Search Results for Software engineering. - Narrowed by: Computer security. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dSoftware$002bengineering.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300?dt=list 2026-04-11T17:27:17Z Engineering secure and dependable software systems ent://SD_ILS/0/SD_ILS:1148337 2026-04-11T17:27:17Z 2026-04-11T17:27:17Z by&#160;Pretschner, Alexander, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5899580">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Reversing secrets of reverse engineering ent://SD_ILS/0/SD_ILS:930876 2026-04-11T17:27:17Z 2026-04-11T17:27:17Z by&#160;Eilam, Eldad.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227440">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Embedded systems security practical methods for safe and secure software and systems development ent://SD_ILS/0/SD_ILS:133376 2026-04-11T17:27:17Z 2026-04-11T17:27:17Z by&#160;Kleidermacher, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123868862">http://www.sciencedirect.com/science/book/9780123868862</a><br/>Format:&#160;Electronic Resources<br/> Information Science and Applications 2017 ICISA 2017 ent://SD_ILS/0/SD_ILS:481784 2026-04-11T17:27:17Z 2026-04-11T17:27:17Z by&#160;Kim, Kuinam. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-4154-9">http://dx.doi.org/10.1007/978-981-10-4154-9</a><br/>Format:&#160;Electronic Resources<br/> Information Fusion for Cyber-Security Analytics ent://SD_ILS/0/SD_ILS:480528 2026-04-11T17:27:17Z 2026-04-11T17:27:17Z by&#160;Alsmadi, Izzat M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44257-0">http://dx.doi.org/10.1007/978-3-319-44257-0</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume Four ent://SD_ILS/0/SD_ILS:481731 2026-04-11T17:27:17Z 2026-04-11T17:27:17Z by&#160;Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3391-9">http://dx.doi.org/10.1007/978-981-10-3391-9</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume Three ent://SD_ILS/0/SD_ILS:481732 2026-04-11T17:27:17Z 2026-04-11T17:27:17Z by&#160;Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3409-1">http://dx.doi.org/10.1007/978-981-10-3409-1</a><br/>Format:&#160;Electronic Resources<br/> Advances in computers. Volume 83 ent://SD_ILS/0/SD_ILS:1183782 2026-04-11T17:27:17Z 2026-04-11T17:27:17Z by&#160;Zelkowitz, Marvin V., 1945-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123855107">http://www.sciencedirect.com/science/book/9780123855107</a><br/>Format:&#160;Electronic Resources<br/>