Arama Sonuçları - Daraltılmış: Computer security. - 2002SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bY$0025C4$0025B1l$0025C4$0025B1$0025092002$0025092002$0026ps$003d300?2024-05-26T11:30:12ZCheck Point NG next generation security administrationent://SD_ILS/0/SD_ILS:9394472024-05-26T11:30:12Z2024-05-26T11:30:12Zby Simonis, Drew.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294029">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hack proofing ColdFusionent://SD_ILS/0/SD_ILS:9394982024-05-26T11:30:12Z2024-05-26T11:30:12Zby Meyer, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294151">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hack proofing XMLent://SD_ILS/0/SD_ILS:9395022024-05-26T11:30:12Z2024-05-26T11:30:12Zby O'Farrell, Neal.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294155">Click to View</a><br/>Format: Elektronik Kaynak<br/>Developing secure distributed systems with CORBAent://SD_ILS/0/SD_ILS:9309642024-05-26T11:30:12Z2024-05-26T11:30:12Zby Lang, Ulrich.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227602">Click to View</a><br/>Format: Elektronik Kaynak<br/>Special issue on internet securityent://SD_ILS/0/SD_ILS:9315302024-05-26T11:30:12Z2024-05-26T11:30:12Zby Dhillon, Gurpreet.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=232281">Click to View</a><br/>Format: Elektronik Kaynak<br/>Analysis, design, and implementation of secure and interoperable distributed health information systemsent://SD_ILS/0/SD_ILS:9351012024-05-26T11:30:12Z2024-05-26T11:30:12Zby Blobel, Bernd.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=267473">Click to View</a><br/>Format: Elektronik Kaynak<br/>Crackproof your software the best ways to protect your software against crackersent://SD_ILS/0/SD_ILS:9365642024-05-26T11:30:12Z2024-05-26T11:30:12Zby C̆ervĕn, Pavol.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=273482">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity today and tomorrow pay now or pay laterent://SD_ILS/0/SD_ILS:10825832024-05-26T11:30:12Z2024-05-26T11:30:12Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3375180">Click to View</a><br/>Format: Elektronik Kaynak<br/>Putting the latest z/OS security features to workent://SD_ILS/0/SD_ILS:10753582024-05-26T11:30:12Z2024-05-26T11:30:12Zby Rayns, Chris.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306663">Click to View</a><br/>Format: Elektronik Kaynak<br/>An introduction to security in a CSM 1.3 for AIX 5L environmentent://SD_ILS/0/SD_ILS:10754072024-05-26T11:30:12Z2024-05-26T11:30:12Zby Lascu, Octavian.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3306712">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cryptography for internet and database applications : developing secret and public key techniques with Javaent://SD_ILS/0/SD_ILS:419232024-05-26T11:30:12Z2024-05-26T11:30:12Zby Galbreath, Nick<br/>Format: Kitap<br/>İnternet üzerinden yapılan işlemlerde elektronik para ve dijital imzaent://SD_ILS/0/SD_ILS:4885702024-05-26T11:30:12Z2024-05-26T11:30:12Zby Berber, Leyla Keser<br/>Format: Kitap<br/>Hack proofing your identity in the information age : protect your family on the internet!ent://SD_ILS/0/SD_ILS:11853182024-05-26T11:30:12Z2024-05-26T11:30:12Zby Bidwell, Teri.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836517">https://www.sciencedirect.com/science/book/9781931836517</a><br/>Format: Elektronik Kaynak<br/>Digital watermarkingent://SD_ILS/0/SD_ILS:11881542024-05-26T11:30:12Z2024-05-26T11:30:12Zby Cox, I. J. (Ingemar J.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607149">http://www.sciencedirect.com/science/book/9781558607149</a><br/>Format: Elektronik Kaynak<br/>Information security best practices : 205 basic rulesent://SD_ILS/0/SD_ILS:11883182024-05-26T11:30:12Z2024-05-26T11:30:12Zby Stefanek, George L.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781878707963">https://www.sciencedirect.com/science/book/9781878707963</a><br/>Format: Elektronik Kaynak<br/>Hack proofing your networkent://SD_ILS/0/SD_ILS:11883572024-05-26T11:30:12Z2024-05-26T11:30:12Zby Ahmad, David R. Mirza.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994701">https://www.sciencedirect.com/science/book/9781928994701</a><br/>Format: Elektronik Kaynak<br/>Hack proofing ColdFusionent://SD_ILS/0/SD_ILS:11883582024-05-26T11:30:12Z2024-05-26T11:30:12Zby Meyer, Greg.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781928994770">http://www.sciencedirect.com/science/book/9781928994770</a><br/>Format: Elektronik Kaynak<br/>Hack proofing XMLent://SD_ILS/0/SD_ILS:11883822024-05-26T11:30:12Z2024-05-26T11:30:12Zby 'Ken'@ftu.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836500">http://www.sciencedirect.com/science/book/9781931836500</a><br/>Format: Elektronik Kaynak<br/>Scene of the cybercrime : computer forensics handbookent://SD_ILS/0/SD_ILS:11884942024-05-26T11:30:12Z2024-05-26T11:30:12Zby Shinder, Debra Littlejohn, author.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836654">https://www.sciencedirect.com/science/book/9781931836654</a><br/>Format: Elektronik Kaynak<br/>Network security : private communication in a public worldent://SD_ILS/0/SD_ILS:11693802024-05-26T11:30:12Z2024-05-26T11:30:12Zby Kaufman, Charlie.<br/>Format: Kitap<br/>