Arama Sonu&ccedil;lar&#305; - Daralt&#305;lm&#305;&#351;: Computer security. - 2002 SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092002$0025092002$0026ps$003d300? 2024-05-26T11:30:12Z Check Point NG next generation security administration ent://SD_ILS/0/SD_ILS:939447 2024-05-26T11:30:12Z 2024-05-26T11:30:12Z by&#160;Simonis, Drew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294029">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing ColdFusion ent://SD_ILS/0/SD_ILS:939498 2024-05-26T11:30:12Z 2024-05-26T11:30:12Z by&#160;Meyer, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294151">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing XML ent://SD_ILS/0/SD_ILS:939502 2024-05-26T11:30:12Z 2024-05-26T11:30:12Z by&#160;O'Farrell, Neal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294155">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Developing secure distributed systems with CORBA ent://SD_ILS/0/SD_ILS:930964 2024-05-26T11:30:12Z 2024-05-26T11:30:12Z by&#160;Lang, Ulrich.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227602">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Special issue on internet security ent://SD_ILS/0/SD_ILS:931530 2024-05-26T11:30:12Z 2024-05-26T11:30:12Z by&#160;Dhillon, Gurpreet.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=232281">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Analysis, design, and implementation of secure and interoperable distributed health information systems ent://SD_ILS/0/SD_ILS:935101 2024-05-26T11:30:12Z 2024-05-26T11:30:12Z by&#160;Blobel, Bernd.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=267473">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Crackproof your software the best ways to protect your software against crackers ent://SD_ILS/0/SD_ILS:936564 2024-05-26T11:30:12Z 2024-05-26T11:30:12Z by&#160;C&#774;erv&#277;n, Pavol.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273482">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity today and tomorrow pay now or pay later ent://SD_ILS/0/SD_ILS:1082583 2024-05-26T11:30:12Z 2024-05-26T11:30:12Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3375180">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Putting the latest z/OS security features to work ent://SD_ILS/0/SD_ILS:1075358 2024-05-26T11:30:12Z 2024-05-26T11:30:12Z by&#160;Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306663">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> An introduction to security in a CSM 1.3 for AIX 5L environment ent://SD_ILS/0/SD_ILS:1075407 2024-05-26T11:30:12Z 2024-05-26T11:30:12Z by&#160;Lascu, Octavian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306712">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cryptography for internet and database applications : developing secret and public key techniques with Java ent://SD_ILS/0/SD_ILS:41923 2024-05-26T11:30:12Z 2024-05-26T11:30:12Z by&#160;Galbreath, Nick<br/>Format:&#160;Kitap<br/> &#304;nternet &uuml;zerinden yap&#305;lan i&#351;lemlerde elektronik para ve dijital imza ent://SD_ILS/0/SD_ILS:488570 2024-05-26T11:30:12Z 2024-05-26T11:30:12Z by&#160;Berber, Leyla Keser<br/>Format:&#160;Kitap<br/> Hack proofing your identity in the information age : protect your family on the internet! ent://SD_ILS/0/SD_ILS:1185318 2024-05-26T11:30:12Z 2024-05-26T11:30:12Z by&#160;Bidwell, Teri.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836517">https://www.sciencedirect.com/science/book/9781931836517</a><br/>Format:&#160;Elektronik Kaynak<br/> Digital watermarking ent://SD_ILS/0/SD_ILS:1188154 2024-05-26T11:30:12Z 2024-05-26T11:30:12Z by&#160;Cox, I. J. (Ingemar J.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607149">http://www.sciencedirect.com/science/book/9781558607149</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security best practices : 205 basic rules ent://SD_ILS/0/SD_ILS:1188318 2024-05-26T11:30:12Z 2024-05-26T11:30:12Z by&#160;Stefanek, George L.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781878707963">https://www.sciencedirect.com/science/book/9781878707963</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing your network ent://SD_ILS/0/SD_ILS:1188357 2024-05-26T11:30:12Z 2024-05-26T11:30:12Z by&#160;Ahmad, David R. Mirza.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994701">https://www.sciencedirect.com/science/book/9781928994701</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing ColdFusion ent://SD_ILS/0/SD_ILS:1188358 2024-05-26T11:30:12Z 2024-05-26T11:30:12Z by&#160;Meyer, Greg.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994770">http://www.sciencedirect.com/science/book/9781928994770</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing XML ent://SD_ILS/0/SD_ILS:1188382 2024-05-26T11:30:12Z 2024-05-26T11:30:12Z by&#160;'Ken'@ftu.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836500">http://www.sciencedirect.com/science/book/9781931836500</a><br/>Format:&#160;Elektronik Kaynak<br/> Scene of the cybercrime : computer forensics handbook ent://SD_ILS/0/SD_ILS:1188494 2024-05-26T11:30:12Z 2024-05-26T11:30:12Z by&#160;Shinder, Debra Littlejohn, author.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836654">https://www.sciencedirect.com/science/book/9781931836654</a><br/>Format:&#160;Elektronik Kaynak<br/> Network security : private communication in a public world ent://SD_ILS/0/SD_ILS:1169380 2024-05-26T11:30:12Z 2024-05-26T11:30:12Z by&#160;Kaufman, Charlie.<br/>Format:&#160;Kitap<br/>