Search Results for Computer security. - Narrowed by: Data protection.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300?dt=list2026-01-05T14:27:44ZInformation assurance and computer securityent://SD_ILS/0/SD_ILS:9381762026-01-05T14:27:44Z2026-01-05T14:27:44Zby NATO Advanced Research Workshop on Information Assurance and Computer Security (2005 : T?etouan, Morocco)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=287000">Click to View</a><br/>Format: Electronic Resources<br/>Privacy protection and computer forensicsent://SD_ILS/0/SD_ILS:9310512026-01-05T14:27:44Z2026-01-05T14:27:44Zby Caloyannides, Michael A.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227692">Click to View</a><br/>Format: Electronic Resources<br/>Techniques and applications of digital watermarking and content protectionent://SD_ILS/0/SD_ILS:9309492026-01-05T14:27:44Z2026-01-05T14:27:44Zby Arnold, Michael (Michael Konrad), 1964-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227587">Click to View</a><br/>Format: Electronic Resources<br/>Digital watermarking and steganographyent://SD_ILS/0/SD_ILS:9440152026-01-05T14:27:44Z2026-01-05T14:27:44Zby Cox, I. J. (Ingemar J.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=328311">Click to View</a><br/>Format: Electronic Resources<br/>Digital watermarking and steganographyent://SD_ILS/0/SD_ILS:11891962026-01-05T14:27:44Z2026-01-05T14:27:44Zby Cox, I. J. (Ingemar J.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123725851">http://www.sciencedirect.com/science/book/9780123725851</a><br/>Format: Electronic Resources<br/>An introduction to information security and ISO27001:2013 : a pocket guideent://SD_ILS/0/SD_ILS:10209922026-01-05T14:27:44Z2026-01-05T14:27:44Zby Watkins, Steve G.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1463578">Click to View</a><br/>Format: Electronic Resources<br/>ISO27001 / ISO27002 : a pocket guideent://SD_ILS/0/SD_ILS:10209932026-01-05T14:27:44Z2026-01-05T14:27:44Zby Calder, Alan.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1463579">Click to View</a><br/>Format: Electronic Resources<br/>Information technology security fundamentalsent://SD_ILS/0/SD_ILS:11026972026-01-05T14:27:44Z2026-01-05T14:27:44Zby Sagers, Glen., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4009415">Click to View</a><br/>Format: Electronic Resources<br/>Pragmatic security metrics applying metametrics to information securityent://SD_ILS/0/SD_ILS:10109722026-01-05T14:27:44Z2026-01-05T14:27:44Zby Brotby, W. Krag.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1153198">Click to View</a><br/>Format: Electronic Resources<br/>Insider threat : protecting the enterprise from sabotage, spying, and theftent://SD_ILS/0/SD_ILS:11882592026-01-05T14:27:44Z2026-01-05T14:27:44Zby Cole, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format: Electronic Resources<br/>Security in the digital world : for the home user, parent, consumer and home officeent://SD_ILS/0/SD_ILS:11337122026-01-05T14:27:44Z2026-01-05T14:27:44Zby Day, Graham, 1945- author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5211340">Click to View</a><br/>Format: Electronic Resources<br/>The information systems security officer's guide : establishing and managing a cyber security programent://SD_ILS/0/SD_ILS:11055802026-01-05T14:27:44Z2026-01-05T14:27:44Zby Kovacich, Gerald L., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4334673">Click to View</a><br/>Format: Electronic Resources<br/>Security leader insights for information protection : lessons and strategies from leading security professionalsent://SD_ILS/0/SD_ILS:10322652026-01-05T14:27:44Z2026-01-05T14:27:44Zby Fahy, Bob, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1699254">Click to View</a><br/>Format: Electronic Resources<br/>Data hiding exposing concealed data in multimedia, operating systems, mobile devices, and network protocolsent://SD_ILS/0/SD_ILS:10039162026-01-05T14:27:44Z2026-01-05T14:27:44Zby Raggo, Michael T.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1073014">Click to View</a><br/>Format: Electronic Resources<br/>Getting started with FortiGateent://SD_ILS/0/SD_ILS:10234742026-01-05T14:27:44Z2026-01-05T14:27:44Zby Fabbri, Rosato.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572901">Click to View</a><br/>Format: Electronic Resources<br/>Implementing database security and auditingent://SD_ILS/0/SD_ILS:9380792026-01-05T14:27:44Z2026-01-05T14:27:44Zby Ben-Natan, Ron.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=286701">Click to View</a><br/>Format: Electronic Resources<br/>Black hat physical device security exploiting hardware and softwareent://SD_ILS/0/SD_ILS:9302092026-01-05T14:27:44Z2026-01-05T14:27:44Zby Miller, Drew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=222851">Click to View</a><br/>Format: Electronic Resources<br/>Technology and privacy the new landscapeent://SD_ILS/0/SD_ILS:10811092026-01-05T14:27:44Z2026-01-05T14:27:44Zby Agre, Philip.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3338469">Click to View</a><br/>Format: Electronic Resources<br/>Solving cyber risk : protecting your company and societyent://SD_ILS/0/SD_ILS:11439482026-01-05T14:27:44Z2026-01-05T14:27:44Zby Coburn, Andrew (Andrew W.), author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5614240">Click to View</a><br/>Format: Electronic Resources<br/>The definitive guide to the C&A transformation the first publication of a comprehensive view of the C&A transformationent://SD_ILS/0/SD_ILS:9654532026-01-05T14:27:44Z2026-01-05T14:27:44Zby Mehan, Julie E.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=547041">Click to View</a><br/>Format: Electronic Resources<br/>Enterprise information security and privacyent://SD_ILS/0/SD_ILS:9563312026-01-05T14:27:44Z2026-01-05T14:27:44Zby Axelrod, C. Warren.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=456886">Click to View</a><br/>Format: Electronic Resources<br/>Information security policy, processes, and practicesent://SD_ILS/0/SD_ILS:9532972026-01-05T14:27:44Z2026-01-05T14:27:44Zby Straub, Detmar W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=435197">Click to View</a><br/>Format: Electronic Resources<br/>Papers from the first European workshop on technological & security issues in digital rights management (EuDiRights)ent://SD_ILS/0/SD_ILS:9391602026-01-05T14:27:44Z2026-01-05T14:27:44Zby Yagüe, Mariemma.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=291585">Click to View</a><br/>Format: Electronic Resources<br/>Finding and fixing vulnerabilities in information systems the vulnerability assessment & mitigation methodologyent://SD_ILS/0/SD_ILS:9277922026-01-05T14:27:44Z2026-01-05T14:27:44Zby Antón, Philip S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=197482">Click to View</a><br/>Format: Electronic Resources<br/>Information security a manager's guide to thwarting data thieves and hackersent://SD_ILS/0/SD_ILS:9452882026-01-05T14:27:44Z2026-01-05T14:27:44Zby Alexander, Philip, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=339307">Click to View</a><br/>Format: Electronic Resources<br/>A process for developing a common vocabulary in the information security areaent://SD_ILS/0/SD_ILS:9434782026-01-05T14:27:44Z2026-01-05T14:27:44Zby NATO Advanced Research Workshop on a Process for Developing a Common Vocabulary in the Information Security Area (2006 : Moscow, Russia)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=320313">Click to View</a><br/>Format: Electronic Resources<br/>FISMA certification & accreditation handbookent://SD_ILS/0/SD_ILS:11882772026-01-05T14:27:44Z2026-01-05T14:27:44Zby Taylor, Laura.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">http://www.sciencedirect.com/science/book/9781597491167</a><br/>Format: Electronic Resources<br/>Implementing database security and auditing : a guide for DBAs, information security administrators and auditorsent://SD_ILS/0/SD_ILS:11881152026-01-05T14:27:44Z2026-01-05T14:27:44Zby Ben-Natan, Ron.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">http://www.sciencedirect.com/science/book/9781555583347</a><br/>Format: Electronic Resources<br/>Digital watermarkingent://SD_ILS/0/SD_ILS:11881542026-01-05T14:27:44Z2026-01-05T14:27:44Zby Cox, I. J. (Ingemar J.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607149">http://www.sciencedirect.com/science/book/9781558607149</a><br/>Format: Electronic Resources<br/>Information security management principlesent://SD_ILS/0/SD_ILS:10148892026-01-05T14:27:44Z2026-01-05T14:27:44Zby Alexander, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1213992">Click to View</a><br/>Format: Electronic Resources<br/>Information security management : concepts and practiceent://SD_ILS/0/SD_ILS:10207472026-01-05T14:27:44Z2026-01-05T14:27:44Zby Raggad, Bel G., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1449482">Click to View</a><br/>Format: Electronic Resources<br/>A practical guide to managing information securityent://SD_ILS/0/SD_ILS:9312912026-01-05T14:27:44Z2026-01-05T14:27:44Zby Purser, Steve.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=231645">Click to View</a><br/>Format: Electronic Resources<br/>Data protection and the cloud-are you really managing the risks?ent://SD_ILS/0/SD_ILS:11470762026-01-05T14:27:44Z2026-01-05T14:27:44Zby Ticher, Paul, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5796955">Click to View</a><br/>Format: Electronic Resources<br/>Security and privacy in cyber-physical systems : foundations, principles, and applicationsent://SD_ILS/0/SD_ILS:11290492026-01-05T14:27:44Z2026-01-05T14:27:44Zby Song, Houbing, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4987646">Click to View</a><br/>Format: Electronic Resources<br/>Data hiding techniques in Windows OS : a practical approach to investigation and defenseent://SD_ILS/0/SD_ILS:11177642026-01-05T14:27:44Z2026-01-05T14:27:44Zby Hassan, Nihad Ahmad, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4676113">Click to View</a><br/>Format: Electronic Resources<br/>Loseless information : hiding in imagesent://SD_ILS/0/SD_ILS:11206462026-01-05T14:27:44Z2026-01-05T14:27:44Zby Lu, Zhe-Ming, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4743573">Click to View</a><br/>Format: Electronic Resources<br/>Nine steps to succes : an ISO 27001: 2013 implementation overviewent://SD_ILS/0/SD_ILS:11111892026-01-05T14:27:44Z2026-01-05T14:27:44Zby Calder, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4519667">Click to View</a><br/>Format: Electronic Resources<br/>Data protection and the cloud : are the risks too great?ent://SD_ILS/0/SD_ILS:10538352026-01-05T14:27:44Z2026-01-05T14:27:44Zby Ticher, Paul, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2192125">Click to View</a><br/>Format: Electronic Resources<br/>CMS security handbook the comprehensive guide for WordPress, Joomla!, Drupal, and Ploneent://SD_ILS/0/SD_ILS:9790052026-01-05T14:27:44Z2026-01-05T14:27:44Zby Canavan, Tom.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706893">Click to View</a><br/>Format: Electronic Resources<br/>WordPress 3 ultimate security protect your WordPress site and its networkent://SD_ILS/0/SD_ILS:9967892026-01-05T14:27:44Z2026-01-05T14:27:44Zby Connelly, Olly.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948509">Click to View</a><br/>Format: Electronic Resources<br/>Use of risk analysis in computer-aided persuasionent://SD_ILS/0/SD_ILS:9883622026-01-05T14:27:44Z2026-01-05T14:27:44Zby Duman, Ekrem.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=836226">Click to View</a><br/>Format: Electronic Resources<br/>Sosyal mühendislik, bilgi güvenliği ve endüstri 4.0ent://SD_ILS/0/SD_ILS:12347392026-01-05T14:27:44Z2026-01-05T14:27:44Zby Özmen, Cevdet<br/>Format: Books<br/>Fikir ve sanat eserlerinin korunması : (protection of intellectual property rights)ent://SD_ILS/0/SD_ILS:1233462026-01-05T14:27:44Z2026-01-05T14:27:44Zby Sert, Selin<br/>Format: Books<br/>You : for sale protecting your personal data and privacy onlineent://SD_ILS/0/SD_ILS:10537572026-01-05T14:27:44Z2026-01-05T14:27:44Zby Sumner, Stuart, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2187472">Click to View</a><br/>Format: Electronic Resources<br/>Digital identity managementent://SD_ILS/0/SD_ILS:10473362026-01-05T14:27:44Z2026-01-05T14:27:44Zby Laurent, Maryline, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2007485">Click to View</a><br/>Format: Electronic Resources<br/>Information security for managementent://SD_ILS/0/SD_ILS:10567932026-01-05T14:27:44Z2026-01-05T14:27:44Zby Iyengar, Venugopal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3011230">Click to View</a><br/>Format: Electronic Resources<br/>ISO 37001 : an introduction to anti-bribery management systems : doing the right thingsent://SD_ILS/0/SD_ILS:11337112026-01-05T14:27:44Z2026-01-05T14:27:44Zby Field, Alan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5211339">Click to View</a><br/>Format: Electronic Resources<br/>Information protection playbookent://SD_ILS/0/SD_ILS:10199902026-01-05T14:27:44Z2026-01-05T14:27:44Zby Kane, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1418381">Click to View</a><br/>Format: Electronic Resources<br/>Advances in artificial intelligence for privacy protection and securityent://SD_ILS/0/SD_ILS:10302722026-01-05T14:27:44Z2026-01-05T14:27:44Zby Solanas, Agusti.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1679374">Click to View</a><br/>Format: Electronic Resources<br/>Intelligent watermarking techniquesent://SD_ILS/0/SD_ILS:9312692026-01-05T14:27:44Z2026-01-05T14:27:44Zby Pan, Jeng-Shyang.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=231561">Click to View</a><br/>Format: Electronic Resources<br/>Crackproof your software the best ways to protect your software against crackersent://SD_ILS/0/SD_ILS:9365642026-01-05T14:27:44Z2026-01-05T14:27:44Zby C̆ervĕn, Pavol.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273482">Click to View</a><br/>Format: Electronic Resources<br/>Information warfareent://SD_ILS/0/SD_ILS:10062472026-01-05T14:27:44Z2026-01-05T14:27:44Zby Ventre, Daniel.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1106528">Click to View</a><br/>Format: Electronic Resources<br/>Protecting your library's digital sources the essential guide to planning and preservationent://SD_ILS/0/SD_ILS:9300962026-01-05T14:27:44Z2026-01-05T14:27:44Zby Kahn, Miriam (Miriam B.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=218937">Click to View</a><br/>Format: Electronic Resources<br/>Digital privacy in the marketplace : perspectives on the information exchangeent://SD_ILS/0/SD_ILS:10449122026-01-05T14:27:44Z2026-01-05T14:27:44Zby Milne, George R., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1920895">Click to View</a><br/>Format: Electronic Resources<br/>Infosecurity 2008 threat analysisent://SD_ILS/0/SD_ILS:11900002026-01-05T14:27:44Z2026-01-05T14:27:44Zby Clark, Champ, III.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492249">https://www.sciencedirect.com/science/book/9781597492249</a><br/>Format: Electronic Resources<br/>Netcat power toolsent://SD_ILS/0/SD_ILS:11897042026-01-05T14:27:44Z2026-01-05T14:27:44Zby Kanclirz, Jan.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492577">https://www.sciencedirect.com/science/book/9781597492577</a><br/>Format: Electronic Resources<br/>