Search Results for Computer security. - Narrowed by: Database security.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Database$002bsecurity.$002509Database$002bsecurity.$0026ic$003dtrue$0026ps$003d300?dt=list2026-03-31T11:02:22ZPenetration tester's open source toolkitent://SD_ILS/0/SD_ILS:11882482026-03-31T11:02:22Z2026-03-31T11:02:22Zby Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490214">https://www.sciencedirect.com/science/book/9781597490214</a><br/>Format: Electronic Resources<br/>How to cheat at designing security for a Windows Server 2003 networkent://SD_ILS/0/SD_ILS:9338562026-03-31T11:02:22Z2026-03-31T11:02:22Zby Amini, Rob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254832">Click to View</a><br/>Format: Electronic Resources<br/>How to cheat at designing security for a Windows Server 2003 networkent://SD_ILS/0/SD_ILS:11882812026-03-31T11:02:22Z2026-03-31T11:02:22Zby Amini, Rob.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492430">https://www.sciencedirect.com/science/book/9781597492430</a><br/>Format: Electronic Resources<br/>Cryptography for internet and database applications : developing secret and public key techniques with Javaent://SD_ILS/0/SD_ILS:419232026-03-31T11:02:22Z2026-03-31T11:02:22Zby Galbreath, Nick<br/>Format: Books<br/>Implementing database security and auditingent://SD_ILS/0/SD_ILS:9380792026-03-31T11:02:22Z2026-03-31T11:02:22Zby Ben-Natan, Ron.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=286701">Click to View</a><br/>Format: Electronic Resources<br/>Check Point NG next generation security administrationent://SD_ILS/0/SD_ILS:9394472026-03-31T11:02:22Z2026-03-31T11:02:22Zby Simonis, Drew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294029">Click to View</a><br/>Format: Electronic Resources<br/>Safeguarding critical e-documents implementing a program for securing confidential information assetsent://SD_ILS/0/SD_ILS:9871482026-03-31T11:02:22Z2026-03-31T11:02:22Zby Smallwood, Robert F., 1959-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=821999">Click to View</a><br/>Format: Electronic Resources<br/>Implementing database security and auditing : a guide for DBAs, information security administrators and auditorsent://SD_ILS/0/SD_ILS:11881152026-03-31T11:02:22Z2026-03-31T11:02:22Zby Ben-Natan, Ron.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">http://www.sciencedirect.com/science/book/9781555583347</a><br/>Format: Electronic Resources<br/>IT-Sicherheit : Eine Einführungent://SD_ILS/0/SD_ILS:11325462026-03-31T11:02:22Z2026-03-31T11:02:22Zby Hellmann, Roland, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5157634">Click to View</a><br/>Format: Electronic Resources<br/>Securing SQL servers protecting your database from attackersent://SD_ILS/0/SD_ILS:9989532026-03-31T11:02:22Z2026-03-31T11:02:22Zby Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=980013">Click to View</a><br/>Format: Electronic Resources<br/>Oracle Identity and Access Manager 11g for administrators administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasksent://SD_ILS/0/SD_ILS:9968352026-03-31T11:02:22Z2026-03-31T11:02:22Zby Kumar, Atul.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948559">Click to View</a><br/>Format: Electronic Resources<br/>Virtualization for security : including sandboxing, disaster recovery, high availability, forensic analysis, and honeypottingent://SD_ILS/0/SD_ILS:11919972026-03-31T11:02:22Z2026-03-31T11:02:22Zby Hoopes, John.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597493055">https://www.sciencedirect.com/science/book/9781597493055</a><br/>Format: Electronic Resources<br/>Infosecurity 2008 threat analysisent://SD_ILS/0/SD_ILS:11900002026-03-31T11:02:22Z2026-03-31T11:02:22Zby Clark, Champ, III.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492249">https://www.sciencedirect.com/science/book/9781597492249</a><br/>Format: Electronic Resources<br/>Securing SQL server protecting your database from attackersent://SD_ILS/0/SD_ILS:1371912026-03-31T11:02:22Z2026-03-31T11:02:22Zby Cherry, Denny.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496254">http://www.sciencedirect.com/science/book/9781597496254</a><br/>Format: Electronic Resources<br/>Securing SQL server : protecting your database from attackersent://SD_ILS/0/SD_ILS:11835102026-03-31T11:02:22Z2026-03-31T11:02:22Zby Cherry, Denny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496254">https://www.sciencedirect.com/science/book/9781597496254</a><br/>Format: Electronic Resources<br/>