46Z2026-01-18T20:51:46Zby Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1357643">Click to View</a><br/>Format: Electronic Resources<br/>Mac security bibleent://SD_ILS/0/SD_ILS:9603772026-01-18T20:51:46Z2026-01-18T20:51:46Zby Kissell, Joe.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=477803">Click to View</a><br/>Format: Electronic Resources<br/>Seven deadliest USB attacksent://SD_ILS/0/SD_ILS:11780202026-01-18T20:51:46Z2026-01-18T20:51:46Zby Anderson, Brian (Brian James)<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495530">https://www.sciencedirect.com/science/book/9781597495530</a><br/>Format: Electronic Resources<br/>Professional penetration testing : creating and operating a formal hacking labent://SD_ILS/0/SD_ILS:11930162026-01-18T20:51:46Z2026-01-18T20:51:46Zby Wilhelm, Thomas.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494250">https://www.sciencedirect.com/science/book/9781597494250</a><br/>Format: Electronic Resources<br/>Dear hacker letters to the editor of 2600ent://SD_ILS/0/SD_ILS:9648672026-01-18T20:51:46Z2026-01-18T20:51:46Zby Goldstein, Emmanuel J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537340">Click to View</a><br/>Format: Electronic Resources<br/>Professional Cocoa application securityent://SD_ILS/0/SD_ILS:9648702026-01-18T20:51:46Z2026-01-18T20:51:46Zby Lee, Graham J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537355">Click to View</a><br/>Format: Electronic Resources<br/>Least privilege security for Windows 7, Vista, And XP secure desktops for regulatory compliance and business agilityent://SD_ILS/0/SD_ILS:9963142026-01-18T20:51:46Z2026-01-18T20:51:46Zby Smith, Russell.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=944038">Click to View</a><br/>Format: Electronic Resources<br/>GlassFish security secure your GlassFish installation, web applications, EJB applications, application client module, and web services using Java EE and GlassFish security measuresent://SD_ILS/0/SD_ILS:9964052026-01-18T20:51:46Z2026-01-18T20:51:46Zby Kalali, Masoud.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=944941">Click to View</a><br/>Format: Electronic Resources<br/>Eleventh hour network+ : exam N10-004 study guideent://SD_ILS/0/SD_ILS:11928062026-01-18T20:51:46Z2026-01-18T20:51:46Zby Alpern, Naomi J.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494281">https://www.sciencedirect.com/science/book/9781597494281</a><br/>Format: Electronic Resources<br/>The basics of hacking and penetration testing ethical hacking and penetration testing made easyent://SD_ILS/0/SD_ILS:1335942026-01-18T20:51:46Z2026-01-18T20:51:46Zby Engebretson, Pat (Patrick Henry), 1974-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496551">http://www.sciencedirect.com/science/book/9781597496551</a><br/>Format: Electronic Resources<br/>The basics of hacking and penetration testing : ethical hacking and penetration testing made easyent://SD_ILS/0/SD_ILS:11839502026-01-18T20:51:46Z2026-01-18T20:51:46Zby Engebretson, Pat (Patrick Henry), 1974-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496551">https://www.sciencedirect.com/science/book/9781597496551</a><br/>Format: Electronic Resources<br/>System assurance : beyond detecting vulnerabilitiesent://SD_ILS/0/SD_ILS:11832662026-01-18T20:51:46Z2026-01-18T20:51:46Zby Mansourov, Nikolai.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123814142">https://www.sciencedirect.com/science/book/9780123814142</a><br/>Format: Electronic Resources<br/>Information security management : concepts and practiceent://SD_ILS/0/SD_ILS:10207472026-01-18T20:51:46Z2026-01-18T20:51:46Zby Raggad, Bel G., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1449482">Click to View</a><br/>Format: Electronic Resources<br/>Security for Microsoft Windows System Administrators : introduction to key information security conceptsent://SD_ILS/0/SD_ILS:11817682026-01-18T20:51:46Z2026-01-18T20:51:46Zby Rountree, Derrick.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495943">http://www.sciencedirect.com/science/book/9781597495943</a><br/>Format: Electronic Resources<br/>Cloud security a comprehensive guide to secure cloud computingent://SD_ILS/0/SD_ILS:9684032026-01-18T20:51:46Z2026-01-18T20:51:46Zby Krutz, Ronald L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=589027">Click to View</a><br/>Format: Electronic Resources<br/>Risk factors in computer-crime victimizationent://SD_ILS/0/SD_ILS:10032442026-01-18T20:51:46Z2026-01-18T20:51:46Zby Choi, Kyung-shick, 1973-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1057793">Click to View</a><br/>Format: Electronic Resources<br/>Seven deadliest network attacksent://SD_ILS/0/SD_ILS:11780322026-01-18T20:51:46Z2026-01-18T20:51:46Zby Prowell, Stacy J.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495493">https://www.sciencedirect.com/science/book/9781597495493</a><br/>Format: Electronic Resources<br/>Security the human factorent://SD_ILS/0/SD_ILS:9730592026-01-18T20:51:46Z2026-01-18T20:51:46Zby Kearney, Paul.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=647939">Click to View</a><br/>Format: Electronic Resources<br/>Human systems integration to enhance maritime domain awareness for port/harbour securityent://SD_ILS/0/SD_ILS:9730432026-01-18T20:51:46Z2026-01-18T20:51:46Zby Shahbazian, E. (Elisa)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=647893">Click to View</a><br/>Format: Electronic Resources<br/>Security of self-organizing networks MANET, WSN, WMN, VANETent://SD_ILS/0/SD_ILS:9691242026-01-18T20:51:46Z2026-01-18T20:51:46Zby Pathan, Al-Sakib Khan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=599718">Click to View</a><br/>Format: Electronic Resources<br/>Secure and resilient software developmentent://SD_ILS/0/SD_ILS:10206922026-01-18T20:51:46Z2026-01-18T20:51:46Zby Merkow, Mark S., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1446770">Click to View</a><br/>Format: Electronic Resources<br/>CEH certified ethical hacker study guideent://SD_ILS/0/SD_ILS:9633602026-01-18T20:51:46Z2026-01-18T20:51:46Zby Graves, Kimberly, 1974-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=516952">Click to View</a><br/>Format: Electronic Resources<br/>Information security for managementent://SD_ILS/0/SD_ILS:10567932026-01-18T20:51:46Z2026-01-18T20:51:46Zby Iyengar, Venugopal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3011230">Click to View</a><br/>Format: Electronic Resources<br/>Safety of computer architecturesent://SD_ILS/0/SD_ILS:10081532026-01-18T20:51:46Z2026-01-18T20:51:46Zby Boulanger, Jean-Louis.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1120753">Click to View</a><br/>Format: Electronic Resources<br/>Hashing in computer science fifty years of slicing and dicingent://SD_ILS/0/SD_ILS:9648692026-01-18T20:51:46Z2026-01-18T20:51:46Zby Konheim, Alan G., 1934-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537352">Click to View</a><br/>Format: Electronic Resources<br/>IT audit, control, and securityent://SD_ILS/0/SD_ILS:9721352026-01-18T20:51:46Z2026-01-18T20:51:46Zby Moeller, Robert R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=624573">Click to View</a><br/>Format: Electronic Resources<br/>The disaster recovery handbook a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assetsent://SD_ILS/0/SD_ILS:9723352026-01-18T20:51:46Z2026-01-18T20:51:46Zby Wallace, Michael, 1960-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=631136">Click to View</a><br/>Format: Electronic Resources<br/>Cyber risks for business professionals a management guideent://SD_ILS/0/SD_ILS:9730582026-01-18T20:51:46Z2026-01-18T20:51:46Zby Kendrick, Rupert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=647937">Click to View</a><br/>Format: Electronic Resources<br/>Group policy fundamentals, security, and the managed desktopent://SD_ILS/0/SD_ILS:9634792026-01-18T20:51:46Z2026-01-18T20:51:46Zby Moskowitz, Jeremy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=530009">Click to View</a><br/>Format: Electronic Resources<br/>Relation based access controlent://SD_ILS/0/SD_ILS:10251322026-01-18T20:51:46Z2026-01-18T20:51:46Zby Zhang, Rui.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1589007">Click to View</a><br/>Format: Electronic Resources<br/>Advances in artificial intelligence for privacy protection and securityent://SD_ILS/0/SD_ILS:10302722026-01-18T20:51:46Z2026-01-18T20:51:46Zby Solanas, Agusti.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1679374">Click to View</a><br/>Format: Electronic Resources<br/>Logics and languages for reliability and securityent://SD_ILS/0/SD_ILS:9666272026-01-18T20:51:46Z2026-01-18T20:51:46Zby Esparza, Javier.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=557042">Click to View</a><br/>Format: Electronic Resources<br/>China's cyberwarfare capabilityent://SD_ILS/0/SD_ILS:10610292026-01-18T20:51:46Z2026-01-18T20:51:46Zby Marvel, Elisabette M.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3022258">Click to View</a><br/>Format: Electronic Resources<br/>Virtualization and forensics : a digital forensic investigator's guide to virtual environmentsent://SD_ILS/0/SD_ILS:11784292026-01-18T20:51:46Z2026-01-18T20:51:46Zby Barrett, Diane.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format: Electronic Resources<br/>Advances in computers. Volume 79ent://SD_ILS/0/SD_ILS:11756682026-01-18T20:51:46Z2026-01-18T20:51:46Zby Zelkowitz, Marvin V., 1945-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123810274">https://www.sciencedirect.com/science/book/9780123810274</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/bookseries/00652458/79">https://www.sciencedirect.com/science/bookseries/00652458/79</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/issue/25777-2010-999209999-1783761">https://www.sciencedirect.com/science/issue/25777-2010-999209999-1783761</a><br/>Format: Electronic Resources<br/>Seven deadliest Microsoft attacksent://SD_ILS/0/SD_ILS:11774792026-01-18T20:51:46Z2026-01-18T20:51:46Zby Kraus, Rob.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495516">https://www.sciencedirect.com/science/book/9781597495516</a><br/>Format: Electronic Resources<br/>Seven deadliest web application attacksent://SD_ILS/0/SD_ILS:11775022026-01-18T20:51:46Z2026-01-18T20:51:46Zby Shema, Mike.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495431">http://www.sciencedirect.com/science/book/9781597495431</a><br/>Format: Electronic Resources<br/>Seven deadliest wireless technologies attacksent://SD_ILS/0/SD_ILS:11780192026-01-18T20:51:46Z2026-01-18T20:51:46Zby Haines, Brad.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495417">https://www.sciencedirect.com/science/book/9781597495417</a><br/>Format: Electronic Resources<br/>Seven deadliest social network attacksent://SD_ILS/0/SD_ILS:11780312026-01-18T20:51:46Z2026-01-18T20:51:46Zby Timm, Carl.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495455">https://www.sciencedirect.com/science/book/9781597495455</a><br/>Format: Electronic Resources<br/>PCI compliance : understand and implement effective PCI data security standard compliance.ent://SD_ILS/0/SD_ILS:11774802026-01-18T20:51:46Z2026-01-18T20:51:46Zby Chuvakin, Anton.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494991">http://www.sciencedirect.com/science/book/9781597494991</a><br/>Format: Electronic Resources<br/>Managed code rootkits : hooking into runtime environmentsent://SD_ILS/0/SD_ILS:11818272026-01-18T20:51:46Z2026-01-18T20:51:46Zby Metula, Erez.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495745">http://www.sciencedirect.com/science/book/9781597495745</a><br/>Format: Electronic Resources<br/>Dissecting the hack : the forb1dd3n networkent://SD_ILS/0/SD_ILS:11813792026-01-18T20:51:46Z2026-01-18T20:51:46Zby Street, Jayson E.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495684">https://www.sciencedirect.com/science/book/9781597495684</a><br/>Format: Electronic Resources<br/>A guide to kernel exploitation : attacking the coreent://SD_ILS/0/SD_ILS:11817702026-01-18T20:51:46Z2026-01-18T20:51:46Zby Perla, Enrico.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494861">https://www.sciencedirect.com/science/book/9781597494861</a><br/>Format: Electronic Resources<br/>Digital video surveillance and securityent://SD_ILS/0/SD_ILS:11775002026-01-18T20:51:46Z2026-01-18T20:51:46Zby Caputo, Anthony C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781856177474">http://www.sciencedirect.com/science/book/9781856177474</a><br/>Format: Electronic Resources<br/>Digital cognitive technologies epistemology and the knowledge economyent://SD_ILS/0/SD_ILS:9788452026-01-18T20:51:46Z2026-01-18T20:51:46Zby Reber, Bernard.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=700705">Click to View</a><br/>Format: Electronic Resources<br/>