Search Results for Computer security. - Narrowed by: 0489SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$0025090489$0025090489$0026ps$003d300;jsessionid=C6C56F9C910561B4377333447B8F871F?2026-01-13T22:21:57ZLeveraging Bluetooth as a Second Factor in Two-factor Authenticationent://SD_ILS/0/SD_ILS:6880722026-01-13T22:21:57Z2026-01-13T22:21:57Zby Wright-Hamor, Cimone Le, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10680612">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10680612</a><br/>Format: Books<br/>Moderating Neutralization Techniques in Information Security Violations through Expertise: A Correlational Studyent://SD_ILS/0/SD_ILS:6951742026-01-13T22:21:57Z2026-01-13T22:21:57Zby Miller, Bruce, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10830199">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10830199</a><br/>Format: Books<br/>The History of Steganography and the Threat Posed to the United States and the Rest of the International Communityent://SD_ILS/0/SD_ILS:6929952026-01-13T22:21:57Z2026-01-13T22:21:57Zby Burney, Micaela L., author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10815667">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10815667</a><br/>Format: Books<br/>Assessing Security Architectures to Protect Against Malware in Embedded Narrow Artificial Intelligence Robotsent://SD_ILS/0/SD_ILS:6874232026-01-13T22:21:57Z2026-01-13T22:21:57Zby Sylvertooth, Randall Earl, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10902464">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10902464</a><br/>Format: Books<br/>A Study on How Cyber Economic Espionage Affects U.S. National Security and Competitivenessent://SD_ILS/0/SD_ILS:6948072026-01-13T22:21:57Z2026-01-13T22:21:57Zby Mayers, Adrian Merton, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10828940">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10828940</a><br/>Format: Books<br/>