Search Results for Computer security. - Narrowed by: Data protection. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300?dt=list 2026-01-05T14:27:44Z Information assurance and computer security ent://SD_ILS/0/SD_ILS:938176 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;NATO Advanced Research Workshop on Information Assurance and Computer Security (2005 : T?etouan, Morocco)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=287000">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Privacy protection and computer forensics ent://SD_ILS/0/SD_ILS:931051 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Caloyannides, Michael A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227692">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Techniques and applications of digital watermarking and content protection ent://SD_ILS/0/SD_ILS:930949 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Arnold, Michael (Michael Konrad), 1964-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227587">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Digital watermarking and steganography ent://SD_ILS/0/SD_ILS:944015 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Cox, I. J. (Ingemar J.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328311">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Digital watermarking and steganography ent://SD_ILS/0/SD_ILS:1189196 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Cox, I. J. (Ingemar J.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123725851">http://www.sciencedirect.com/science/book/9780123725851</a><br/>Format:&#160;Electronic Resources<br/> An introduction to information security and ISO27001:2013 : a pocket guide ent://SD_ILS/0/SD_ILS:1020992 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Watkins, Steve G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1463578">Click to View</a><br/>Format:&#160;Electronic Resources<br/> ISO27001 / ISO27002 : a pocket guide ent://SD_ILS/0/SD_ILS:1020993 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Calder, Alan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1463579">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information technology security fundamentals ent://SD_ILS/0/SD_ILS:1102697 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Sagers, Glen., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4009415">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Pragmatic security metrics applying metametrics to information security ent://SD_ILS/0/SD_ILS:1010972 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Brotby, W. Krag.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1153198">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Insider threat : protecting the enterprise from sabotage, spying, and theft ent://SD_ILS/0/SD_ILS:1188259 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Cole, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format:&#160;Electronic Resources<br/> Security in the digital world : for the home user, parent, consumer and home office ent://SD_ILS/0/SD_ILS:1133712 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Day, Graham, 1945- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5211340">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The information systems security officer's guide : establishing and managing a cyber security program ent://SD_ILS/0/SD_ILS:1105580 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Kovacich, Gerald L., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4334673">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security leader insights for information protection : lessons and strategies from leading security professionals ent://SD_ILS/0/SD_ILS:1032265 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Fahy, Bob, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1699254">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data hiding exposing concealed data in multimedia, operating systems, mobile devices, and network protocols ent://SD_ILS/0/SD_ILS:1003916 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Raggo, Michael T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073014">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Getting started with FortiGate ent://SD_ILS/0/SD_ILS:1023474 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Fabbri, Rosato.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572901">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Implementing database security and auditing ent://SD_ILS/0/SD_ILS:938079 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Ben-Natan, Ron.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=286701">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Black hat physical device security exploiting hardware and software ent://SD_ILS/0/SD_ILS:930209 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Miller, Drew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=222851">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Technology and privacy the new landscape ent://SD_ILS/0/SD_ILS:1081109 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Agre, Philip.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3338469">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Solving cyber risk : protecting your company and society ent://SD_ILS/0/SD_ILS:1143948 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Coburn, Andrew (Andrew W.), author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5614240">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The definitive guide to the C&amp;A transformation the first publication of a comprehensive view of the C&amp;A transformation ent://SD_ILS/0/SD_ILS:965453 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Mehan, Julie E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=547041">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Enterprise information security and privacy ent://SD_ILS/0/SD_ILS:956331 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Axelrod, C. Warren.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456886">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information security policy, processes, and practices ent://SD_ILS/0/SD_ILS:953297 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Straub, Detmar W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=435197">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Papers from the first European workshop on technological &amp; security issues in digital rights management (EuDiRights) ent://SD_ILS/0/SD_ILS:939160 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Yag&uuml;e, Mariemma.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=291585">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Finding and fixing vulnerabilities in information systems the vulnerability assessment &amp; mitigation methodology ent://SD_ILS/0/SD_ILS:927792 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Ant&oacute;n, Philip S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=197482">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information security a manager's guide to thwarting data thieves and hackers ent://SD_ILS/0/SD_ILS:945288 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Alexander, Philip, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=339307">Click to View</a><br/>Format:&#160;Electronic Resources<br/> A process for developing a common vocabulary in the information security area ent://SD_ILS/0/SD_ILS:943478 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;NATO Advanced Research Workshop on a Process for Developing a Common Vocabulary in the Information Security Area (2006 : Moscow, Russia)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=320313">Click to View</a><br/>Format:&#160;Electronic Resources<br/> FISMA certification &amp; accreditation handbook ent://SD_ILS/0/SD_ILS:1188277 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Taylor, Laura.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">http://www.sciencedirect.com/science/book/9781597491167</a><br/>Format:&#160;Electronic Resources<br/> Implementing database security and auditing : a guide for DBAs, information security administrators and auditors ent://SD_ILS/0/SD_ILS:1188115 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Ben-Natan, Ron.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">http://www.sciencedirect.com/science/book/9781555583347</a><br/>Format:&#160;Electronic Resources<br/> Digital watermarking ent://SD_ILS/0/SD_ILS:1188154 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Cox, I. J. (Ingemar J.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607149">http://www.sciencedirect.com/science/book/9781558607149</a><br/>Format:&#160;Electronic Resources<br/> Information security management principles ent://SD_ILS/0/SD_ILS:1014889 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Alexander, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1213992">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information security management : concepts and practice ent://SD_ILS/0/SD_ILS:1020747 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Raggad, Bel G., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1449482">Click to View</a><br/>Format:&#160;Electronic Resources<br/> A practical guide to managing information security ent://SD_ILS/0/SD_ILS:931291 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Purser, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=231645">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data protection and the cloud-are you really managing the risks? ent://SD_ILS/0/SD_ILS:1147076 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Ticher, Paul, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5796955">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security and privacy in cyber-physical systems : foundations, principles, and applications ent://SD_ILS/0/SD_ILS:1129049 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Song, Houbing, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4987646">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data hiding techniques in Windows OS : a practical approach to investigation and defense ent://SD_ILS/0/SD_ILS:1117764 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Hassan, Nihad Ahmad, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4676113">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Loseless information : hiding in images ent://SD_ILS/0/SD_ILS:1120646 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Lu, Zhe-Ming, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4743573">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Nine steps to succes : an ISO 27001: 2013 implementation overview ent://SD_ILS/0/SD_ILS:1111189 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4519667">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data protection and the cloud : are the risks too great? ent://SD_ILS/0/SD_ILS:1053835 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Ticher, Paul, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192125">Click to View</a><br/>Format:&#160;Electronic Resources<br/> CMS security handbook the comprehensive guide for WordPress, Joomla!, Drupal, and Plone ent://SD_ILS/0/SD_ILS:979005 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Canavan, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706893">Click to View</a><br/>Format:&#160;Electronic Resources<br/> WordPress 3 ultimate security protect your WordPress site and its network ent://SD_ILS/0/SD_ILS:996789 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Connelly, Olly.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948509">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Use of risk analysis in computer-aided persuasion ent://SD_ILS/0/SD_ILS:988362 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Duman, Ekrem.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=836226">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Sosyal m&uuml;hendislik, bilgi g&uuml;venli&#287;i ve end&uuml;stri 4.0 ent://SD_ILS/0/SD_ILS:1234739 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;&Ouml;zmen, Cevdet<br/>Format:&#160;Books<br/> Fikir ve sanat eserlerinin korunmas&#305; : (protection of intellectual property rights) ent://SD_ILS/0/SD_ILS:123346 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Sert, Selin<br/>Format:&#160;Books<br/> You : for sale protecting your personal data and privacy online ent://SD_ILS/0/SD_ILS:1053757 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Sumner, Stuart, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2187472">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Digital identity management ent://SD_ILS/0/SD_ILS:1047336 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Laurent, Maryline, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2007485">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information security for management ent://SD_ILS/0/SD_ILS:1056793 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Iyengar, Venugopal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3011230">Click to View</a><br/>Format:&#160;Electronic Resources<br/> ISO 37001 : an introduction to anti-bribery management systems : doing the right things ent://SD_ILS/0/SD_ILS:1133711 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Field, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5211339">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information protection playbook ent://SD_ILS/0/SD_ILS:1019990 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Kane, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1418381">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Advances in artificial intelligence for privacy protection and security ent://SD_ILS/0/SD_ILS:1030272 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Solanas, Agusti.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1679374">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Intelligent watermarking techniques ent://SD_ILS/0/SD_ILS:931269 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Pan, Jeng-Shyang.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=231561">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Crackproof your software the best ways to protect your software against crackers ent://SD_ILS/0/SD_ILS:936564 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;C&#774;erv&#277;n, Pavol.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273482">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information warfare ent://SD_ILS/0/SD_ILS:1006247 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Ventre, Daniel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1106528">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Protecting your library's digital sources the essential guide to planning and preservation ent://SD_ILS/0/SD_ILS:930096 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Kahn, Miriam (Miriam B.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=218937">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Digital privacy in the marketplace : perspectives on the information exchange ent://SD_ILS/0/SD_ILS:1044912 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Milne, George R., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1920895">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Infosecurity 2008 threat analysis ent://SD_ILS/0/SD_ILS:1190000 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Clark, Champ, III.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492249">https://www.sciencedirect.com/science/book/9781597492249</a><br/>Format:&#160;Electronic Resources<br/> Netcat power tools ent://SD_ILS/0/SD_ILS:1189704 2026-01-05T14:27:44Z 2026-01-05T14:27:44Z by&#160;Kanclirz, Jan.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492577">https://www.sciencedirect.com/science/book/9781597492577</a><br/>Format:&#160;Electronic Resources<br/>