Arama Sonuçları Architecture. - Daraltılmış: Computer security.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dArchitecture.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?dt=list2026-01-02T17:13:01ZAdaptive security management architectureent://SD_ILS/0/SD_ILS:9722382026-01-02T17:13:01Z2026-01-02T17:13:01Zby Tiller, James S.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=625004">Click to View</a><br/>Format: Elektronik Kaynak<br/>Safety of computer architecturesent://SD_ILS/0/SD_ILS:10081532026-01-02T17:13:01Z2026-01-02T17:13:01Zby Boulanger, Jean-Louis.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1120753">Click to View</a><br/>Format: Elektronik Kaynak<br/>Developing secure distributed systems with CORBAent://SD_ILS/0/SD_ILS:9309642026-01-02T17:13:01Z2026-01-02T17:13:01Zby Lang, Ulrich.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=227602">Click to View</a><br/>Format: Elektronik Kaynak<br/>Securing IM and P2P applications for the enterpriseent://SD_ILS/0/SD_ILS:9338712026-01-02T17:13:01Z2026-01-02T17:13:01Zby Piccard, Paul L.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=254847">Click to View</a><br/>Format: Elektronik Kaynak<br/>Securing IM and P2P applications for the enterpriseent://SD_ILS/0/SD_ILS:11842632026-01-02T17:13:01Z2026-01-02T17:13:01Zby Piccard, Paul L.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490177">http://www.sciencedirect.com/science/book/9781597490177</a>
ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499965">http://www.sciencedirect.com/science/book/9781597499965</a><br/>Format: Elektronik Kaynak<br/>Securing the cloud cloud computer security techniques and tacticsent://SD_ILS/0/SD_ILS:9770552026-01-02T17:13:01Z2026-01-02T17:13:01Zby Winkler, J. R. (Joachim R.)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=686827">Click to View</a><br/>Format: Elektronik Kaynak<br/>Proceedings of the First International Conference on Intelligent Computing and Communicationent://SD_ILS/0/SD_ILS:4816062026-01-02T17:13:01Z2026-01-02T17:13:01Zby Mandal, Jyotsna Kumar. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2035-3">http://dx.doi.org/10.1007/978-981-10-2035-3</a><br/>Format: Elektronik Kaynak<br/>Metasploit toolkit for penetration testing, exploit development, and vulnerability researchent://SD_ILS/0/SD_ILS:11863732026-01-02T17:13:01Z2026-01-02T17:13:01Zby Maynor, David.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490740">http://www.sciencedirect.com/science/book/9781597490740</a><br/>Format: Elektronik Kaynak<br/>Securing the cloud : cloud computer security techniques and tacticsent://SD_ILS/0/SD_ILS:11837432026-01-02T17:13:01Z2026-01-02T17:13:01Zby Winkler, J. R. (Joachim R.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format: Elektronik Kaynak<br/>Trusted platform module basics : using TPM in embedded systemsent://SD_ILS/0/SD_ILS:11856622026-01-02T17:13:01Z2026-01-02T17:13:01Zby Kinney, Steven.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679602">http://www.sciencedirect.com/science/book/9780750679602</a><br/>Format: Elektronik Kaynak<br/>IM, instant messaging, securityent://SD_ILS/0/SD_ILS:11856392026-01-02T17:13:01Z2026-01-02T17:13:01Zby Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583385">http://www.sciencedirect.com/science/book/9781555583385</a><br/>Format: Elektronik Kaynak<br/>Hardware IP Security and Trustent://SD_ILS/0/SD_ILS:4808292026-01-02T17:13:01Z2026-01-02T17:13:01Zby Mishra, Prabhat. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-49025-0">http://dx.doi.org/10.1007/978-3-319-49025-0</a><br/>Format: Elektronik Kaynak<br/>Securing the cloud cloud computer security techniques and tacticsent://SD_ILS/0/SD_ILS:1372012026-01-02T17:13:01Z2026-01-02T17:13:01Zby Winkler, J. R. (Joachim R.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495929">http://www.sciencedirect.com/science/book/9781597495929</a><br/>Format: Elektronik Kaynak<br/>System assurance : beyond detecting vulnerabilitiesent://SD_ILS/0/SD_ILS:11832662026-01-02T17:13:01Z2026-01-02T17:13:01Zby Mansourov, Nikolai.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123814142">https://www.sciencedirect.com/science/book/9780123814142</a><br/>Format: Elektronik Kaynak<br/>Physical and logical security convergence powered by enterprise security managementent://SD_ILS/0/SD_ILS:11890882026-01-02T17:13:01Z2026-01-02T17:13:01Zby Contos, Brian T.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597491228">https://www.sciencedirect.com/science/book/9781597491228</a><br/>Format: Elektronik Kaynak<br/>Snort 2.1 intrusion detectionent://SD_ILS/0/SD_ILS:11883662026-01-02T17:13:01Z2026-01-02T17:13:01Zby Beale, Jay.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781931836043">https://www.sciencedirect.com/science/book/9781931836043</a><br/>Format: Elektronik Kaynak<br/>Information security best practices : 205 basic rulesent://SD_ILS/0/SD_ILS:11883182026-01-02T17:13:01Z2026-01-02T17:13:01Zby Stefanek, George L.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781878707963">https://www.sciencedirect.com/science/book/9781878707963</a><br/>Format: Elektronik Kaynak<br/>Securing Windows server 2008 : prevent attacks from outside and inside your organization.ent://SD_ILS/0/SD_ILS:11896212026-01-02T17:13:01Z2026-01-02T17:13:01ZScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492805">https://www.sciencedirect.com/science/book/9781597492805</a><br/>Format: Elektronik Kaynak<br/>Windows Server 2003 security infrastructuresent://SD_ILS/0/SD_ILS:11880842026-01-02T17:13:01Z2026-01-02T17:13:01Zby Clercq, Jan de, 1968-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555582838">http://www.sciencedirect.com/science/book/9781555582838</a><br/>Format: Elektronik Kaynak<br/>HP Nonstop server security : a practical handbookent://SD_ILS/0/SD_ILS:11881012026-01-02T17:13:01Z2026-01-02T17:13:01Zby Hill, Terri.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583149">http://www.sciencedirect.com/science/book/9781555583149</a><br/>Format: Elektronik Kaynak<br/>Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 1ent://SD_ILS/0/SD_ILS:4815782026-01-02T17:13:01Z2026-01-02T17:13:01Zby Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1675-2">http://dx.doi.org/10.1007/978-981-10-1675-2</a><br/>Format: Elektronik Kaynak<br/>Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 2ent://SD_ILS/0/SD_ILS:4815792026-01-02T17:13:01Z2026-01-02T17:13:01Zby Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1678-3">http://dx.doi.org/10.1007/978-981-10-1678-3</a><br/>Format: Elektronik Kaynak<br/>