Search Results for Computer security. - Narrowed by: Database security. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Database$002bsecurity.$002509Database$002bsecurity.$0026ic$003dtrue$0026ps$003d300?dt=list 2026-03-31T11:02:22Z Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:1188248 2026-03-31T11:02:22Z 2026-03-31T11:02:22Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490214">https://www.sciencedirect.com/science/book/9781597490214</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at designing security for a Windows Server 2003 network ent://SD_ILS/0/SD_ILS:933856 2026-03-31T11:02:22Z 2026-03-31T11:02:22Z by&#160;Amini, Rob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254832">Click to View</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at designing security for a Windows Server 2003 network ent://SD_ILS/0/SD_ILS:1188281 2026-03-31T11:02:22Z 2026-03-31T11:02:22Z by&#160;Amini, Rob.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492430">https://www.sciencedirect.com/science/book/9781597492430</a><br/>Format:&#160;Electronic Resources<br/> Cryptography for internet and database applications : developing secret and public key techniques with Java ent://SD_ILS/0/SD_ILS:41923 2026-03-31T11:02:22Z 2026-03-31T11:02:22Z by&#160;Galbreath, Nick<br/>Format:&#160;Books<br/> Implementing database security and auditing ent://SD_ILS/0/SD_ILS:938079 2026-03-31T11:02:22Z 2026-03-31T11:02:22Z by&#160;Ben-Natan, Ron.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=286701">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Check Point NG next generation security administration ent://SD_ILS/0/SD_ILS:939447 2026-03-31T11:02:22Z 2026-03-31T11:02:22Z by&#160;Simonis, Drew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294029">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Safeguarding critical e-documents implementing a program for securing confidential information assets ent://SD_ILS/0/SD_ILS:987148 2026-03-31T11:02:22Z 2026-03-31T11:02:22Z by&#160;Smallwood, Robert F., 1959-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=821999">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Implementing database security and auditing : a guide for DBAs, information security administrators and auditors ent://SD_ILS/0/SD_ILS:1188115 2026-03-31T11:02:22Z 2026-03-31T11:02:22Z by&#160;Ben-Natan, Ron.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">http://www.sciencedirect.com/science/book/9781555583347</a><br/>Format:&#160;Electronic Resources<br/> IT-Sicherheit : Eine Einf&uuml;hrung ent://SD_ILS/0/SD_ILS:1132546 2026-03-31T11:02:22Z 2026-03-31T11:02:22Z by&#160;Hellmann, Roland, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5157634">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing SQL servers protecting your database from attackers ent://SD_ILS/0/SD_ILS:998953 2026-03-31T11:02:22Z 2026-03-31T11:02:22Z by&#160;Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=980013">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Oracle Identity and Access Manager 11g for administrators administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasks ent://SD_ILS/0/SD_ILS:996835 2026-03-31T11:02:22Z 2026-03-31T11:02:22Z by&#160;Kumar, Atul.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948559">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Virtualization for security : including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting ent://SD_ILS/0/SD_ILS:1191997 2026-03-31T11:02:22Z 2026-03-31T11:02:22Z by&#160;Hoopes, John.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597493055">https://www.sciencedirect.com/science/book/9781597493055</a><br/>Format:&#160;Electronic Resources<br/> Infosecurity 2008 threat analysis ent://SD_ILS/0/SD_ILS:1190000 2026-03-31T11:02:22Z 2026-03-31T11:02:22Z by&#160;Clark, Champ, III.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492249">https://www.sciencedirect.com/science/book/9781597492249</a><br/>Format:&#160;Electronic Resources<br/> Securing SQL server protecting your database from attackers ent://SD_ILS/0/SD_ILS:137191 2026-03-31T11:02:22Z 2026-03-31T11:02:22Z by&#160;Cherry, Denny.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496254">http://www.sciencedirect.com/science/book/9781597496254</a><br/>Format:&#160;Electronic Resources<br/> Securing SQL server : protecting your database from attackers ent://SD_ILS/0/SD_ILS:1183510 2026-03-31T11:02:22Z 2026-03-31T11:02:22Z by&#160;Cherry, Denny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496254">https://www.sciencedirect.com/science/book/9781597496254</a><br/>Format:&#160;Electronic Resources<br/>