Search Results for Computers. - Narrowed by: Computer security. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputers.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?dt=list 2026-04-27T12:14:18Z Advances in computers. Volume 83 ent://SD_ILS/0/SD_ILS:1183782 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Zelkowitz, Marvin V., 1945-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123855107">http://www.sciencedirect.com/science/book/9780123855107</a><br/>Format:&#160;Electronic Resources<br/> Computers at risk safe computing in the information age ent://SD_ILS/0/SD_ILS:1083859 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3376465">Click to View</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at Windows system administration using command line scripts ent://SD_ILS/0/SD_ILS:1186425 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Bhardwaj, Pawan K.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491051">http://www.sciencedirect.com/science/book/9781597491051</a><br/>Format:&#160;Electronic Resources<br/> Windows Server 2003 security infrastructures ent://SD_ILS/0/SD_ILS:1188084 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Clercq, Jan de, 1968-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582838">http://www.sciencedirect.com/science/book/9781555582838</a><br/>Format:&#160;Electronic Resources<br/> Logics and languages for reliability and security ent://SD_ILS/0/SD_ILS:966627 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Esparza, Javier.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=557042">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IBM eserver zSeries 990 (z990) cryptography implementation ent://SD_ILS/0/SD_ILS:1075486 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306791">Click to View</a><br/>Format:&#160;Electronic Resources<br/> A guide to kernel exploitation : attacking the core ent://SD_ILS/0/SD_ILS:1181770 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Perla, Enrico.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494861">https://www.sciencedirect.com/science/book/9781597494861</a><br/>Format:&#160;Electronic Resources<br/> A&#287; ve siber g&uuml;venlik temelleri : dijital d&uuml;nyada g&uuml;vende kal&#305;n ent://SD_ILS/0/SD_ILS:1232171 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;H&#305;n&ccedil;er, G&ouml;rkem, yazar.<br/>Format:&#160;Books<br/> Kali Linux network scanning cookbook : take your penetration-testing skills to the next level ent://SD_ILS/0/SD_ILS:1126762 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Hixon, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4867412">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The basics of digital privacy : simple tools to protect your personal information and your identity online ent://SD_ILS/0/SD_ILS:1023569 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1573362">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Windows registry forensics : advanced digital forensic analysis of the windows registry ent://SD_ILS/0/SD_ILS:1108686 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Carvey, Harlan, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4438754">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hiding behind the keyboard : uncovering covert communication methods with forensic analysis ent://SD_ILS/0/SD_ILS:1109062 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Shavers, Brett, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4452264">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Group policy : fundamentals, security, and the managed desktop ent://SD_ILS/0/SD_ILS:1103167 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Moskowitz, Jeremy, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4040685">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Windows server 2012 security from end to edge and beyond architecting, designing, planning, and deploying Windows server 2012 security solutions ent://SD_ILS/0/SD_ILS:1007612 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Shinder, Thomas W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1115164">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Group policy fundamentals, security, and the managed desktop ent://SD_ILS/0/SD_ILS:1006089 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Moskowitz, Jeremy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1104500">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Oracle Identity and Access Manager 11g for administrators administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasks ent://SD_ILS/0/SD_ILS:996835 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Kumar, Atul.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948559">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Group policy fundamentals, security, and the managed desktop ent://SD_ILS/0/SD_ILS:963479 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Moskowitz, Jeremy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=530009">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Relation based access control ent://SD_ILS/0/SD_ILS:1025132 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Zhang, Rui.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1589007">Click to View</a><br/>Format:&#160;Electronic Resources<br/> iSeries Access for Windows V5R2 hot topics tailored images, application administration, SSL, and Kerberos ent://SD_ILS/0/SD_ILS:1075394 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Schulz, Jeremy.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306699">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Linux on IBM e-server zSeries and S/390 best security practices ent://SD_ILS/0/SD_ILS:1075530 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Geiselhart, Gregory.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306835">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Role-based access control ent://SD_ILS/0/SD_ILS:930991 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Ferraiolo, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227631">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Windows Registry Forensics : Advanced Digital Forensic Analysis of the Windows Registry. ent://SD_ILS/0/SD_ILS:1183526 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Carvey, Harlan.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495806">https://www.sciencedirect.com/science/book/9781597495806</a><br/>Format:&#160;Electronic Resources<br/> Managed code rootkits : hooking into runtime environments ent://SD_ILS/0/SD_ILS:1181827 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Metula, Erez.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495745">http://www.sciencedirect.com/science/book/9781597495745</a><br/>Format:&#160;Electronic Resources<br/> OAuth 2.0 identity and access management patterns ent://SD_ILS/0/SD_ILS:1023480 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Spasovski, Martin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572907">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Instant Java password and authentication security ent://SD_ILS/0/SD_ILS:1023486 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Mayoral, Fernando.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572913">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Perfect passwords selection, protection, authentication ent://SD_ILS/0/SD_ILS:933875 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Burnett, Mark.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254851">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux wireless penetration testing : beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack ent://SD_ILS/0/SD_ILS:1137050 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Buchanan, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5340668">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux wireless penetration testing beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux ent://SD_ILS/0/SD_ILS:1047089 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Ramachandran, Vivek, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2005211">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Check Point NG next generation security administration ent://SD_ILS/0/SD_ILS:939447 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Simonis, Drew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294029">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Role-based access control ent://SD_ILS/0/SD_ILS:945221 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Ferraiolo, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338751">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network security : private communication in a public world ent://SD_ILS/0/SD_ILS:1169380 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Kaufman, Charlie.<br/>Format:&#160;Books<br/> IBM i security administration and compliance ent://SD_ILS/0/SD_ILS:993715 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Woodbury, Carol.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=906259">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mac security bible ent://SD_ILS/0/SD_ILS:960377 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Kissell, Joe.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=477803">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Buffer overflow attacks : detect, exploit, prevent ent://SD_ILS/0/SD_ILS:1188407 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266672">http://www.sciencedirect.com/science/book/9781932266672</a><br/>Format:&#160;Electronic Resources<br/> Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies ent://SD_ILS/0/SD_ILS:1145686 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Le, Dac-Nhuong, 1983- editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5741215">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux ent://SD_ILS/0/SD_ILS:1031737 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Buchanan, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1688607">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information protection playbook ent://SD_ILS/0/SD_ILS:1019990 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Kane, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1418381">Click to View</a><br/>Format:&#160;Electronic Resources<br/> A multidisciplinary introduction to information security ent://SD_ILS/0/SD_ILS:1028416 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Mj&oslash;lsnes, Stig F., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1648315">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing HP NonStop servers in an open systems world TCP/IP, OSS &amp; SQL ent://SD_ILS/0/SD_ILS:939197 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;XYPRO Technology Corporation.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=291716">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Essential computer security everyone's guide to e-mail, internet, and wireless security ent://SD_ILS/0/SD_ILS:943350 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Bradley, Tony.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=319200">Click to View</a><br/>Format:&#160;Electronic Resources<br/> User's guide to cryptography and standards ent://SD_ILS/0/SD_ILS:931017 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Dent, Alexander W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227658">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Developing secure distributed systems with CORBA ent://SD_ILS/0/SD_ILS:930964 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Lang, Ulrich.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227602">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cisco security professional's guide to secure intrusion detection systems ent://SD_ILS/0/SD_ILS:1188408 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Burton, James.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266696">http://www.sciencedirect.com/science/book/9781932266696</a><br/>Format:&#160;Electronic Resources<br/> Advances in intelligence and security informatics ent://SD_ILS/0/SD_ILS:133381 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Mao, Wenji.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123972002">http://www.sciencedirect.com/science/book/9780123972002</a><br/>Format:&#160;Electronic Resources<br/> Embedded systems security practical methods for safe and secure software and systems development ent://SD_ILS/0/SD_ILS:133376 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Kleidermacher, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123868862">http://www.sciencedirect.com/science/book/9780123868862</a><br/>Format:&#160;Electronic Resources<br/> The basics of information security understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:133592 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Andress, Jason.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format:&#160;Electronic Resources<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:1183815 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Andress, Jason.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496537">https://www.sciencedirect.com/science/book/9781597496537</a><br/>Format:&#160;Electronic Resources<br/> Malware forensics : investigating and analyzing malicious code ent://SD_ILS/0/SD_ILS:1189636 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Aquilina, James M.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492683">http://www.sciencedirect.com/science/book/9781597492683</a><br/>Format:&#160;Electronic Resources<br/> WarDriving &amp; wireless penetration testing ent://SD_ILS/0/SD_ILS:1188275 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Hurley, Chris.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491112">http://www.sciencedirect.com/science/book/9781597491112</a><br/>Format:&#160;Electronic Resources<br/> Metasploit toolkit for penetration testing, exploit development, and vulnerability research ent://SD_ILS/0/SD_ILS:1186373 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">http://www.sciencedirect.com/science/book/9781597490740</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Vista for IT security professionals ent://SD_ILS/0/SD_ILS:1186453 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Piltzecker, Tony, 1975-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491396">http://www.sciencedirect.com/science/book/9781597491396</a><br/>Format:&#160;Electronic Resources<br/> Web application vulnerabilities : detect, exploit, prevent ent://SD_ILS/0/SD_ILS:1189105 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492096">http://www.sciencedirect.com/science/book/9781597492096</a><br/>Format:&#160;Electronic Resources<br/> Writing security tools and exploits ent://SD_ILS/0/SD_ILS:1188284 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499972">http://www.sciencedirect.com/science/book/9781597499972</a><br/>Format:&#160;Electronic Resources<br/> Insider threat : protecting the enterprise from sabotage, spying, and theft ent://SD_ILS/0/SD_ILS:1188259 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Cole, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format:&#160;Electronic Resources<br/> Combating spyware in the enterprise ent://SD_ILS/0/SD_ILS:1186355 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Baskin, Brian.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490641">https://www.sciencedirect.com/science/book/9781597490641</a><br/>Format:&#160;Electronic Resources<br/> Host integrity monitoring : using Osiris and Samhain ent://SD_ILS/0/SD_ILS:1188245 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Wotring, Brian.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490184">http://www.sciencedirect.com/science/book/9781597490184</a><br/>Format:&#160;Electronic Resources<br/> Intrusion prevention and active response : deploying network and host IPS ent://SD_ILS/0/SD_ILS:1188400 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Rash, Michael.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266474">http://www.sciencedirect.com/science/book/9781932266474</a><br/>Format:&#160;Electronic Resources<br/> Wireless operational security ent://SD_ILS/0/SD_ILS:1188104 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583170">http://www.sciencedirect.com/science/book/9781555583170</a> ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583170">https://www.sciencedirect.com/science/book/9781555583170</a><br/>Format:&#160;Electronic Resources<br/> WarDriving : drive, detect, defend : a guide to wireless security ent://SD_ILS/0/SD_ILS:1188365 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Hurley, Chris.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836036">https://www.sciencedirect.com/science/book/9781931836036</a><br/>Format:&#160;Electronic Resources<br/> Programmer's ultimate security deskref ent://SD_ILS/0/SD_ILS:1188409 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Foster, James C.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781932266726">https://www.sciencedirect.com/science/book/9781932266726</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practices Emerging Threats and Perspectives ent://SD_ILS/0/SD_ILS:480820 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Traor&eacute;, Issa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-48947-6">http://dx.doi.org/10.1007/978-3-319-48947-6</a><br/>Format:&#160;Electronic Resources<br/> Securing the cloud : cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:1183743 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Winkler, J. R. (Joachim R.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format:&#160;Electronic Resources<br/> The basics of hacking and penetration testing ethical hacking and penetration testing made easy ent://SD_ILS/0/SD_ILS:133594 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Engebretson, Pat (Patrick Henry), 1974-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496551">http://www.sciencedirect.com/science/book/9781597496551</a><br/>Format:&#160;Electronic Resources<br/> The basics of hacking and penetration testing : ethical hacking and penetration testing made easy ent://SD_ILS/0/SD_ILS:1183950 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Engebretson, Pat (Patrick Henry), 1974-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496551">https://www.sciencedirect.com/science/book/9781597496551</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest wireless technologies attacks ent://SD_ILS/0/SD_ILS:1178019 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Haines, Brad.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495417">https://www.sciencedirect.com/science/book/9781597495417</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest USB attacks ent://SD_ILS/0/SD_ILS:1178020 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Anderson, Brian (Brian James)<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495530">https://www.sciencedirect.com/science/book/9781597495530</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest social network attacks ent://SD_ILS/0/SD_ILS:1178031 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Timm, Carl.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495455">https://www.sciencedirect.com/science/book/9781597495455</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest Microsoft attacks ent://SD_ILS/0/SD_ILS:1177479 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Kraus, Rob.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495516">https://www.sciencedirect.com/science/book/9781597495516</a><br/>Format:&#160;Electronic Resources<br/> Check Point NGX R65 security administration ent://SD_ILS/0/SD_ILS:1189122 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Bonnell, Ralph.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492454">http://www.sciencedirect.com/science/book/9781597492454</a><br/>Format:&#160;Electronic Resources<br/> Digital watermarking and steganography ent://SD_ILS/0/SD_ILS:1189196 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Cox, I. J. (Ingemar J.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123725851">http://www.sciencedirect.com/science/book/9780123725851</a><br/>Format:&#160;Electronic Resources<br/> Infosecurity 2008 threat analysis ent://SD_ILS/0/SD_ILS:1190000 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Clark, Champ, III.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492249">https://www.sciencedirect.com/science/book/9781597492249</a><br/>Format:&#160;Electronic Resources<br/> Microsoft windows security fundamentals ent://SD_ILS/0/SD_ILS:1185703 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Clercq, Jan de, 1968-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583408">https://www.sciencedirect.com/science/book/9781555583408</a><br/>Format:&#160;Electronic Resources<br/> Botnets : the killer web app ent://SD_ILS/0/SD_ILS:1186444 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Schiller, Craig A.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491358">https://www.sciencedirect.com/science/book/9781597491358</a><br/>Format:&#160;Electronic Resources<br/> Open source fuzzing tools. ent://SD_ILS/0/SD_ILS:1186474 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Rathaus, Noam.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491952">http://www.sciencedirect.com/science/book/9781597491952</a><br/>Format:&#160;Electronic Resources<br/> Trusted platform module basics : using TPM in embedded systems ent://SD_ILS/0/SD_ILS:1185662 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Kinney, Steven.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679602">http://www.sciencedirect.com/science/book/9780750679602</a><br/>Format:&#160;Electronic Resources<br/> Aggressive network self-defense ent://SD_ILS/0/SD_ILS:1188490 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Wyler, Neil R.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">http://www.sciencedirect.com/science/book/9781931836203</a><br/>Format:&#160;Electronic Resources<br/> Internet security : a jumpstart for systems administrators and IT managers ent://SD_ILS/0/SD_ILS:1188090 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Speed, Tim.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582982">http://www.sciencedirect.com/science/book/9781555582982</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity operations handbook ent://SD_ILS/0/SD_ILS:1188095 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Rittinghouse, John W.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781555583064">https://www.sciencedirect.com/science/book/9781555583064</a><br/>Format:&#160;Electronic Resources<br/> Snort 2.0 intrusion detection ent://SD_ILS/0/SD_ILS:1188387 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Beale, Jay.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836746">http://www.sciencedirect.com/science/book/9781931836746</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing ColdFusion ent://SD_ILS/0/SD_ILS:1188358 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Meyer, Greg.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994770">http://www.sciencedirect.com/science/book/9781928994770</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing your identity in the information age : protect your family on the internet! ent://SD_ILS/0/SD_ILS:1185318 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Bidwell, Teri.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836517">https://www.sciencedirect.com/science/book/9781931836517</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing Sun Solaris 8 ent://SD_ILS/0/SD_ILS:1188485 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Miles, Wyman.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994442">http://www.sciencedirect.com/science/book/9781928994442</a><br/>Format:&#160;Electronic Resources<br/> Securing SQL server protecting your database from attackers ent://SD_ILS/0/SD_ILS:137191 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Cherry, Denny.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496254">http://www.sciencedirect.com/science/book/9781597496254</a><br/>Format:&#160;Electronic Resources<br/> Securing the cloud cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:137201 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Winkler, J. R. (Joachim R.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format:&#160;Electronic Resources<br/> Thor's Microsoft security bible : a collection of practical security techniques ent://SD_ILS/0/SD_ILS:1183972 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Mullen, Timothy M.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495721">http://www.sciencedirect.com/science/book/9781597495721</a><br/>Format:&#160;Electronic Resources<br/> Securing SQL server : protecting your database from attackers ent://SD_ILS/0/SD_ILS:1183510 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Cherry, Denny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496254">https://www.sciencedirect.com/science/book/9781597496254</a><br/>Format:&#160;Electronic Resources<br/> Next generation SSH2 implementation : securing data in motion ent://SD_ILS/0/SD_ILS:1191763 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Liu, Dale.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492836">https://www.sciencedirect.com/science/book/9781597492836</a><br/>Format:&#160;Electronic Resources<br/> Microsoft forefront security administration guide ent://SD_ILS/0/SD_ILS:1189120 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Varsalone, Jesse.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492447">https://www.sciencedirect.com/science/book/9781597492447</a><br/>Format:&#160;Electronic Resources<br/> Information assurance : dependability and security in networked systems ent://SD_ILS/0/SD_ILS:1189195 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Qian, Yi, 1962-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123735669">https://www.sciencedirect.com/science/book/9780123735669</a><br/>Format:&#160;Electronic Resources<br/> FISMA certification &amp; accreditation handbook ent://SD_ILS/0/SD_ILS:1188277 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Taylor, Laura.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491167">http://www.sciencedirect.com/science/book/9781597491167</a><br/>Format:&#160;Electronic Resources<br/> Developer's guide to web application security ent://SD_ILS/0/SD_ILS:1186371 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Cross, Michael, 1965-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490610">http://www.sciencedirect.com/science/book/9781597490610</a><br/>Format:&#160;Electronic Resources<br/> Physical and logical security convergence powered by enterprise security management ent://SD_ILS/0/SD_ILS:1189088 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Contos, Brian T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491228">https://www.sciencedirect.com/science/book/9781597491228</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at securing your network ent://SD_ILS/0/SD_ILS:1189983 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Dubrawsky, Ido.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492317">https://www.sciencedirect.com/science/book/9781597492317</a><br/>Format:&#160;Electronic Resources<br/> Multimedia security technologies for digital rights management ent://SD_ILS/0/SD_ILS:1186994 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Zeng, Wenjun, 1967-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123694768">http://www.sciencedirect.com/science/book/9780123694768</a><br/>Format:&#160;Electronic Resources<br/> Securing HP NonStop servers in an open systems world : TCP/IP, OSS &amp; SQL ent://SD_ILS/0/SD_ILS:1188118 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;XYPRO Technology Corporation.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583446">http://www.sciencedirect.com/science/book/9781555583446</a><br/>Format:&#160;Electronic Resources<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:1188248 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490214">https://www.sciencedirect.com/science/book/9781597490214</a><br/>Format:&#160;Electronic Resources<br/> Securing IM and P2P applications for the enterprise ent://SD_ILS/0/SD_ILS:1184263 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Piccard, Paul L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490177">http://www.sciencedirect.com/science/book/9781597490177</a> ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499965">http://www.sciencedirect.com/science/book/9781597499965</a><br/>Format:&#160;Electronic Resources<br/> Essential computer security : everyone's guide to e-mail, internet, and wireless security ent://SD_ILS/0/SD_ILS:1186419 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Bradley, Tony, 1969-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491143">https://www.sciencedirect.com/science/book/9781597491143</a><br/>Format:&#160;Electronic Resources<br/> Implementing database security and auditing : a guide for DBAs, information security administrators and auditors ent://SD_ILS/0/SD_ILS:1188115 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Ben-Natan, Ron.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">http://www.sciencedirect.com/science/book/9781555583347</a><br/>Format:&#160;Electronic Resources<br/> Implementing homeland security for enterprise IT ent://SD_ILS/0/SD_ILS:1188099 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Erbschloe, Michael.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583125">http://www.sciencedirect.com/science/book/9781555583125</a><br/>Format:&#160;Electronic Resources<br/> Cyber adversary characterization : auditing the hacker mind ent://SD_ILS/0/SD_ILS:1188369 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Parker, Tom.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836111">http://www.sciencedirect.com/science/book/9781931836111</a><br/>Format:&#160;Electronic Resources<br/> Digital watermarking ent://SD_ILS/0/SD_ILS:1188154 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Cox, I. J. (Ingemar J.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607149">http://www.sciencedirect.com/science/book/9781558607149</a><br/>Format:&#160;Electronic Resources<br/> Scene of the cybercrime : computer forensics handbook ent://SD_ILS/0/SD_ILS:1188494 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Shinder, Debra Littlejohn, author.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836654">https://www.sciencedirect.com/science/book/9781931836654</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing Windows 2000 ent://SD_ILS/0/SD_ILS:1188381 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Todd, Chad.<br/><a href="http://www.sciencedirect.com/science/book/9781931836494">Available from ScienceDirect. Online version available for university members only. This requires an institutional login off-campus</a> ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836494">https://www.sciencedirect.com/science/book/9781931836494</a><br/>Format:&#160;Electronic Resources<br/> Practical embedded security : building secure resource-constrained systems ent://SD_ILS/0/SD_ILS:1189168 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Stapko, Timothy John.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780750682152">https://www.sciencedirect.com/science/book/9780750682152</a><br/>Format:&#160;Electronic Resources<br/> Google hacking for penetration testers. Volume 2 ent://SD_ILS/0/SD_ILS:1189102 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491761">https://www.sciencedirect.com/science/book/9781597491761</a><br/>Format:&#160;Electronic Resources<br/> Securing Windows server 2008 : prevent attacks from outside and inside your organization. ent://SD_ILS/0/SD_ILS:1189621 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492805">https://www.sciencedirect.com/science/book/9781597492805</a><br/>Format:&#160;Electronic Resources<br/> Securing Citrix XenApp Server in the enterprise ent://SD_ILS/0/SD_ILS:1189637 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Bin Azad, Tariq.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492812">http://www.sciencedirect.com/science/book/9781597492812</a><br/>Format:&#160;Electronic Resources<br/> Scene of the cybercrime. ent://SD_ILS/0/SD_ILS:1189665 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Cross, Michael, 1965-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492768">https://www.sciencedirect.com/science/book/9781597492768</a><br/>Format:&#160;Electronic Resources<br/> OS X exploits and defense ent://SD_ILS/0/SD_ILS:1189705 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Baccas, Paul.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492546">http://www.sciencedirect.com/science/book/9781597492546</a><br/>Format:&#160;Electronic Resources<br/> Snort : IDS and IPS toolkit ent://SD_ILS/0/SD_ILS:1188271 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Beale, Jay.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490993">https://www.sciencedirect.com/science/book/9781597490993</a><br/>Format:&#160;Electronic Resources<br/> Zen and the art of information security ent://SD_ILS/0/SD_ILS:1186460 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Winkler, Ira.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491686">https://www.sciencedirect.com/science/book/9781597491686</a><br/>Format:&#160;Electronic Resources<br/> Syngress force emerging threat analysis : from mischief to malicious ent://SD_ILS/0/SD_ILS:1186339 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">http://www.sciencedirect.com/science/book/9781597490566</a><br/>Format:&#160;Electronic Resources<br/> Sockets, shellcode, porting &amp; coding : reverse engineering exploits and tool coding for security professionals ent://SD_ILS/0/SD_ILS:1188242 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490054">http://www.sciencedirect.com/science/book/9781597490054</a><br/>Format:&#160;Electronic Resources<br/> OSSEC host-based intrusion detection guide ent://SD_ILS/0/SD_ILS:1189620 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Hay, Andrew.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492409">http://www.sciencedirect.com/science/book/9781597492409</a><br/>Format:&#160;Electronic Resources<br/> No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfing ent://SD_ILS/0/SD_ILS:1189635 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492157">https://www.sciencedirect.com/science/book/9781597492157</a><br/>Format:&#160;Electronic Resources<br/> Hack the stack : using snort and ethereal to master the 8 layers of an insecure network ent://SD_ILS/0/SD_ILS:1186427 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Gregg, Michael (Michael C.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">http://www.sciencedirect.com/science/book/9781597491099</a><br/>Format:&#160;Electronic Resources<br/> Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures ent://SD_ILS/0/SD_ILS:1186439 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Contos, Brian T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491297">https://www.sciencedirect.com/science/book/9781597491297</a><br/>Format:&#160;Electronic Resources<br/> HP Nonstop server security : a practical handbook ent://SD_ILS/0/SD_ILS:1188101 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Hill, Terri.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583149">http://www.sciencedirect.com/science/book/9781555583149</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing your network ent://SD_ILS/0/SD_ILS:1188357 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Ahmad, David R. Mirza.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994701">https://www.sciencedirect.com/science/book/9781928994701</a><br/>Format:&#160;Electronic Resources<br/> Investigative computer forensics the practical guide for lawyers, accountants, investigators, and business executives ent://SD_ILS/0/SD_ILS:986492 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Laykin, Erik.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=817953">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber spying : tracking your family's (sometimes) secret online lives ent://SD_ILS/0/SD_ILS:1188379 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Fair, Ted.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836418">https://www.sciencedirect.com/science/book/9781931836418</a><br/>Format:&#160;Electronic Resources<br/> Software piracy exposed ent://SD_ILS/0/SD_ILS:1188417 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Craig, Paul.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781932266986">https://www.sciencedirect.com/science/book/9781932266986</a><br/>Format:&#160;Electronic Resources<br/> Information security best practices : 205 basic rules ent://SD_ILS/0/SD_ILS:1188318 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Stefanek, George L.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781878707963">https://www.sciencedirect.com/science/book/9781878707963</a><br/>Format:&#160;Electronic Resources<br/> Computer security ent://SD_ILS/0/SD_ILS:1175962 2026-04-27T12:14:18Z 2026-04-27T12:14:18Z by&#160;Carroll, John M. (John Millar), 1925-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780409900323">https://www.sciencedirect.com/science/book/9780409900323</a><br/>Format:&#160;Electronic Resources<br/>