Search Results for Computer security. - Narrowed by: 0489 SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$0025090489$0025090489$0026ps$003d300;jsessionid=C6C56F9C910561B4377333447B8F871F? 2026-01-13T22:21:57Z Leveraging Bluetooth as a Second Factor in Two-factor Authentication ent://SD_ILS/0/SD_ILS:688072 2026-01-13T22:21:57Z 2026-01-13T22:21:57Z by&#160;Wright-Hamor, Cimone Le, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10680612">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10680612</a><br/>Format:&#160;Books<br/> Moderating Neutralization Techniques in Information Security Violations through Expertise: A Correlational Study ent://SD_ILS/0/SD_ILS:695174 2026-01-13T22:21:57Z 2026-01-13T22:21:57Z by&#160;Miller, Bruce, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10830199">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10830199</a><br/>Format:&#160;Books<br/> The History of Steganography and the Threat Posed to the United States and the Rest of the International Community ent://SD_ILS/0/SD_ILS:692995 2026-01-13T22:21:57Z 2026-01-13T22:21:57Z by&#160;Burney, Micaela L., author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10815667">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10815667</a><br/>Format:&#160;Books<br/> Assessing Security Architectures to Protect Against Malware in Embedded Narrow Artificial Intelligence Robots ent://SD_ILS/0/SD_ILS:687423 2026-01-13T22:21:57Z 2026-01-13T22:21:57Z by&#160;Sylvertooth, Randall Earl, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10902464">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10902464</a><br/>Format:&#160;Books<br/> A Study on How Cyber Economic Espionage Affects U.S. National Security and Competitiveness ent://SD_ILS/0/SD_ILS:694807 2026-01-13T22:21:57Z 2026-01-13T22:21:57Z by&#160;Mayers, Adrian Merton, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10828940">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10828940</a><br/>Format:&#160;Books<br/>