Arama Sonuçları Design. - Daraltılmış: Computer security.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dDesign.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300?2026-01-14T13:20:30ZWeb commerce security design and developmentent://SD_ILS/0/SD_ILS:9789752026-01-14T13:20:30Z2026-01-14T13:20:30Zby Nahari, Hadi.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706729">Click to View</a><br/>Format: Elektronik Kaynak<br/>Secure computer and network systems modeling, analysis and designent://SD_ILS/0/SD_ILS:9463852026-01-14T13:20:30Z2026-01-14T13:20:30Zby Ye, Nong.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=351427">Click to View</a><br/>Format: Elektronik Kaynak<br/>Getting started with Citrix XenApp 6.5 design and implement Citrix farms based on XenApp 6.5ent://SD_ILS/0/SD_ILS:9998702026-01-14T13:20:30Z2026-01-14T13:20:30Zby Musumeci, Guillermo.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=995550">Click to View</a><br/>Format: Elektronik Kaynak<br/>Analysis, design, and implementation of secure and interoperable distributed health information systemsent://SD_ILS/0/SD_ILS:9351012026-01-14T13:20:30Z2026-01-14T13:20:30Zby Blobel, Bernd.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=267473">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security-Aware Design for Cyber-Physical Systems A Platform-Based Approachent://SD_ILS/0/SD_ILS:4809682026-01-14T13:20:30Z2026-01-14T13:20:30Zby Lin, Chung-Wei. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-51328-7">http://dx.doi.org/10.1007/978-3-319-51328-7</a><br/>Format: Elektronik Kaynak<br/>Cybersecurity for Industry 4.0 Analysis for Design and Manufacturingent://SD_ILS/0/SD_ILS:4809242026-01-14T13:20:30Z2026-01-14T13:20:30Zby Thames, Lane. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-50660-9">http://dx.doi.org/10.1007/978-3-319-50660-9</a><br/>Format: Elektronik Kaynak<br/>Hack proofing your Web applications the only way to stop a hacker is to think like oneent://SD_ILS/0/SD_ILS:9395052026-01-14T13:20:30Z2026-01-14T13:20:30Zby Forristal, Jeff.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294159">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hack proofing ColdFusionent://SD_ILS/0/SD_ILS:9394982026-01-14T13:20:30Z2026-01-14T13:20:30Zby Meyer, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294151">Click to View</a><br/>Format: Elektronik Kaynak<br/>A multidisciplinary introduction to information securityent://SD_ILS/0/SD_ILS:10284162026-01-14T13:20:30Z2026-01-14T13:20:30Zby Mjølsnes, Stig F., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1648315">Click to View</a><br/>Format: Elektronik Kaynak<br/>Seven deadliest social network attacksent://SD_ILS/0/SD_ILS:11780312026-01-14T13:20:30Z2026-01-14T13:20:30Zby Timm, Carl.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495455">https://www.sciencedirect.com/science/book/9781597495455</a><br/>Format: Elektronik Kaynak<br/>Hack proofing your Web applicationsent://SD_ILS/0/SD_ILS:11883432026-01-14T13:20:30Z2026-01-14T13:20:30Zby Traxler, Julie.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994312">https://www.sciencedirect.com/science/book/9781928994312</a><br/>Format: Elektronik Kaynak<br/>Hacking web apps detecting and preventing web application security problemsent://SD_ILS/0/SD_ILS:10003712026-01-14T13:20:30Z2026-01-14T13:20:30Zby Shema, Mike.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1012529">Click to View</a><br/>Format: Elektronik Kaynak<br/>Information security a manager's guide to thwarting data thieves and hackersent://SD_ILS/0/SD_ILS:9452882026-01-14T13:20:30Z2026-01-14T13:20:30Zby Alexander, Philip, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=339307">Click to View</a><br/>Format: Elektronik Kaynak<br/>SQL injection attacks and defenseent://SD_ILS/0/SD_ILS:11928192026-01-14T13:20:30Z2026-01-14T13:20:30Zby Clarke, Justin.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494243">https://www.sciencedirect.com/science/book/9781597494243</a><br/>Format: Elektronik Kaynak<br/>Smart Grids: Security and Privacy Issuesent://SD_ILS/0/SD_ILS:4805722026-01-14T13:20:30Z2026-01-14T13:20:30Zby Boroojeni, Kianoosh G. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45050-6">http://dx.doi.org/10.1007/978-3-319-45050-6</a><br/>Format: Elektronik Kaynak<br/>Infosecurity 2008 threat analysisent://SD_ILS/0/SD_ILS:11900002026-01-14T13:20:30Z2026-01-14T13:20:30Zby Clark, Champ, III.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492249">https://www.sciencedirect.com/science/book/9781597492249</a><br/>Format: Elektronik Kaynak<br/>How to cheat at designing security for a Windows Server 2003 networkent://SD_ILS/0/SD_ILS:11882812026-01-14T13:20:30Z2026-01-14T13:20:30Zby Amini, Rob.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492430">https://www.sciencedirect.com/science/book/9781597492430</a><br/>Format: Elektronik Kaynak<br/>IM, instant messaging, securityent://SD_ILS/0/SD_ILS:11856392026-01-14T13:20:30Z2026-01-14T13:20:30Zby Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583385">http://www.sciencedirect.com/science/book/9781555583385</a><br/>Format: Elektronik Kaynak<br/>Hardware IP Security and Trustent://SD_ILS/0/SD_ILS:4808292026-01-14T13:20:30Z2026-01-14T13:20:30Zby Mishra, Prabhat. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-49025-0">http://dx.doi.org/10.1007/978-3-319-49025-0</a><br/>Format: Elektronik Kaynak<br/>Computer Communication, Networking and Internet Security Proceedings of IC3T 2016ent://SD_ILS/0/SD_ILS:4817142026-01-14T13:20:30Z2026-01-14T13:20:30Zby Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3226-4">http://dx.doi.org/10.1007/978-981-10-3226-4</a><br/>Format: Elektronik Kaynak<br/>Information Fusion for Cyber-Security Analyticsent://SD_ILS/0/SD_ILS:4805282026-01-14T13:20:30Z2026-01-14T13:20:30Zby Alsmadi, Izzat M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44257-0">http://dx.doi.org/10.1007/978-3-319-44257-0</a><br/>Format: Elektronik Kaynak<br/>Information assurance : dependability and security in networked systemsent://SD_ILS/0/SD_ILS:11891952026-01-14T13:20:30Z2026-01-14T13:20:30Zby Qian, Yi, 1962-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123735669">https://www.sciencedirect.com/science/book/9780123735669</a><br/>Format: Elektronik Kaynak<br/>Configuring Symantec Antivirus, Corporate Editionent://SD_ILS/0/SD_ILS:11883892026-01-14T13:20:30Z2026-01-14T13:20:30Zby Hunter, Laura E.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836814">http://www.sciencedirect.com/science/book/9781931836814</a><br/>Format: Elektronik Kaynak<br/>Information security best practices : 205 basic rulesent://SD_ILS/0/SD_ILS:11883182026-01-14T13:20:30Z2026-01-14T13:20:30Zby Stefanek, George L.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781878707963">https://www.sciencedirect.com/science/book/9781878707963</a><br/>Format: Elektronik Kaynak<br/>Advances in computers. Volume 83ent://SD_ILS/0/SD_ILS:11837822026-01-14T13:20:30Z2026-01-14T13:20:30Zby Zelkowitz, Marvin V., 1945-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123855107">http://www.sciencedirect.com/science/book/9780123855107</a><br/>Format: Elektronik Kaynak<br/>A guide to kernel exploitation : attacking the coreent://SD_ILS/0/SD_ILS:11817702026-01-14T13:20:30Z2026-01-14T13:20:30Zby Perla, Enrico.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494861">https://www.sciencedirect.com/science/book/9781597494861</a><br/>Format: Elektronik Kaynak<br/>Practical embedded security : building secure resource-constrained systemsent://SD_ILS/0/SD_ILS:11891682026-01-14T13:20:30Z2026-01-14T13:20:30Zby Stapko, Timothy John.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780750682152">https://www.sciencedirect.com/science/book/9780750682152</a><br/>Format: Elektronik Kaynak<br/>Hack the stack : using snort and ethereal to master the 8 layers of an insecure networkent://SD_ILS/0/SD_ILS:11864272026-01-14T13:20:30Z2026-01-14T13:20:30Zby Gregg, Michael (Michael C.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">http://www.sciencedirect.com/science/book/9781597491099</a><br/>Format: Elektronik Kaynak<br/>Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 1ent://SD_ILS/0/SD_ILS:4815782026-01-14T13:20:30Z2026-01-14T13:20:30Zby Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1675-2">http://dx.doi.org/10.1007/978-981-10-1675-2</a><br/>Format: Elektronik Kaynak<br/>Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 2ent://SD_ILS/0/SD_ILS:4815792026-01-14T13:20:30Z2026-01-14T13:20:30Zby Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1678-3">http://dx.doi.org/10.1007/978-981-10-1678-3</a><br/>Format: Elektronik Kaynak<br/>Hack proofing your networkent://SD_ILS/0/SD_ILS:11883572026-01-14T13:20:30Z2026-01-14T13:20:30Zby Ahmad, David R. Mirza.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994701">https://www.sciencedirect.com/science/book/9781928994701</a><br/>Format: Elektronik Kaynak<br/>