Search Results for Database security. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dDatabase$002bsecurity.$0026ps$003d300?dt=list 2026-04-02T22:13:37Z Implementing database security and auditing ent://SD_ILS/0/SD_ILS:938079 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Ben-Natan, Ron.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=286701">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Data and applications security developments and directions : IFIP TC11 WG11.3 Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000 ent://SD_ILS/0/SD_ILS:1062462 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;IFIP TC 11 WG 11.3 Working Conference on Database Security (14th : 2000 : Schoorl, Netherlands)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3035684">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Implementing database security and auditing : a guide for DBAs, information security administrators and auditors ent://SD_ILS/0/SD_ILS:1188115 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Ben-Natan, Ron.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">http://www.sciencedirect.com/science/book/9781555583347</a><br/>Format:&#160;Electronic Resources<br/> Practical Oracle Security : Your Unauthorized Guide to Relationial Database Security. ent://SD_ILS/0/SD_ILS:1186476 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491983">http://www.sciencedirect.com/science/book/9781597491983</a><br/>Format:&#160;Electronic Resources<br/> Securing SQL server : protecting Your database from attackers ent://SD_ILS/0/SD_ILS:1048969 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Cherry, Denny, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=2037826">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Infosecurity 2008 threat analysis ent://SD_ILS/0/SD_ILS:1190000 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Clark, Champ, III.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492249">https://www.sciencedirect.com/science/book/9781597492249</a><br/>Format:&#160;Electronic Resources<br/> Veri tabanlar&#305;nda bilgi y&ouml;netimi g&uuml;venlik ve performans : &ouml;&#287;renci i&#351;leri web uygulamas&#305; ent://SD_ILS/0/SD_ILS:1163434 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Ay&#305;k, Y. Ziya.<br/>Format:&#160;Books<br/> Check Point NG next generation security administration ent://SD_ILS/0/SD_ILS:939447 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Simonis, Drew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294029">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IBM Tivoli storage resource manager a practical introduction ent://SD_ILS/0/SD_ILS:1075415 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Brooks, Charlotte.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306720">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cryptography for internet and database applications : developing secret and public key techniques with Java ent://SD_ILS/0/SD_ILS:41923 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Galbreath, Nick<br/>Format:&#160;Books<br/> IT-Sicherheit : Eine Einf&uuml;hrung ent://SD_ILS/0/SD_ILS:1132546 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Hellmann, Roland, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5157634">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Securing SQL servers protecting your database from attackers ent://SD_ILS/0/SD_ILS:998953 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Cherry, Denny.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=980013">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Veri tabanlar&#305;n&#305;n hukuki korumas&#305; . Legal protection of databases ent://SD_ILS/0/SD_ILS:128628 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Ate&#351;, Mustafa<br/>Format:&#160;Books<br/> Oracle Identity and Access Manager 11g for administrators administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasks ent://SD_ILS/0/SD_ILS:996835 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Kumar, Atul.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=948559">Click to View</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at designing security for a Windows Server 2003 network ent://SD_ILS/0/SD_ILS:933856 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Amini, Rob.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254832">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Virtualization for security : including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting ent://SD_ILS/0/SD_ILS:1191997 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Hoopes, John.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597493055">https://www.sciencedirect.com/science/book/9781597493055</a><br/>Format:&#160;Electronic Resources<br/> Safeguarding critical e-documents implementing a program for securing confidential information assets ent://SD_ILS/0/SD_ILS:987148 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Smallwood, Robert F., 1959-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=821999">Click to View</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at designing security for a Windows Server 2003 network ent://SD_ILS/0/SD_ILS:1188281 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Amini, Rob.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492430">https://www.sciencedirect.com/science/book/9781597492430</a><br/>Format:&#160;Electronic Resources<br/> Securing SQL server protecting your database from attackers ent://SD_ILS/0/SD_ILS:137191 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Cherry, Denny.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496254">http://www.sciencedirect.com/science/book/9781597496254</a><br/>Format:&#160;Electronic Resources<br/> Securing SQL server : protecting your database from attackers ent://SD_ILS/0/SD_ILS:1183510 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Cherry, Denny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597496254">https://www.sciencedirect.com/science/book/9781597496254</a><br/>Format:&#160;Electronic Resources<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:1188248 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597490214">https://www.sciencedirect.com/science/book/9781597490214</a><br/>Format:&#160;Electronic Resources<br/> Fundamentals of pervasive information management systems ent://SD_ILS/0/SD_ILS:1015832 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Kumar, Vijay, 1946-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1245698">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Advances in computers. Volume 38 ent://SD_ILS/0/SD_ILS:1190473 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Yovits, M. C. (Marshall Clinton)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780120121380">http://www.sciencedirect.com/science/book/9780120121380</a><br/>Format:&#160;Electronic Resources<br/> Digital Watermarking Techniques and Trends ent://SD_ILS/0/SD_ILS:481612 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Nematollahi, Mohammad Ali. author.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2095-7">http://dx.doi.org/10.1007/978-981-10-2095-7</a><br/>Format:&#160;Electronic Resources<br/> Administrative assistant's and secretary's handbook ent://SD_ILS/0/SD_ILS:953228 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Stroman, James.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=434976">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Surveillance as social sorting privacy, risk, and digital discrimination ent://SD_ILS/0/SD_ILS:932478 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Lyon, David, 1948-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=240591">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Surveillance as social sorting : privacy, risk, and digital discrimination ent://SD_ILS/0/SD_ILS:478370 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Lyon, David, 1948-, editor<br/>Format:&#160;Books<br/> Java a beginner's tutorial ent://SD_ILS/0/SD_ILS:1055467 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Kurniawan, Budi.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3003873">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing XML ent://SD_ILS/0/SD_ILS:1188382 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;'Ken'@ftu.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836500">http://www.sciencedirect.com/science/book/9781931836500</a><br/>Format:&#160;Electronic Resources<br/> Deadly Contagion: The Tactical Use and Migration of Suicide Bombings ent://SD_ILS/0/SD_ILS:690956 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Buckley, Karen Jean, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10793010">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10793010</a><br/>Format:&#160;Books<br/> Advances in Computer Science and Ubiquitous Computing CSA-CUTE2016 ent://SD_ILS/0/SD_ILS:481696 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Park, James J. (Jong Hyuk). editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3023-9">http://dx.doi.org/10.1007/978-981-10-3023-9</a><br/>Format:&#160;Electronic Resources<br/> The political economy of terrorism ent://SD_ILS/0/SD_ILS:986025 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Enders, Walter, 1948-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=807319">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Electronic security systems : a manager's guide to evaluating and selecting system solutions ent://SD_ILS/0/SD_ILS:1188014 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Pearson, Robert L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679992">http://www.sciencedirect.com/science/book/9780750679992</a><br/>Format:&#160;Electronic Resources<br/> Mission-critical Microsoft Exchange 2003 : designing and building reliable exchange servers ent://SD_ILS/0/SD_ILS:1188087 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Cochran, Jerry, 1964-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582944">http://www.sciencedirect.com/science/book/9781555582944</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing your Web applications ent://SD_ILS/0/SD_ILS:1188343 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Traxler, Julie.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994312">https://www.sciencedirect.com/science/book/9781928994312</a><br/>Format:&#160;Electronic Resources<br/> Digital marketing management : a handbook for the current (or future) CEO ent://SD_ILS/0/SD_ILS:1045217 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Zahay, Debra L., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1934295">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Criminologists on terrorism and homeland security ent://SD_ILS/0/SD_ILS:974091 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Forst, Brian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=667580">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Demystifying embedded systems middleware ent://SD_ILS/0/SD_ILS:1181844 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Noergaard, Tammy.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780750684552">https://www.sciencedirect.com/science/book/9780750684552</a><br/>Format:&#160;Electronic Resources<br/> Principles of computer system design : an introduction ent://SD_ILS/0/SD_ILS:1192818 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Saltzer, J. H., 1939-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123749574">https://www.sciencedirect.com/science/book/9780123749574</a><br/>Format:&#160;Electronic Resources<br/> How to cheat at configuring Exchange server 2007 : including Outlook web, mobile, and voice access ent://SD_ILS/0/SD_ILS:1186451 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Walther, Henrik.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491372">http://www.sciencedirect.com/science/book/9781597491372</a><br/>Format:&#160;Electronic Resources<br/> Security log management : identifying patterns in the chaos ent://SD_ILS/0/SD_ILS:1188257 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Babbin, Jacob.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490429">http://www.sciencedirect.com/science/book/9781597490429</a><br/>Format:&#160;Electronic Resources<br/> Google hacking for penetration testers ent://SD_ILS/0/SD_ILS:1188375 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836364">http://www.sciencedirect.com/science/book/9781931836364</a><br/>Format:&#160;Electronic Resources<br/> SQL:1999 : understanding relational language components ent://SD_ILS/0/SD_ILS:1188123 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Melton, Jim, 1946-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558604568">http://www.sciencedirect.com/science/book/9781558604568</a><br/>Format:&#160;Electronic Resources<br/> JDBC : practical guide for Java programmers ent://SD_ILS/0/SD_ILS:1188156 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Speegle, Gregory D. (Gregory David)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607361">http://www.sciencedirect.com/science/book/9781558607361</a> ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781558607361">https://www.sciencedirect.com/science/book/9781558607361</a><br/>Format:&#160;Electronic Resources<br/> XML.NET : developer's guide ent://SD_ILS/0/SD_ILS:1188347 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Sills, Adam.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994473">https://www.sciencedirect.com/science/book/9781928994473</a><br/>Format:&#160;Electronic Resources<br/> Interoperable database systems (DS-5) : proceedings of theIFIP WG2.6 Database Semantics Conference on Interoperable Database Systems (DS-5), Lorne, Victoria, Australia, 16-20 November, 1992 ent://SD_ILS/0/SD_ILS:1181561 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;IFIP WG2.6 Database Semantics Conference on Interoperable Database Systems (DS-5) (1992 : Lorne, Vic.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444898791">http://www.sciencedirect.com/science/book/9780444898791</a><br/>Format:&#160;Electronic Resources<br/> Advances in computers. Volume 29 ent://SD_ILS/0/SD_ILS:1190475 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Yovits, M. C. (Marshall Clinton)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780120121298">http://www.sciencedirect.com/science/book/9780120121298</a> ScienceDirect <a href="http://www.sciencedirect.com/science/bookseries/00652458/29">http://www.sciencedirect.com/science/bookseries/00652458/29</a><br/>Format:&#160;Electronic Resources<br/> Campus Safety in 4-Year Public Colleges and Universities in the United States ent://SD_ILS/0/SD_ILS:682805 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Padilla, George Gregory, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10827948">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10827948</a><br/>Format:&#160;Books<br/> Dark Web Exploring and Data Mining the Dark Side of the Web ent://SD_ILS/0/SD_ILS:137586 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Chen, Hsinchun.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-1557-2">http://dx.doi.org/10.1007/978-1-4614-1557-2</a><br/>Format:&#160;Electronic Resources<br/> SAP security configuration and deployment : the IT administrator's guide to best practices ent://SD_ILS/0/SD_ILS:1191622 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Wun-Young, Leslie.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492843">http://www.sciencedirect.com/science/book/9781597492843</a><br/>Format:&#160;Electronic Resources<br/> Relational database design and implementation : clearly explained ent://SD_ILS/0/SD_ILS:1192801 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Harrington, Jan L.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123747303">https://www.sciencedirect.com/science/book/9780123747303</a><br/>Format:&#160;Electronic Resources<br/> Google hacking for penetration testers. Volume 2 ent://SD_ILS/0/SD_ILS:1189102 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Long, Johnny.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491761">https://www.sciencedirect.com/science/book/9781597491761</a><br/>Format:&#160;Electronic Resources<br/> Very large data bases 2002 : proceedings of the Twenty-eighth International Conference on Very Large Data Bases, Hong Kong SAR, China, 20-23 August 2002 ent://SD_ILS/0/SD_ILS:1188199 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;International Conference on Very Large Data Bases (28th : 2002 : Hong Kong, China)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558608696">http://www.sciencedirect.com/science/book/9781558608696</a><br/>Format:&#160;Electronic Resources<br/> The IT regulatory and standards compliance handbook ent://SD_ILS/0/SD_ILS:1189642 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Wright, Craig.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492669">http://www.sciencedirect.com/science/book/9781597492669</a><br/>Format:&#160;Electronic Resources<br/> Microsoft SQL Server 2005 performance optimization and tuning handbook ent://SD_ILS/0/SD_ILS:1185407 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;England, Ken, 1955-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583194">http://www.sciencedirect.com/science/book/9781555583194</a><br/>Format:&#160;Electronic Resources<br/> Oracle 10g developing media rich applications ent://SD_ILS/0/SD_ILS:1185487 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Guros, Larry.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583316">http://www.sciencedirect.com/science/book/9781555583316</a><br/>Format:&#160;Electronic Resources<br/> Oracle SQL : Jumpstart with examples ent://SD_ILS/0/SD_ILS:1188109 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Powell, Gavin.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583231">http://www.sciencedirect.com/science/book/9781555583231</a><br/>Format:&#160;Electronic Resources<br/> Encyclopedia of information systems ent://SD_ILS/0/SD_ILS:1188888 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Bidgoli, Hossein.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/referenceworks/9780122272400">http://www.sciencedirect.com/science/referenceworks/9780122272400</a><br/>Format:&#160;Electronic Resources<br/> Application Performance Management (APM) in the Digital Enterprise : Managing Applications for Cloud, Mobile, IoT and EBusiness. ent://SD_ILS/0/SD_ILS:1151202 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Sturm, Rick.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4804454">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information modeling and relational databases ent://SD_ILS/0/SD_ILS:1189631 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Halpin, T. A.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123735683">http://www.sciencedirect.com/science/book/9780123735683</a><br/>Format:&#160;Electronic Resources<br/> Systems and human science, for safety, security, and dependability : seleced papers of the 1st International Symposium SSR2003, Osaka, Japan, November 2003 ent://SD_ILS/0/SD_ILS:1187508 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;International Symposium on Systems and Human Science (1st : 2003 : Osaka University)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444518132">http://www.sciencedirect.com/science/book/9780444518132</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing your network ent://SD_ILS/0/SD_ILS:1188357 2026-04-02T22:13:37Z 2026-04-02T22:13:37Z by&#160;Ahmad, David R. Mirza.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994701">https://www.sciencedirect.com/science/book/9781928994701</a><br/>Format:&#160;Electronic Resources<br/>