Search Results for Computer security. - Narrowed by: 2010 SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092010$0025092010$0026ic$003dtrue$0026ps$003d300? 2026-01-18T20:51:46Z Security in ad hoc and sensor networks ent://SD_ILS/0/SD_ILS:1030254 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Beyah, Raheem (Raheem A.), 1976-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1679353">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Toward better usability, security, and privacy of information technology report of a workshop ent://SD_ILS/0/SD_ILS:1085815 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;National Research Council (U.S.). Steering Committee on the Usability, Security, and Privacy of Computer Systems.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3378675">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Adaptive security management architecture ent://SD_ILS/0/SD_ILS:972238 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=625004">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Managing information security ent://SD_ILS/0/SD_ILS:1018342 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Vacca, John R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1357643">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mac security bible ent://SD_ILS/0/SD_ILS:960377 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Kissell, Joe.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=477803">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest USB attacks ent://SD_ILS/0/SD_ILS:1178020 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Anderson, Brian (Brian James)<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495530">https://www.sciencedirect.com/science/book/9781597495530</a><br/>Format:&#160;Electronic Resources<br/> Professional penetration testing : creating and operating a formal hacking lab ent://SD_ILS/0/SD_ILS:1193016 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Wilhelm, Thomas.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494250">https://www.sciencedirect.com/science/book/9781597494250</a><br/>Format:&#160;Electronic Resources<br/> Dear hacker letters to the editor of 2600 ent://SD_ILS/0/SD_ILS:964867 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Goldstein, Emmanuel J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537340">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Professional Cocoa application security ent://SD_ILS/0/SD_ILS:964870 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Lee, Graham J.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537355">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Least privilege security for Windows 7, Vista, And XP secure desktops for regulatory compliance and business agility ent://SD_ILS/0/SD_ILS:996314 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Smith, Russell.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=944038">Click to View</a><br/>Format:&#160;Electronic Resources<br/> GlassFish security secure your GlassFish installation, web applications, EJB applications, application client module, and web services using Java EE and GlassFish security measures ent://SD_ILS/0/SD_ILS:996405 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Kalali, Masoud.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=944941">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Eleventh hour network+ : exam N10-004 study guide ent://SD_ILS/0/SD_ILS:1192806 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Alpern, Naomi J.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494281">https://www.sciencedirect.com/science/book/9781597494281</a><br/>Format:&#160;Electronic Resources<br/> The basics of hacking and penetration testing ethical hacking and penetration testing made easy ent://SD_ILS/0/SD_ILS:133594 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Engebretson, Pat (Patrick Henry), 1974-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496551">http://www.sciencedirect.com/science/book/9781597496551</a><br/>Format:&#160;Electronic Resources<br/> The basics of hacking and penetration testing : ethical hacking and penetration testing made easy ent://SD_ILS/0/SD_ILS:1183950 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Engebretson, Pat (Patrick Henry), 1974-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496551">https://www.sciencedirect.com/science/book/9781597496551</a><br/>Format:&#160;Electronic Resources<br/> System assurance : beyond detecting vulnerabilities ent://SD_ILS/0/SD_ILS:1183266 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Mansourov, Nikolai.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123814142">https://www.sciencedirect.com/science/book/9780123814142</a><br/>Format:&#160;Electronic Resources<br/> Information security management : concepts and practice ent://SD_ILS/0/SD_ILS:1020747 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Raggad, Bel G., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1449482">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security for Microsoft Windows System Administrators : introduction to key information security concepts ent://SD_ILS/0/SD_ILS:1181768 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Rountree, Derrick.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495943">http://www.sciencedirect.com/science/book/9781597495943</a><br/>Format:&#160;Electronic Resources<br/> Cloud security a comprehensive guide to secure cloud computing ent://SD_ILS/0/SD_ILS:968403 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Krutz, Ronald L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=589027">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Risk factors in computer-crime victimization ent://SD_ILS/0/SD_ILS:1003244 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Choi, Kyung-shick, 1973-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1057793">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest network attacks ent://SD_ILS/0/SD_ILS:1178032 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Prowell, Stacy J.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495493">https://www.sciencedirect.com/science/book/9781597495493</a><br/>Format:&#160;Electronic Resources<br/> Security the human factor ent://SD_ILS/0/SD_ILS:973059 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Kearney, Paul.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=647939">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Human systems integration to enhance maritime domain awareness for port/harbour security ent://SD_ILS/0/SD_ILS:973043 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Shahbazian, E. (Elisa)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=647893">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security of self-organizing networks MANET, WSN, WMN, VANET ent://SD_ILS/0/SD_ILS:969124 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Pathan, Al-Sakib Khan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=599718">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Secure and resilient software development ent://SD_ILS/0/SD_ILS:1020692 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Merkow, Mark S., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1446770">Click to View</a><br/>Format:&#160;Electronic Resources<br/> CEH certified ethical hacker study guide ent://SD_ILS/0/SD_ILS:963360 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Graves, Kimberly, 1974-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=516952">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information security for management ent://SD_ILS/0/SD_ILS:1056793 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Iyengar, Venugopal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3011230">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Safety of computer architectures ent://SD_ILS/0/SD_ILS:1008153 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Boulanger, Jean-Louis.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1120753">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hashing in computer science fifty years of slicing and dicing ent://SD_ILS/0/SD_ILS:964869 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Konheim, Alan G., 1934-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537352">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IT audit, control, and security ent://SD_ILS/0/SD_ILS:972135 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Moeller, Robert R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=624573">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The disaster recovery handbook a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets ent://SD_ILS/0/SD_ILS:972335 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Wallace, Michael, 1960-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=631136">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber risks for business professionals a management guide ent://SD_ILS/0/SD_ILS:973058 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Kendrick, Rupert.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=647937">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Group policy fundamentals, security, and the managed desktop ent://SD_ILS/0/SD_ILS:963479 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Moskowitz, Jeremy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=530009">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Relation based access control ent://SD_ILS/0/SD_ILS:1025132 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Zhang, Rui.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1589007">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Advances in artificial intelligence for privacy protection and security ent://SD_ILS/0/SD_ILS:1030272 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Solanas, Agusti.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1679374">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Logics and languages for reliability and security ent://SD_ILS/0/SD_ILS:966627 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Esparza, Javier.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=557042">Click to View</a><br/>Format:&#160;Electronic Resources<br/> China's cyberwarfare capability ent://SD_ILS/0/SD_ILS:1061029 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Marvel, Elisabette M.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3022258">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Virtualization and forensics : a digital forensic investigator's guide to virtual environments ent://SD_ILS/0/SD_ILS:1178429 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Barrett, Diane.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format:&#160;Electronic Resources<br/> Advances in computers. Volume 79 ent://SD_ILS/0/SD_ILS:1175668 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Zelkowitz, Marvin V., 1945-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123810274">https://www.sciencedirect.com/science/book/9780123810274</a> ScienceDirect <a href="https://www.sciencedirect.com/science/bookseries/00652458/79">https://www.sciencedirect.com/science/bookseries/00652458/79</a> ScienceDirect <a href="https://www.sciencedirect.com/science/issue/25777-2010-999209999-1783761">https://www.sciencedirect.com/science/issue/25777-2010-999209999-1783761</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest Microsoft attacks ent://SD_ILS/0/SD_ILS:1177479 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Kraus, Rob.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495516">https://www.sciencedirect.com/science/book/9781597495516</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest web application attacks ent://SD_ILS/0/SD_ILS:1177502 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Shema, Mike.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495431">http://www.sciencedirect.com/science/book/9781597495431</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest wireless technologies attacks ent://SD_ILS/0/SD_ILS:1178019 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Haines, Brad.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495417">https://www.sciencedirect.com/science/book/9781597495417</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest social network attacks ent://SD_ILS/0/SD_ILS:1178031 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Timm, Carl.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495455">https://www.sciencedirect.com/science/book/9781597495455</a><br/>Format:&#160;Electronic Resources<br/> PCI compliance : understand and implement effective PCI data security standard compliance. ent://SD_ILS/0/SD_ILS:1177480 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Chuvakin, Anton.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494991">http://www.sciencedirect.com/science/book/9781597494991</a><br/>Format:&#160;Electronic Resources<br/> Managed code rootkits : hooking into runtime environments ent://SD_ILS/0/SD_ILS:1181827 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Metula, Erez.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495745">http://www.sciencedirect.com/science/book/9781597495745</a><br/>Format:&#160;Electronic Resources<br/> Dissecting the hack : the forb1dd3n network ent://SD_ILS/0/SD_ILS:1181379 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Street, Jayson E.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495684">https://www.sciencedirect.com/science/book/9781597495684</a><br/>Format:&#160;Electronic Resources<br/> A guide to kernel exploitation : attacking the core ent://SD_ILS/0/SD_ILS:1181770 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Perla, Enrico.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494861">https://www.sciencedirect.com/science/book/9781597494861</a><br/>Format:&#160;Electronic Resources<br/> Digital video surveillance and security ent://SD_ILS/0/SD_ILS:1177500 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Caputo, Anthony C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781856177474">http://www.sciencedirect.com/science/book/9781856177474</a><br/>Format:&#160;Electronic Resources<br/> Digital cognitive technologies epistemology and the knowledge economy ent://SD_ILS/0/SD_ILS:978845 2026-01-18T20:51:46Z 2026-01-18T20:51:46Z by&#160;Reber, Bernard.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=700705">Click to View</a><br/>Format:&#160;Electronic Resources<br/>