Search Results for Information science. - Narrowed by: Computer security.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dInformation$002bscience.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300?dt=list2026-03-20T16:29:59ZInformation Science and Applications 2017 ICISA 2017ent://SD_ILS/0/SD_ILS:4817842026-03-20T16:29:59Z2026-03-20T16:29:59Zby Kim, Kuinam. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-4154-9">http://dx.doi.org/10.1007/978-981-10-4154-9</a><br/>Format: Electronic Resources<br/>Information security science : measuring the vulnerability to data compromisesent://SD_ILS/0/SD_ILS:11135002026-03-20T16:29:59Z2026-03-20T16:29:59Zby Young, Carl S., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4567434">Click to View</a><br/>Format: Electronic Resources<br/>Engineering secure and dependable software systemsent://SD_ILS/0/SD_ILS:11483372026-03-20T16:29:59Z2026-03-20T16:29:59Zby Pretschner, Alexander, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5899580">Click to View</a><br/>Format: Electronic Resources<br/>Critical infrastructure protection against hybrid warfare security related challengesent://SD_ILS/0/SD_ILS:11211662026-03-20T16:29:59Z2026-03-20T16:29:59Zby Niglia, Alessandro, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4753392">Click to View</a><br/>Format: Electronic Resources<br/>Best practices in computer network defense : incident detection and responseent://SD_ILS/0/SD_ILS:10276412026-03-20T16:29:59Z2026-03-20T16:29:59Zby Hathaway, Melissa E., editor of compilation.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1637648">Click to View</a><br/>Format: Electronic Resources<br/>Logics and languages for reliability and securityent://SD_ILS/0/SD_ILS:9666272026-03-20T16:29:59Z2026-03-20T16:29:59Zby Esparza, Javier.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=557042">Click to View</a><br/>Format: Electronic Resources<br/>Information assurance and computer securityent://SD_ILS/0/SD_ILS:9381762026-03-20T16:29:59Z2026-03-20T16:29:59Zby NATO Advanced Research Workshop on Information Assurance and Computer Security (2005 : T?etouan, Morocco)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=287000">Click to View</a><br/>Format: Electronic Resources<br/>Summary of discussions at a planning meeting on cyber-security and the insider threat to classified informationent://SD_ILS/0/SD_ILS:10848892026-03-20T16:29:59Z2026-03-20T16:29:59Zby National Research Council (U.S.). Computer Science and Telecommunications Board.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3377658">Click to View</a><br/>Format: Electronic Resources<br/>Proceedings of the First International Conference on Intelligent Computing and Communicationent://SD_ILS/0/SD_ILS:4816062026-03-20T16:29:59Z2026-03-20T16:29:59Zby Mandal, Jyotsna Kumar. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2035-3">http://dx.doi.org/10.1007/978-981-10-2035-3</a><br/>Format: Electronic Resources<br/>Innovations in Computer Science and Engineering Proceedings of the Fourth ICICSE 2016ent://SD_ILS/0/SD_ILS:4817642026-03-20T16:29:59Z2026-03-20T16:29:59Zby Saini, H. S. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3818-1">http://dx.doi.org/10.1007/978-981-10-3818-1</a><br/>Format: Electronic Resources<br/>Smart Grids: Security and Privacy Issuesent://SD_ILS/0/SD_ILS:4805722026-03-20T16:29:59Z2026-03-20T16:29:59Zby Boroojeni, Kianoosh G. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45050-6">http://dx.doi.org/10.1007/978-3-319-45050-6</a><br/>Format: Electronic Resources<br/>Multimedia Forensics and Security Foundations, Innovations, and Applicationsent://SD_ILS/0/SD_ILS:4805302026-03-20T16:29:59Z2026-03-20T16:29:59Zby Hassanien, Aboul Ella. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44270-9">http://dx.doi.org/10.1007/978-3-319-44270-9</a><br/>Format: Electronic Resources<br/>Web application obfuscation -/WAFs..Evasion..Filters//alert (/Obfuscation/)-ent://SD_ILS/0/SD_ILS:1372092026-03-20T16:29:59Z2026-03-20T16:29:59Zby Heiderich, Mario.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496049">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>A guide to kernel exploitation : attacking the coreent://SD_ILS/0/SD_ILS:11817702026-03-20T16:29:59Z2026-03-20T16:29:59Zby Perla, Enrico.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494861">https://www.sciencedirect.com/science/book/9781597494861</a><br/>Format: Electronic Resources<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:11864602026-03-20T16:29:59Z2026-03-20T16:29:59Zby Winkler, Ira.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491686">https://www.sciencedirect.com/science/book/9781597491686</a><br/>Format: Electronic Resources<br/>Syngress force emerging threat analysis : from mischief to maliciousent://SD_ILS/0/SD_ILS:11863392026-03-20T16:29:59Z2026-03-20T16:29:59Zby Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">http://www.sciencedirect.com/science/book/9781597490566</a><br/>Format: Electronic Resources<br/>The history of information security : a comprehensive handbookent://SD_ILS/0/SD_ILS:11865232026-03-20T16:29:59Z2026-03-20T16:29:59Zby Leeuw, Karl de.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444516084">http://www.sciencedirect.com/science/book/9780444516084</a><br/>Format: Electronic Resources<br/>