Search Results for Computer security. - Narrowed by: Computer science.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bscience.$002509Computer$002bscience.$0026ic$003dtrue$0026ps$003d300?dt=list2026-03-30T15:55:19ZBATSEN: Modifying the BATMAN Routing Protocol for Wireless Sensor Networksent://SD_ILS/0/SD_ILS:6932762026-03-30T15:55:19Z2026-03-30T15:55:19Zby Powell, Nelson Henry, III, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10816780">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10816780</a><br/>Format: Books<br/>The basics of information security understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:1335922026-03-30T15:55:19Z2026-03-30T15:55:19Zby Andress, Jason.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Electronic Resources<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:11838152026-03-30T15:55:19Z2026-03-30T15:55:19Zby Andress, Jason.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496537">https://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Electronic Resources<br/>Practical anonymity hiding in plain sight onlineent://SD_ILS/0/SD_ILS:10076142026-03-30T15:55:19Z2026-03-30T15:55:19Zby Loshin, Peter.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115167">Click to View</a><br/>Format: Electronic Resources<br/>SSCP study guide and & DVD training systement://SD_ILS/0/SD_ILS:9395782026-03-30T15:55:19Z2026-03-30T15:55:19Zby Jacobs, Josh.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294375">Click to View</a><br/>Format: Electronic Resources<br/>Eleventh hour CISSP : study guideent://SD_ILS/0/SD_ILS:11831382026-03-30T15:55:19Z2026-03-30T15:55:19Zby Conrad, Eric, 1967-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495660">https://www.sciencedirect.com/science/book/9781597495660</a><br/>Format: Electronic Resources<br/>Cybersecurity for Industry 4.0 Analysis for Design and Manufacturingent://SD_ILS/0/SD_ILS:4809242026-03-30T15:55:19Z2026-03-30T15:55:19Zby Thames, Lane. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-50660-9">http://dx.doi.org/10.1007/978-3-319-50660-9</a><br/>Format: Electronic Resources<br/>Securing SQL server protecting your database from attackersent://SD_ILS/0/SD_ILS:1371912026-03-30T15:55:19Z2026-03-30T15:55:19Zby Cherry, Denny.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496254">http://www.sciencedirect.com/science/book/9781597496254</a><br/>Format: Electronic Resources<br/>Advances in computers. Volume 29ent://SD_ILS/0/SD_ILS:11904752026-03-30T15:55:19Z2026-03-30T15:55:19Zby Yovits, M. C. (Marshall Clinton)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780120121298">http://www.sciencedirect.com/science/book/9780120121298</a>
ScienceDirect <a href="http://www.sciencedirect.com/science/bookseries/00652458/29">http://www.sciencedirect.com/science/bookseries/00652458/29</a><br/>Format: Electronic Resources<br/>Advances in computers. Volume 38ent://SD_ILS/0/SD_ILS:11904732026-03-30T15:55:19Z2026-03-30T15:55:19Zby Yovits, M. C. (Marshall Clinton)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780120121380">http://www.sciencedirect.com/science/book/9780120121380</a><br/>Format: Electronic Resources<br/>Cyber-Physical Security of an Electric Microgrident://SD_ILS/0/SD_ILS:6908682026-03-30T15:55:19Z2026-03-30T15:55:19Zby Palaniswamy, Prashanth, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10792606">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10792606</a><br/>Format: Books<br/>Visualizing the Motion Flow of Crowdsent://SD_ILS/0/SD_ILS:6917102026-03-30T15:55:19Z2026-03-30T15:55:19Zby Zhao, Zheng, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10809903">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10809903</a><br/>Format: Books<br/>Strategic Engineering for Cloud Computing and Big Data Analyticsent://SD_ILS/0/SD_ILS:4810492026-03-30T15:55:19Z2026-03-30T15:55:19Zby Hosseinian-Far, Amin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-52491-7">http://dx.doi.org/10.1007/978-3-319-52491-7</a><br/>Format: Electronic Resources<br/>Advances in computers. Volume 55ent://SD_ILS/0/SD_ILS:11904652026-03-30T15:55:19Z2026-03-30T15:55:19Zby Zelkowitz, Marvin V., 1945-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780120121557">https://www.sciencedirect.com/science/book/9780120121557</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/bookseries/00652458/55">https://www.sciencedirect.com/science/bookseries/00652458/55</a><br/>Format: Electronic Resources<br/>Specificationless Intrusion Detection Using Thermodynamic Formalism of Free Energyent://SD_ILS/0/SD_ILS:6880462026-03-30T15:55:19Z2026-03-30T15:55:19Zby Hutton, William James, III., author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10641513">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10641513</a><br/>Format: Books<br/>Malware Detection and Cyber Security via Compressionent://SD_ILS/0/SD_ILS:6806592026-03-30T15:55:19Z2026-03-30T15:55:19Zby Raff, Edward, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10811037">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10811037</a><br/>Format: Books<br/>Private and Trustworthy Computation Using Additive Cryptographic Primitivesent://SD_ILS/0/SD_ILS:6780552026-03-30T15:55:19Z2026-03-30T15:55:19Zby Tsoutsos, Nektarios Georgios, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10642986">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10642986</a><br/>Format: Books<br/>Behavioral Based Biometrics Using Keystroke Dynamics for User Authenticationent://SD_ILS/0/SD_ILS:6928012026-03-30T15:55:19Z2026-03-30T15:55:19Zby Ogemuno, Emamuzo Cletus, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10814998">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10814998</a><br/>Format: Books<br/>The History of Steganography and the Threat Posed to the United States and the Rest of the International Communityent://SD_ILS/0/SD_ILS:6929952026-03-30T15:55:19Z2026-03-30T15:55:19Zby Burney, Micaela L., author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10815667">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10815667</a><br/>Format: Books<br/>A Secure and Low-Power Consumption Communication Mechanism for IoT (Internet of Things) and Wireless Sensor Networksent://SD_ILS/0/SD_ILS:6963972026-03-30T15:55:19Z2026-03-30T15:55:19Zby Bandekar, Ashutosh, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10901969">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10901969</a><br/>Format: Books<br/>Assessing Security Architectures to Protect Against Malware in Embedded Narrow Artificial Intelligence Robotsent://SD_ILS/0/SD_ILS:6874232026-03-30T15:55:19Z2026-03-30T15:55:19Zby Sylvertooth, Randall Earl, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10902464">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10902464</a><br/>Format: Books<br/>Advances in computers. Vol. 74, Software development.ent://SD_ILS/0/SD_ILS:11894542026-03-30T15:55:19Z2026-03-30T15:55:19Zby Zelkowitz, Marvin V., 1945-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123744265">https://www.sciencedirect.com/science/book/9780123744265</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/bookseries/00652458/74">https://www.sciencedirect.com/science/bookseries/00652458/74</a><br/>Format: Electronic Resources<br/>Hierarchical Representation Learning with Connectionist Modelsent://SD_ILS/0/SD_ILS:6966882026-03-30T15:55:19Z2026-03-30T15:55:19Zby Wang, De, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10903178">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10903178</a><br/>Format: Books<br/>Mitigating Privilege Escalationent://SD_ILS/0/SD_ILS:6818272026-03-30T15:55:19Z2026-03-30T15:55:19Zby Brookes, Scott, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10822683">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10822683</a><br/>Format: Books<br/>VLSI implementation of public key cryptography algorithmsent://SD_ILS/0/SD_ILS:6838812026-03-30T15:55:19Z2026-03-30T15:55:19Zby Keshavarzi, Parviz, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10836298">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10836298</a><br/>Format: Books<br/>Computing perspectivesent://SD_ILS/0/SD_ILS:11782082026-03-30T15:55:19Z2026-03-30T15:55:19Zby Wilkes, M. V. (Maurice Vincent)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780080502687">http://www.sciencedirect.com/science/book/9780080502687</a><br/>Format: Electronic Resources<br/>Advances in computers. Volume 12ent://SD_ILS/0/SD_ILS:11897562026-03-30T15:55:19Z2026-03-30T15:55:19Zby Rubinoff, Morris.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780120121120">https://www.sciencedirect.com/science/book/9780120121120</a>
ScienceDirect <a href="https://www.sciencedirect.com/science/bookseries/00652458/12">https://www.sciencedirect.com/science/bookseries/00652458/12</a>
ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780120121120">http://www.sciencedirect.com/science/book/9780120121120</a>
ScienceDirect <a href="http://www.sciencedirect.com/science/bookseries/00652458/12">http://www.sciencedirect.com/science/bookseries/00652458/12</a><br/>Format: Electronic Resources<br/>