Arama Sonu&ccedil;lar&#305; Architecture. - Daralt&#305;lm&#305;&#351;: Computer security. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dArchitecture.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?dt=list 2026-01-02T17:13:01Z Adaptive security management architecture ent://SD_ILS/0/SD_ILS:972238 2026-01-02T17:13:01Z 2026-01-02T17:13:01Z by&#160;Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=625004">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Safety of computer architectures ent://SD_ILS/0/SD_ILS:1008153 2026-01-02T17:13:01Z 2026-01-02T17:13:01Z by&#160;Boulanger, Jean-Louis.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1120753">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Developing secure distributed systems with CORBA ent://SD_ILS/0/SD_ILS:930964 2026-01-02T17:13:01Z 2026-01-02T17:13:01Z by&#160;Lang, Ulrich.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227602">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing IM and P2P applications for the enterprise ent://SD_ILS/0/SD_ILS:933871 2026-01-02T17:13:01Z 2026-01-02T17:13:01Z by&#160;Piccard, Paul L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254847">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing IM and P2P applications for the enterprise ent://SD_ILS/0/SD_ILS:1184263 2026-01-02T17:13:01Z 2026-01-02T17:13:01Z by&#160;Piccard, Paul L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490177">http://www.sciencedirect.com/science/book/9781597490177</a> ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499965">http://www.sciencedirect.com/science/book/9781597499965</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing the cloud cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:977055 2026-01-02T17:13:01Z 2026-01-02T17:13:01Z by&#160;Winkler, J. R. (Joachim R.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=686827">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Proceedings of the First International Conference on Intelligent Computing and Communication ent://SD_ILS/0/SD_ILS:481606 2026-01-02T17:13:01Z 2026-01-02T17:13:01Z by&#160;Mandal, Jyotsna Kumar. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2035-3">http://dx.doi.org/10.1007/978-981-10-2035-3</a><br/>Format:&#160;Elektronik Kaynak<br/> Metasploit toolkit for penetration testing, exploit development, and vulnerability research ent://SD_ILS/0/SD_ILS:1186373 2026-01-02T17:13:01Z 2026-01-02T17:13:01Z by&#160;Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">http://www.sciencedirect.com/science/book/9781597490740</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing the cloud : cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:1183743 2026-01-02T17:13:01Z 2026-01-02T17:13:01Z by&#160;Winkler, J. R. (Joachim R.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format:&#160;Elektronik Kaynak<br/> Trusted platform module basics : using TPM in embedded systems ent://SD_ILS/0/SD_ILS:1185662 2026-01-02T17:13:01Z 2026-01-02T17:13:01Z by&#160;Kinney, Steven.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679602">http://www.sciencedirect.com/science/book/9780750679602</a><br/>Format:&#160;Elektronik Kaynak<br/> IM, instant messaging, security ent://SD_ILS/0/SD_ILS:1185639 2026-01-02T17:13:01Z 2026-01-02T17:13:01Z by&#160;Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583385">http://www.sciencedirect.com/science/book/9781555583385</a><br/>Format:&#160;Elektronik Kaynak<br/> Hardware IP Security and Trust ent://SD_ILS/0/SD_ILS:480829 2026-01-02T17:13:01Z 2026-01-02T17:13:01Z by&#160;Mishra, Prabhat. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-49025-0">http://dx.doi.org/10.1007/978-3-319-49025-0</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing the cloud cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:137201 2026-01-02T17:13:01Z 2026-01-02T17:13:01Z by&#160;Winkler, J. R. (Joachim R.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format:&#160;Elektronik Kaynak<br/> System assurance : beyond detecting vulnerabilities ent://SD_ILS/0/SD_ILS:1183266 2026-01-02T17:13:01Z 2026-01-02T17:13:01Z by&#160;Mansourov, Nikolai.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123814142">https://www.sciencedirect.com/science/book/9780123814142</a><br/>Format:&#160;Elektronik Kaynak<br/> Physical and logical security convergence powered by enterprise security management ent://SD_ILS/0/SD_ILS:1189088 2026-01-02T17:13:01Z 2026-01-02T17:13:01Z by&#160;Contos, Brian T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491228">https://www.sciencedirect.com/science/book/9781597491228</a><br/>Format:&#160;Elektronik Kaynak<br/> Snort 2.1 intrusion detection ent://SD_ILS/0/SD_ILS:1188366 2026-01-02T17:13:01Z 2026-01-02T17:13:01Z by&#160;Beale, Jay.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836043">https://www.sciencedirect.com/science/book/9781931836043</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security best practices : 205 basic rules ent://SD_ILS/0/SD_ILS:1188318 2026-01-02T17:13:01Z 2026-01-02T17:13:01Z by&#160;Stefanek, George L.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781878707963">https://www.sciencedirect.com/science/book/9781878707963</a><br/>Format:&#160;Elektronik Kaynak<br/> Securing Windows server 2008 : prevent attacks from outside and inside your organization. ent://SD_ILS/0/SD_ILS:1189621 2026-01-02T17:13:01Z 2026-01-02T17:13:01Z ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492805">https://www.sciencedirect.com/science/book/9781597492805</a><br/>Format:&#160;Elektronik Kaynak<br/> Windows Server 2003 security infrastructures ent://SD_ILS/0/SD_ILS:1188084 2026-01-02T17:13:01Z 2026-01-02T17:13:01Z by&#160;Clercq, Jan de, 1968-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582838">http://www.sciencedirect.com/science/book/9781555582838</a><br/>Format:&#160;Elektronik Kaynak<br/> HP Nonstop server security : a practical handbook ent://SD_ILS/0/SD_ILS:1188101 2026-01-02T17:13:01Z 2026-01-02T17:13:01Z by&#160;Hill, Terri.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583149">http://www.sciencedirect.com/science/book/9781555583149</a><br/>Format:&#160;Elektronik Kaynak<br/> Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 1 ent://SD_ILS/0/SD_ILS:481578 2026-01-02T17:13:01Z 2026-01-02T17:13:01Z by&#160;Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1675-2">http://dx.doi.org/10.1007/978-981-10-1675-2</a><br/>Format:&#160;Elektronik Kaynak<br/> Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 2 ent://SD_ILS/0/SD_ILS:481579 2026-01-02T17:13:01Z 2026-01-02T17:13:01Z by&#160;Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1678-3">http://dx.doi.org/10.1007/978-981-10-1678-3</a><br/>Format:&#160;Elektronik Kaynak<br/>