Search Results for Computer security. - Narrowed by: Data mining.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Data$002bmining.$002509Data$002bmining.$0026ps$003d300?dt=list2026-04-03T19:57:11ZInformation security risk assessment toolkit practical assessments through data collection and data analysisent://SD_ILS/0/SD_ILS:10028372026-04-03T19:57:11Z2026-04-03T19:57:11Zby Talabis, Mark Ryan N.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1047930">Click to View</a><br/>Format: Electronic Resources<br/>Detection and intelligent systems for homeland security.ent://SD_ILS/0/SD_ILS:10257272026-04-03T19:57:11Z2026-04-03T19:57:11Zby Voeller, John G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1598817">Click to View</a><br/>Format: Electronic Resources<br/>Data mining tools for malware detectionent://SD_ILS/0/SD_ILS:9874612026-04-03T19:57:11Z2026-04-03T19:57:11Zby Masud, Mehedy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826949">Click to View</a><br/>Format: Electronic Resources<br/>Business Resilience System (BRS): Driven Through Boolean, Fuzzy Logics and Cloud Computation Real and Near Real Time Analysis and Decision Making Systement://SD_ILS/0/SD_ILS:4811092026-04-03T19:57:11Z2026-04-03T19:57:11Zby Zohuri, Bahman. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-53417-6">http://dx.doi.org/10.1007/978-3-319-53417-6</a><br/>Format: Electronic Resources<br/>