Search Results for Control. - Narrowed by: Computer security. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dControl.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?dt=list 2026-04-08T18:16:55Z Relation based access control ent://SD_ILS/0/SD_ILS:1025132 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Zhang, Rui.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1589007">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Role-based access control ent://SD_ILS/0/SD_ILS:930991 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Ferraiolo, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227631">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Role-based access control ent://SD_ILS/0/SD_ILS:945221 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Ferraiolo, David.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=338751">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IT audit, control, and security ent://SD_ILS/0/SD_ILS:972135 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Moeller, Robert R.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=624573">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity for industrial control systems SCADA, DCS, PLC, HMI, and SIS ent://SD_ILS/0/SD_ILS:987449 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Macaulay, Tyson.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=826923">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Industrial network security securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems ent://SD_ILS/0/SD_ILS:137208 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Knapp, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496452">http://www.sciencedirect.com/science/book/9781597496452</a><br/>Format:&#160;Electronic Resources<br/> Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems ent://SD_ILS/0/SD_ILS:1184011 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Knapp, Eric.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496452">https://www.sciencedirect.com/science/book/9781597496452</a><br/>Format:&#160;Electronic Resources<br/> Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems ent://SD_ILS/0/SD_ILS:1042469 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Knapp, Eric D., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1887712">Click to View</a><br/>Format:&#160;Electronic Resources<br/> RIoT control : understanding and managing risks and the internet of things ent://SD_ILS/0/SD_ILS:1118263 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Macaulay, Tyson, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4691335">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security and control in information systems a guide for business and accounting ent://SD_ILS/0/SD_ILS:932451 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Hawker, Andrew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=240531">Click to View</a><br/>Format:&#160;Electronic Resources<br/> A&#287; ve siber g&uuml;venlik temelleri : dijital d&uuml;nyada g&uuml;vende kal&#305;n ent://SD_ILS/0/SD_ILS:1232171 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;H&#305;n&ccedil;er, G&ouml;rkem, yazar.<br/>Format:&#160;Books<br/> Kali Linux network scanning cookbook : take your penetration-testing skills to the next level ent://SD_ILS/0/SD_ILS:1126762 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Hixon, Michael, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4867412">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The basics of digital privacy : simple tools to protect your personal information and your identity online ent://SD_ILS/0/SD_ILS:1023569 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1573362">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Oracle Identity and Access Manager 11g for administrators administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasks ent://SD_ILS/0/SD_ILS:996835 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Kumar, Atul.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948559">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Digital privacy in the marketplace : perspectives on the information exchange ent://SD_ILS/0/SD_ILS:1044912 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Milne, George R., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1920895">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Managed code rootkits : hooking into runtime environments ent://SD_ILS/0/SD_ILS:1181827 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Metula, Erez.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495745">http://www.sciencedirect.com/science/book/9781597495745</a><br/>Format:&#160;Electronic Resources<br/> Intrusion prevention and active response deploying network and host IPS ent://SD_ILS/0/SD_ILS:930714 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Henmi, Anne.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=226578">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security intelligence : a practitioner's guide to solving enterprise security challenges ent://SD_ILS/0/SD_ILS:1042735 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Li, Qing, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1895130">Click to View</a><br/>Format:&#160;Electronic Resources<br/> OAuth 2.0 identity and access management patterns ent://SD_ILS/0/SD_ILS:1023480 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Spasovski, Martin.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572907">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Instant Java password and authentication security ent://SD_ILS/0/SD_ILS:1023486 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Mayoral, Fernando.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1572913">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Perfect passwords selection, protection, authentication ent://SD_ILS/0/SD_ILS:933875 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Burnett, Mark.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254851">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux wireless penetration testing : beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack ent://SD_ILS/0/SD_ILS:1137050 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Buchanan, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5340668">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux wireless penetration testing beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux ent://SD_ILS/0/SD_ILS:1047089 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Ramachandran, Vivek, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2005211">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Check Point NG next generation security administration ent://SD_ILS/0/SD_ILS:939447 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Simonis, Drew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294029">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network security : private communication in a public world ent://SD_ILS/0/SD_ILS:1169380 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Kaufman, Charlie.<br/>Format:&#160;Books<br/> Essential skills for hackers ent://SD_ILS/0/SD_ILS:1104568 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Cardwell, Kevin, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4189281">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:933858 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Long, Johnny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254834">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux ent://SD_ILS/0/SD_ILS:1031737 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Buchanan, Cameron, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1688607">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information protection playbook ent://SD_ILS/0/SD_ILS:1019990 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Kane, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1418381">Click to View</a><br/>Format:&#160;Electronic Resources<br/> A multidisciplinary introduction to information security ent://SD_ILS/0/SD_ILS:1028416 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Mj&oslash;lsnes, Stig F., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1648315">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Essential computer security everyone's guide to e-mail, internet, and wireless security ent://SD_ILS/0/SD_ILS:943350 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Bradley, Tony.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=319200">Click to View</a><br/>Format:&#160;Electronic Resources<br/> User's guide to cryptography and standards ent://SD_ILS/0/SD_ILS:931017 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Dent, Alexander W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227658">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Analysis, design, and implementation of secure and interoperable distributed health information systems ent://SD_ILS/0/SD_ILS:935101 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Blobel, Bernd.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=267473">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Intrusion prevention and active response : deploying network and host IPS ent://SD_ILS/0/SD_ILS:1188400 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Rash, Michael.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266474">http://www.sciencedirect.com/science/book/9781932266474</a><br/>Format:&#160;Electronic Resources<br/> Infosecurity 2008 threat analysis ent://SD_ILS/0/SD_ILS:1190000 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Clark, Champ, III.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492249">https://www.sciencedirect.com/science/book/9781597492249</a><br/>Format:&#160;Electronic Resources<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:1188248 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490214">https://www.sciencedirect.com/science/book/9781597490214</a><br/>Format:&#160;Electronic Resources<br/> Essential computer security : everyone's guide to e-mail, internet, and wireless security ent://SD_ILS/0/SD_ILS:1186419 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Bradley, Tony, 1969-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491143">https://www.sciencedirect.com/science/book/9781597491143</a><br/>Format:&#160;Electronic Resources<br/> Snort : IDS and IPS toolkit ent://SD_ILS/0/SD_ILS:1188271 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Beale, Jay.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490993">https://www.sciencedirect.com/science/book/9781597490993</a><br/>Format:&#160;Electronic Resources<br/> Core software security : security at the source ent://SD_ILS/0/SD_ILS:1022705 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Ransome, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1547083">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Advances in intelligence and security informatics ent://SD_ILS/0/SD_ILS:133381 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Mao, Wenji.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123972002">http://www.sciencedirect.com/science/book/9780123972002</a><br/>Format:&#160;Electronic Resources<br/> The basics of information security understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:133592 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Andress, Jason.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format:&#160;Electronic Resources<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:1183815 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Andress, Jason.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496537">https://www.sciencedirect.com/science/book/9781597496537</a><br/>Format:&#160;Electronic Resources<br/> Insider threat : protecting the enterprise from sabotage, spying, and theft ent://SD_ILS/0/SD_ILS:1188259 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Cole, Eric.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490481">http://www.sciencedirect.com/science/book/9781597490481</a><br/>Format:&#160;Electronic Resources<br/> Host integrity monitoring : using Osiris and Samhain ent://SD_ILS/0/SD_ILS:1188245 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Wotring, Brian.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490184">http://www.sciencedirect.com/science/book/9781597490184</a><br/>Format:&#160;Electronic Resources<br/> Securing the cloud : cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:1183743 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Winkler, J. R. (Joachim R.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format:&#160;Electronic Resources<br/> Cyber spying : tracking your family's (sometimes) secret online lives ent://SD_ILS/0/SD_ILS:1188379 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Fair, Ted.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836418">https://www.sciencedirect.com/science/book/9781931836418</a><br/>Format:&#160;Electronic Resources<br/> Stealing the network : how to own a continent ent://SD_ILS/0/SD_ILS:1188367 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;131ah.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836050">http://www.sciencedirect.com/science/book/9781931836050</a><br/>Format:&#160;Electronic Resources<br/> Zero day exploit : countdown to darkness ent://SD_ILS/0/SD_ILS:1188489 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Shein, Rob.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836098">http://www.sciencedirect.com/science/book/9781931836098</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity for Industry 4.0 Analysis for Design and Manufacturing ent://SD_ILS/0/SD_ILS:480924 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Thames, Lane. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-50660-9">http://dx.doi.org/10.1007/978-3-319-50660-9</a><br/>Format:&#160;Electronic Resources<br/> Computer Communication, Networking and Internet Security Proceedings of IC3T 2016 ent://SD_ILS/0/SD_ILS:481714 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3226-4">http://dx.doi.org/10.1007/978-981-10-3226-4</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume Three ent://SD_ILS/0/SD_ILS:481732 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3409-1">http://dx.doi.org/10.1007/978-981-10-3409-1</a><br/>Format:&#160;Electronic Resources<br/> Information Fusion for Cyber-Security Analytics ent://SD_ILS/0/SD_ILS:480528 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Alsmadi, Izzat M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44257-0">http://dx.doi.org/10.1007/978-3-319-44257-0</a><br/>Format:&#160;Electronic Resources<br/> Securing the cloud cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:137201 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Winkler, J. R. (Joachim R.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format:&#160;Electronic Resources<br/> Physical and logical security convergence powered by enterprise security management ent://SD_ILS/0/SD_ILS:1189088 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Contos, Brian T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491228">https://www.sciencedirect.com/science/book/9781597491228</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at securing your network ent://SD_ILS/0/SD_ILS:1189983 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Dubrawsky, Ido.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492317">https://www.sciencedirect.com/science/book/9781597492317</a><br/>Format:&#160;Electronic Resources<br/> Securing IM and P2P applications for the enterprise ent://SD_ILS/0/SD_ILS:1184263 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Piccard, Paul L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490177">http://www.sciencedirect.com/science/book/9781597490177</a> ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499965">http://www.sciencedirect.com/science/book/9781597499965</a><br/>Format:&#160;Electronic Resources<br/> Multimedia security technologies for digital rights management ent://SD_ILS/0/SD_ILS:1186994 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Zeng, Wenjun, 1967-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123694768">http://www.sciencedirect.com/science/book/9780123694768</a><br/>Format:&#160;Electronic Resources<br/> Implementing database security and auditing : a guide for DBAs, information security administrators and auditors ent://SD_ILS/0/SD_ILS:1188115 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Ben-Natan, Ron.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">http://www.sciencedirect.com/science/book/9781555583347</a><br/>Format:&#160;Electronic Resources<br/> Hacking a terror network : the silent threat of covert channels ent://SD_ILS/0/SD_ILS:1188363 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Rogers, Russ.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994985">https://www.sciencedirect.com/science/book/9781928994985</a><br/>Format:&#160;Electronic Resources<br/> Digital watermarking ent://SD_ILS/0/SD_ILS:1188154 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Cox, I. J. (Ingemar J.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607149">http://www.sciencedirect.com/science/book/9781558607149</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing Windows 2000 ent://SD_ILS/0/SD_ILS:1188381 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Todd, Chad.<br/><a href="http://www.sciencedirect.com/science/book/9781931836494">Available from ScienceDirect. Online version available for university members only. This requires an institutional login off-campus</a> ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836494">https://www.sciencedirect.com/science/book/9781931836494</a><br/>Format:&#160;Electronic Resources<br/> A guide to kernel exploitation : attacking the core ent://SD_ILS/0/SD_ILS:1181770 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Perla, Enrico.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494861">https://www.sciencedirect.com/science/book/9781597494861</a><br/>Format:&#160;Electronic Resources<br/> Securing Windows server 2008 : prevent attacks from outside and inside your organization. ent://SD_ILS/0/SD_ILS:1189621 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492805">https://www.sciencedirect.com/science/book/9781597492805</a><br/>Format:&#160;Electronic Resources<br/> Computer security ent://SD_ILS/0/SD_ILS:1175962 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Carroll, John M. (John Millar), 1925-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780409900323">https://www.sciencedirect.com/science/book/9780409900323</a><br/>Format:&#160;Electronic Resources<br/> HP Nonstop server security : a practical handbook ent://SD_ILS/0/SD_ILS:1188101 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Hill, Terri.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583149">http://www.sciencedirect.com/science/book/9781555583149</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 1 ent://SD_ILS/0/SD_ILS:481578 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1675-2">http://dx.doi.org/10.1007/978-981-10-1675-2</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 2 ent://SD_ILS/0/SD_ILS:481579 2026-04-08T18:16:55Z 2026-04-08T18:16:55Z by&#160;Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1678-3">http://dx.doi.org/10.1007/978-981-10-1678-3</a><br/>Format:&#160;Electronic Resources<br/>