Search Results for Computer security. - Narrowed by: Computer viruses.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bviruses.$002509Computer$002bviruses.$0026ic$003dtrue$0026ps$003d300?dt=list2026-04-05T13:59:24ZDefense and detection strategies against Internet wormsent://SD_ILS/0/SD_ILS:9310192026-04-05T13:59:24Z2026-04-05T13:59:24Zby Nazario, Jose.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227660">Click to View</a><br/>Format: Electronic Resources<br/>AVIEN malware defense guide for the Enterpriseent://SD_ILS/0/SD_ILS:11891042026-04-05T13:59:24Z2026-04-05T13:59:24Zby Harley, David.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491648">https://www.sciencedirect.com/science/book/9781597491648</a><br/>Format: Electronic Resources<br/>Malware forensics : investigating and analyzing malicious codeent://SD_ILS/0/SD_ILS:11896362026-04-05T13:59:24Z2026-04-05T13:59:24Zby Aquilina, James M.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492683">http://www.sciencedirect.com/science/book/9781597492683</a><br/>Format: Electronic Resources<br/>Buffer overflow attacks : detect, exploit, preventent://SD_ILS/0/SD_ILS:11884072026-04-05T13:59:24Z2026-04-05T13:59:24Zby Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266672">http://www.sciencedirect.com/science/book/9781932266672</a><br/>Format: Electronic Resources<br/>Configuring Symantec Antivirus, Corporate Editionent://SD_ILS/0/SD_ILS:9394622026-04-05T13:59:24Z2026-04-05T13:59:24Zby Hunter, Laura E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294056">Click to View</a><br/>Format: Electronic Resources<br/>Malware forensics field guide for Windows systems digital forensics field guidesent://SD_ILS/0/SD_ILS:9951892026-04-05T13:59:24Z2026-04-05T13:59:24Zby Malin, Cameron H.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=921016">Click to View</a><br/>Format: Electronic Resources<br/>Practical malware analysis the hands-on guide to dissecting malicious softwareent://SD_ILS/0/SD_ILS:10099722026-04-05T13:59:24Z2026-04-05T13:59:24Zby Sikorski, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137570">Click to View</a><br/>Format: Electronic Resources<br/>Automatic defense against zero-day polymorphic worms in communication networksent://SD_ILS/0/SD_ILS:10152612026-04-05T13:59:24Z2026-04-05T13:59:24Zby Mohammed, Mohssen, 1982- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1220106">Click to View</a><br/>Format: Electronic Resources<br/>Seven deadliest Microsoft attacksent://SD_ILS/0/SD_ILS:11774792026-04-05T13:59:24Z2026-04-05T13:59:24Zby Kraus, Rob.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495516">https://www.sciencedirect.com/science/book/9781597495516</a><br/>Format: Electronic Resources<br/>Configuring Symantec Antivirus, Corporate Editionent://SD_ILS/0/SD_ILS:11883892026-04-05T13:59:24Z2026-04-05T13:59:24Zby Hunter, Laura E.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836814">http://www.sciencedirect.com/science/book/9781931836814</a><br/>Format: Electronic Resources<br/>