Search Results for Computer security. - Narrowed by: Operating systems (Computers)SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Operating$002bsystems$002b$002528Computers$002529$002509Operating$002bsystems$002b$002528Computers$002529$0026ps$003d300?dt=list2026-01-01T15:57:58ZMac security bibleent://SD_ILS/0/SD_ILS:9603772026-01-01T15:57:58Z2026-01-01T15:57:58Zby Kissell, Joe.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=477803">Click to View</a><br/>Format: Electronic Resources<br/>z/OS 1.6 security services updateent://SD_ILS/0/SD_ILS:10751482026-01-01T15:57:58Z2026-01-01T15:57:58Zby Kappeler, Patrick.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306453">Click to View</a><br/>Format: Electronic Resources<br/>z/OS diagnostic data collection and analysisent://SD_ILS/0/SD_ILS:10754652026-01-01T15:57:58Z2026-01-01T15:57:58Zby Rogers, Paul.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306770">Click to View</a><br/>Format: Electronic Resources<br/>Linux on IBM e-server zSeries and S/390 best security practicesent://SD_ILS/0/SD_ILS:10755302026-01-01T15:57:58Z2026-01-01T15:57:58Zby Geiselhart, Gregory.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306835">Click to View</a><br/>Format: Electronic Resources<br/>Windows server 2012 security from end to edge and beyond architecting, designing, planning, and deploying Windows server 2012 security solutionsent://SD_ILS/0/SD_ILS:10076122026-01-01T15:57:58Z2026-01-01T15:57:58Zby Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115164">Click to View</a><br/>Format: Electronic Resources<br/>Windows registry forensics : advanced digital forensic analysis of the windows registryent://SD_ILS/0/SD_ILS:11086862026-01-01T15:57:58Z2026-01-01T15:57:58Zby Carvey, Harlan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4438754">Click to View</a><br/>Format: Electronic Resources<br/>Hiding behind the keyboard : uncovering covert communication methods with forensic analysisent://SD_ILS/0/SD_ILS:11090622026-01-01T15:57:58Z2026-01-01T15:57:58Zby Shavers, Brett, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4452264">Click to View</a><br/>Format: Electronic Resources<br/>Group policy : fundamentals, security, and the managed desktopent://SD_ILS/0/SD_ILS:11031672026-01-01T15:57:58Z2026-01-01T15:57:58Zby Moskowitz, Jeremy, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040685">Click to View</a><br/>Format: Electronic Resources<br/>VMware horizon 6 desktop virtualization solutions : plan, design, and secure your virtual desktop environments with VMware horizon 6 viewent://SD_ILS/0/SD_ILS:10380992026-01-01T15:57:58Z2026-01-01T15:57:58Zby Cartwright, Ryan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1793938">Click to View</a><br/>Format: Electronic Resources<br/>Group policy fundamentals, security, and the managed desktopent://SD_ILS/0/SD_ILS:10060892026-01-01T15:57:58Z2026-01-01T15:57:58Zby Moskowitz, Jeremy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1104500">Click to View</a><br/>Format: Electronic Resources<br/>Group policy fundamentals, security, and the managed desktopent://SD_ILS/0/SD_ILS:9634792026-01-01T15:57:58Z2026-01-01T15:57:58Zby Moskowitz, Jeremy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=530009">Click to View</a><br/>Format: Electronic Resources<br/>iSeries Access for Windows V5R2 hot topics tailored images, application administration, SSL, and Kerberosent://SD_ILS/0/SD_ILS:10753942026-01-01T15:57:58Z2026-01-01T15:57:58Zby Schulz, Jeremy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306699">Click to View</a><br/>Format: Electronic Resources<br/>Windows Registry Forensics : Advanced Digital Forensic Analysis of the Windows Registry.ent://SD_ILS/0/SD_ILS:11835262026-01-01T15:57:58Z2026-01-01T15:57:58Zby Carvey, Harlan.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495806">https://www.sciencedirect.com/science/book/9781597495806</a><br/>Format: Electronic Resources<br/>How to cheat at Windows system administration using command line scriptsent://SD_ILS/0/SD_ILS:11864252026-01-01T15:57:58Z2026-01-01T15:57:58Zby Bhardwaj, Pawan K.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491051">http://www.sciencedirect.com/science/book/9781597491051</a><br/>Format: Electronic Resources<br/>Windows Server 2003 security infrastructuresent://SD_ILS/0/SD_ILS:11880842026-01-01T15:57:58Z2026-01-01T15:57:58Zby Clercq, Jan de, 1968-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582838">http://www.sciencedirect.com/science/book/9781555582838</a><br/>Format: Electronic Resources<br/>Winternals defragmentation, recovery, and administration field guideent://SD_ILS/0/SD_ILS:11882672026-01-01T15:57:58Z2026-01-01T15:57:58Zby Kleiman, Dave.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490795">https://www.sciencedirect.com/science/book/9781597490795</a><br/>Format: Electronic Resources<br/>Best damn Windows server 2003 book periodent://SD_ILS/0/SD_ILS:11883702026-01-01T15:57:58Z2026-01-01T15:57:58Zby Snedaker, Susan.<br/>MacEwan University Access <a href="http://www.sciencedirect.com/science/book/9781931836128">(Unlimited Concurrent Users)</a> from ScienceDirect
ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836128">https://www.sciencedirect.com/science/book/9781931836128</a><br/>Format: Electronic Resources<br/>