Search Results for Computer security. - Narrowed by: 2011 SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092011$0025092011$0026ic$003dtrue$0026ps$003d300;jsessionid=BF84CE0E49AFC8814EC10C891BAD6484? 2026-01-17T04:50:25Z Securing the cloud cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:977055 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Winkler, J. R. (Joachim R.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=686827">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing the cloud : cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:1183743 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Winkler, J. R. (Joachim R.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format:&#160;Electronic Resources<br/> Securing the cloud cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:137201 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Winkler, J. R. (Joachim R.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format:&#160;Electronic Resources<br/> Firewall design and analysis ent://SD_ILS/0/SD_ILS:980855 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Liu, Alex X.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=731297">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security 2020 reduce security risks this decade ent://SD_ILS/0/SD_ILS:978416 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Howard, Doug.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=694289">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security risk management building an information security risk management program from the ground up ent://SD_ILS/0/SD_ILS:976804 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Wheeler, Evan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=685406">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer Forensics jumpstart ent://SD_ILS/0/SD_ILS:973680 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Solomon, Michael R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=661659">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Forefront UAG 2010 administrator's handbook take full command of Microsoft Forefront Unified Access Gateway to secure your business applications and provide dynamic remote access with DirectAccess ent://SD_ILS/0/SD_ILS:996844 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Ben-Ari, Erez.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948568">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Web commerce security design and development ent://SD_ILS/0/SD_ILS:978975 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Nahari, Hadi.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706729">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The basics of information security understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:133592 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Andress, Jason.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format:&#160;Electronic Resources<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:1183815 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Andress, Jason.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496537">https://www.sciencedirect.com/science/book/9781597496537</a><br/>Format:&#160;Electronic Resources<br/> BackTrack 4 assuring security by penetration testing : master the art of penetration testing with BackTrack ent://SD_ILS/0/SD_ILS:996968 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Ali, Shakeel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=950518">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Identity management concepts, technologies, and systems ent://SD_ILS/0/SD_ILS:972507 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Bertino, Elisa.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=634511">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Coding for penetration testers building better tools ent://SD_ILS/0/SD_ILS:137213 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Andress, Jason.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497299">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> A cyberworm that knows no boundaries ent://SD_ILS/0/SD_ILS:989711 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Porche, Isaac, 1968-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=846009">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Formal models and techniques for analyzing security protocols ent://SD_ILS/0/SD_ILS:984359 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=784604">Click to View</a><br/>Format:&#160;Electronic Resources<br/> CISSP practice 2,250 questions, answers, and explanations for passing the test ent://SD_ILS/0/SD_ILS:986774 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Vallabhaneni, S. Rao.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=819012">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Introduction to cryptography with open-source software ent://SD_ILS/0/SD_ILS:1027312 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;McAndrew, Alasdair, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1633743">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Moodle security learn how to install and configure Moodle in the most secure way possible ent://SD_ILS/0/SD_ILS:996265 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Mileti&#263;, Darko.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=943988">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Thor's Microsoft security bible : a collection of practical security techniques ent://SD_ILS/0/SD_ILS:1183972 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Mullen, Timothy M.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495721">http://www.sciencedirect.com/science/book/9781597495721</a><br/>Format:&#160;Electronic Resources<br/> Advances in computers. Volume 83 ent://SD_ILS/0/SD_ILS:1183782 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Zelkowitz, Marvin V., 1945-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123855107">http://www.sciencedirect.com/science/book/9780123855107</a><br/>Format:&#160;Electronic Resources<br/> Eleventh hour CISSP : study guide ent://SD_ILS/0/SD_ILS:1183138 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Conrad, Eric, 1967-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495660">https://www.sciencedirect.com/science/book/9781597495660</a><br/>Format:&#160;Electronic Resources<br/> pfSense 2 cookbook a practical, example-driven guide to configure even the most advanced features of pfSense 2 ent://SD_ILS/0/SD_ILS:997027 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Williamson, Matt.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=950585">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IV. A&#287; ve Bilgi G&uuml;venli&#287;i Sempozyumu : bildiriler kitab&#305;, 25-26 Kas&#305;m 2011, Ankara. ent://SD_ILS/0/SD_ILS:1163977 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;A&#287; ve Bilgi G&uuml;venli&#287;i Sempozyumu (4th : 2011 : Ankara, Turkey)<br/>Format:&#160;Books<br/> The web application hacker's handbook finding and exploiting security flaws ent://SD_ILS/0/SD_ILS:986773 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Stuttard, Dafydd.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=819008">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Implementing SSL/TLS using cryptography and PKI ent://SD_ILS/0/SD_ILS:979007 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Davies, Joshua Dennis.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706899">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Client-Honeypots : exploring malicious websites ent://SD_ILS/0/SD_ILS:1017776 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;G&ouml;bel, Jan Gerrit, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1348689">Click to View</a><br/>Format:&#160;Electronic Resources<br/> WordPress 3 ultimate security protect your WordPress site and its network ent://SD_ILS/0/SD_ILS:996789 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Connelly, Olly.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948509">Click to View</a><br/>Format:&#160;Electronic Resources<br/> CMS security handbook the comprehensive guide for WordPress, Joomla!, Drupal, and Plone ent://SD_ILS/0/SD_ILS:979005 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Canavan, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706893">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IBM WebSphere application server V7.0 security secure your WebSphere applications with Java EE and JAAS security standards ent://SD_ILS/0/SD_ILS:996260 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Siliceo, Omar.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=943983">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Intrusion detection a machine learning approach ent://SD_ILS/0/SD_ILS:981161 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Tsai, Jeffrey J.-P.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=737642">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Use of risk analysis in computer-aided persuasion ent://SD_ILS/0/SD_ILS:988362 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Duman, Ekrem.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=836226">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security for service oriented systems ent://SD_ILS/0/SD_ILS:972345 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Thuraisingham, Bhavani M.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=631696">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Official (ISC)&sup2; guide to the ISSMP CBK ent://SD_ILS/0/SD_ILS:1146479 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Tipton, Harold F., editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5774439">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Thor's Microsoft security bible a collection of practical security techniques ent://SD_ILS/0/SD_ILS:137207 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Mullen, Timothy M.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495721">http://www.sciencedirect.com/science/book/9781597495721</a><br/>Format:&#160;Electronic Resources<br/> Ninja hacking : unconventional penetration testing tactics and techniques ent://SD_ILS/0/SD_ILS:1181828 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Wilhelm, Thomas.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495882">http://www.sciencedirect.com/science/book/9781597495882</a><br/>Format:&#160;Electronic Resources<br/> A bug hunter's diary a guided tour through the wilds of software security ent://SD_ILS/0/SD_ILS:1009945 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Klein, Tobias.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137526">Click to View</a><br/>Format:&#160;Electronic Resources<br/> PCI DSS : a practical guide to implementing and maintaining compliance ent://SD_ILS/0/SD_ILS:978724 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Wright, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=699178">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Social engineering the art of human hacking ent://SD_ILS/0/SD_ILS:978980 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Hadnagy, Christopher.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706746">Click to View</a><br/>Format:&#160;Electronic Resources<br/> BackTrack 5 wireless penetration testing beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 ent://SD_ILS/0/SD_ILS:996825 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Ramachandran, Vivek.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948547">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Oracle Identity and Access Manager 11g for administrators administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasks ent://SD_ILS/0/SD_ILS:996835 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Kumar, Atul.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948559">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The book of PF a no-nonsense guide to the OpenBSD firewall ent://SD_ILS/0/SD_ILS:1009941 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Hansteen, Peter N. M.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137522">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The Cloud understanding the security, privacy and trust challenges ent://SD_ILS/0/SD_ILS:987397 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Robinson, Neil, 1964-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=825129">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Software and systems safety specification and verification ent://SD_ILS/0/SD_ILS:984346 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Broy, Manfred.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=784589">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Windows Registry Forensics : Advanced Digital Forensic Analysis of the Windows Registry. ent://SD_ILS/0/SD_ILS:1183526 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Carvey, Harlan.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495806">https://www.sciencedirect.com/science/book/9781597495806</a><br/>Format:&#160;Electronic Resources<br/> Wars of disruption and resilience cybered conflict, power, and national security ent://SD_ILS/0/SD_ILS:1063343 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Demchak, Chris C.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3039013">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security administrator street smarts a real world guide to CompTIA security+ skills ent://SD_ILS/0/SD_ILS:978349 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Miller, David, 1959 Nov. 5-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=693686">Click to View</a><br/>Format:&#160;Electronic Resources<br/> CompTIA security+ deluxe study guide ent://SD_ILS/0/SD_ILS:978565 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Dulaney, Emmett A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=697705">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Industrial network security securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems ent://SD_ILS/0/SD_ILS:137208 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Knapp, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496452">http://www.sciencedirect.com/science/book/9781597496452</a><br/>Format:&#160;Electronic Resources<br/> Web application obfuscation -/WAFs..Evasion..Filters//alert (/Obfuscation/)- ent://SD_ILS/0/SD_ILS:137209 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Heiderich, Mario.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496049">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Cyber warfare : techniques, tactics and tools for security practitioners ent://SD_ILS/0/SD_ILS:1183816 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Andress, Jason.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496377">http://www.sciencedirect.com/science/book/9781597496377</a><br/>Format:&#160;Electronic Resources<br/> Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems ent://SD_ILS/0/SD_ILS:1184011 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Knapp, Eric.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496452">https://www.sciencedirect.com/science/book/9781597496452</a><br/>Format:&#160;Electronic Resources<br/> Metasploit the penetration tester's guide ent://SD_ILS/0/SD_ILS:1009966 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Kennedy, David, 1982-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137562">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing SQL server protecting your database from attackers ent://SD_ILS/0/SD_ILS:137191 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Cherry, Denny.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496254">http://www.sciencedirect.com/science/book/9781597496254</a><br/>Format:&#160;Electronic Resources<br/> Cyber attacks : protecting national infrastructure ent://SD_ILS/0/SD_ILS:1181825 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Amoroso, Edward G.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123849175">https://www.sciencedirect.com/science/book/9780123849175</a><br/>Format:&#160;Electronic Resources<br/> Securing SQL server : protecting your database from attackers ent://SD_ILS/0/SD_ILS:1183510 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Cherry, Denny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496254">https://www.sciencedirect.com/science/book/9781597496254</a><br/>Format:&#160;Electronic Resources<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:1183966 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Faircloth, Jeremy.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496278">http://www.sciencedirect.com/science/book/9781597496278</a><br/>Format:&#160;Electronic Resources<br/> The theory that would not die how Bayes' rule cracked the enigma code, hunted down Russian submarines, and emerged triumphant from two centuries of controversy ent://SD_ILS/0/SD_ILS:1095786 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;McGrayne, Sharon Bertsch.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3420687">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Understanding motion capture for computer animation ent://SD_ILS/0/SD_ILS:1183275 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Menache, Alberto, 1961-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123814968">https://www.sciencedirect.com/science/book/9780123814968</a><br/>Format:&#160;Electronic Resources<br/> Architecture of network systems ent://SD_ILS/0/SD_ILS:1183681 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Serpanos, Dimitrios Nikolaou.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123744944">https://www.sciencedirect.com/science/book/9780123744944</a><br/>Format:&#160;Electronic Resources<br/> 21st European symposium on computer aided process engineering ent://SD_ILS/0/SD_ILS:1183947 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;European Symposium on Computer Aided Process Engineering (21st : 2011 : Chalkidiki, Greece)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444538956">http://www.sciencedirect.com/science/book/9780444538956</a><br/>Format:&#160;Electronic Resources<br/> Architecture of network systems ent://SD_ILS/0/SD_ILS:137196 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Serpanos, Dimitrios Nikolaou.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123744944">http://www.sciencedirect.com/science/book/9780123744944</a><br/>Format:&#160;Electronic Resources<br/> Securing the smart grid : next generation power grid security ent://SD_ILS/0/SD_ILS:1181832 2026-01-17T04:50:25Z 2026-01-17T04:50:25Z by&#160;Flick, Tony.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495707">https://www.sciencedirect.com/science/book/9781597495707</a><br/>Format:&#160;Electronic Resources<br/>