Search Results for Computer security. - Narrowed by: 0489SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$0025090489$0025090489$0026ps$003d300?dt=list2026-04-04T17:58:24ZLeveraging Bluetooth as a Second Factor in Two-factor Authenticationent://SD_ILS/0/SD_ILS:6880722026-04-04T17:58:24Z2026-04-04T17:58:24Zby Wright-Hamor, Cimone Le, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10680612">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10680612</a><br/>Format: Books<br/>The History of Steganography and the Threat Posed to the United States and the Rest of the International Communityent://SD_ILS/0/SD_ILS:6929952026-04-04T17:58:24Z2026-04-04T17:58:24Zby Burney, Micaela L., author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10815667">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10815667</a><br/>Format: Books<br/>Moderating Neutralization Techniques in Information Security Violations through Expertise: A Correlational Studyent://SD_ILS/0/SD_ILS:6951742026-04-04T17:58:24Z2026-04-04T17:58:24Zby Miller, Bruce, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10830199">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10830199</a><br/>Format: Books<br/>Assessing Security Architectures to Protect Against Malware in Embedded Narrow Artificial Intelligence Robotsent://SD_ILS/0/SD_ILS:6874232026-04-04T17:58:24Z2026-04-04T17:58:24Zby Sylvertooth, Randall Earl, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10902464">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10902464</a><br/>Format: Books<br/>A Study on How Cyber Economic Espionage Affects U.S. National Security and Competitivenessent://SD_ILS/0/SD_ILS:6948072026-04-04T17:58:24Z2026-04-04T17:58:24Zby Mayers, Adrian Merton, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10828940">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10828940</a><br/>Format: Books<br/>