Search Results for Computer security. - Narrowed by: Internet programming.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Internet$002bprogramming.$002509Internet$002bprogramming.$0026ps$003d300?dt=list2026-03-31T11:28:30ZGlassFish security secure your GlassFish installation, web applications, EJB applications, application client module, and web services using Java EE and GlassFish security measuresent://SD_ILS/0/SD_ILS:9964052026-03-31T11:28:30Z2026-03-31T11:28:30Zby Kalali, Masoud.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=944941">Click to View</a><br/>Format: Electronic Resources<br/>Web application obfuscation -/WAFs..Evasion..Filters//alert (/Obfuscation/)-ent://SD_ILS/0/SD_ILS:1372092026-03-31T11:28:30Z2026-03-31T11:28:30Zby Heiderich, Mario.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496049">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Google hacking for penetration testers. Volume 2ent://SD_ILS/0/SD_ILS:11891022026-03-31T11:28:30Z2026-03-31T11:28:30Zby Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491761">https://www.sciencedirect.com/science/book/9781597491761</a><br/>Format: Electronic Resources<br/>Google hacking for penetration testersent://SD_ILS/0/SD_ILS:11883752026-03-31T11:28:30Z2026-03-31T11:28:30Zby Long, Johnny.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836364">http://www.sciencedirect.com/science/book/9781931836364</a><br/>Format: Electronic Resources<br/>