Arama Sonu&ccedil;lar&#305; Design. - Daralt&#305;lm&#305;&#351;: Computer security. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dDesign.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300? 2026-01-14T13:20:30Z Web commerce security design and development ent://SD_ILS/0/SD_ILS:978975 2026-01-14T13:20:30Z 2026-01-14T13:20:30Z by&#160;Nahari, Hadi.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=706729">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Secure computer and network systems modeling, analysis and design ent://SD_ILS/0/SD_ILS:946385 2026-01-14T13:20:30Z 2026-01-14T13:20:30Z by&#160;Ye, Nong.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=351427">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Getting started with Citrix XenApp 6.5 design and implement Citrix farms based on XenApp 6.5 ent://SD_ILS/0/SD_ILS:999870 2026-01-14T13:20:30Z 2026-01-14T13:20:30Z by&#160;Musumeci, Guillermo.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=995550">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Analysis, design, and implementation of secure and interoperable distributed health information systems ent://SD_ILS/0/SD_ILS:935101 2026-01-14T13:20:30Z 2026-01-14T13:20:30Z by&#160;Blobel, Bernd.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=267473">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security-Aware Design for Cyber-Physical Systems A Platform-Based Approach ent://SD_ILS/0/SD_ILS:480968 2026-01-14T13:20:30Z 2026-01-14T13:20:30Z by&#160;Lin, Chung-Wei. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-51328-7">http://dx.doi.org/10.1007/978-3-319-51328-7</a><br/>Format:&#160;Elektronik Kaynak<br/> Cybersecurity for Industry 4.0 Analysis for Design and Manufacturing ent://SD_ILS/0/SD_ILS:480924 2026-01-14T13:20:30Z 2026-01-14T13:20:30Z by&#160;Thames, Lane. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-50660-9">http://dx.doi.org/10.1007/978-3-319-50660-9</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing your Web applications the only way to stop a hacker is to think like one ent://SD_ILS/0/SD_ILS:939505 2026-01-14T13:20:30Z 2026-01-14T13:20:30Z by&#160;Forristal, Jeff.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294159">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing ColdFusion ent://SD_ILS/0/SD_ILS:939498 2026-01-14T13:20:30Z 2026-01-14T13:20:30Z by&#160;Meyer, Greg.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=294151">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> A multidisciplinary introduction to information security ent://SD_ILS/0/SD_ILS:1028416 2026-01-14T13:20:30Z 2026-01-14T13:20:30Z by&#160;Mj&oslash;lsnes, Stig F., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1648315">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Seven deadliest social network attacks ent://SD_ILS/0/SD_ILS:1178031 2026-01-14T13:20:30Z 2026-01-14T13:20:30Z by&#160;Timm, Carl.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495455">https://www.sciencedirect.com/science/book/9781597495455</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing your Web applications ent://SD_ILS/0/SD_ILS:1188343 2026-01-14T13:20:30Z 2026-01-14T13:20:30Z by&#160;Traxler, Julie.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994312">https://www.sciencedirect.com/science/book/9781928994312</a><br/>Format:&#160;Elektronik Kaynak<br/> Hacking web apps detecting and preventing web application security problems ent://SD_ILS/0/SD_ILS:1000371 2026-01-14T13:20:30Z 2026-01-14T13:20:30Z by&#160;Shema, Mike.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1012529">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security a manager's guide to thwarting data thieves and hackers ent://SD_ILS/0/SD_ILS:945288 2026-01-14T13:20:30Z 2026-01-14T13:20:30Z by&#160;Alexander, Philip, 1963-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=339307">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> SQL injection attacks and defense ent://SD_ILS/0/SD_ILS:1192819 2026-01-14T13:20:30Z 2026-01-14T13:20:30Z by&#160;Clarke, Justin.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494243">https://www.sciencedirect.com/science/book/9781597494243</a><br/>Format:&#160;Elektronik Kaynak<br/> Smart Grids: Security and Privacy Issues ent://SD_ILS/0/SD_ILS:480572 2026-01-14T13:20:30Z 2026-01-14T13:20:30Z by&#160;Boroojeni, Kianoosh G. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45050-6">http://dx.doi.org/10.1007/978-3-319-45050-6</a><br/>Format:&#160;Elektronik Kaynak<br/> Infosecurity 2008 threat analysis ent://SD_ILS/0/SD_ILS:1190000 2026-01-14T13:20:30Z 2026-01-14T13:20:30Z by&#160;Clark, Champ, III.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492249">https://www.sciencedirect.com/science/book/9781597492249</a><br/>Format:&#160;Elektronik Kaynak<br/> How to cheat at designing security for a Windows Server 2003 network ent://SD_ILS/0/SD_ILS:1188281 2026-01-14T13:20:30Z 2026-01-14T13:20:30Z by&#160;Amini, Rob.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597492430">https://www.sciencedirect.com/science/book/9781597492430</a><br/>Format:&#160;Elektronik Kaynak<br/> IM, instant messaging, security ent://SD_ILS/0/SD_ILS:1185639 2026-01-14T13:20:30Z 2026-01-14T13:20:30Z by&#160;Rittinghouse, John W.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583385">http://www.sciencedirect.com/science/book/9781555583385</a><br/>Format:&#160;Elektronik Kaynak<br/> Hardware IP Security and Trust ent://SD_ILS/0/SD_ILS:480829 2026-01-14T13:20:30Z 2026-01-14T13:20:30Z by&#160;Mishra, Prabhat. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-49025-0">http://dx.doi.org/10.1007/978-3-319-49025-0</a><br/>Format:&#160;Elektronik Kaynak<br/> Computer Communication, Networking and Internet Security Proceedings of IC3T 2016 ent://SD_ILS/0/SD_ILS:481714 2026-01-14T13:20:30Z 2026-01-14T13:20:30Z by&#160;Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3226-4">http://dx.doi.org/10.1007/978-981-10-3226-4</a><br/>Format:&#160;Elektronik Kaynak<br/> Information Fusion for Cyber-Security Analytics ent://SD_ILS/0/SD_ILS:480528 2026-01-14T13:20:30Z 2026-01-14T13:20:30Z by&#160;Alsmadi, Izzat M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44257-0">http://dx.doi.org/10.1007/978-3-319-44257-0</a><br/>Format:&#160;Elektronik Kaynak<br/> Information assurance : dependability and security in networked systems ent://SD_ILS/0/SD_ILS:1189195 2026-01-14T13:20:30Z 2026-01-14T13:20:30Z by&#160;Qian, Yi, 1962-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780123735669">https://www.sciencedirect.com/science/book/9780123735669</a><br/>Format:&#160;Elektronik Kaynak<br/> Configuring Symantec Antivirus, Corporate Edition ent://SD_ILS/0/SD_ILS:1188389 2026-01-14T13:20:30Z 2026-01-14T13:20:30Z by&#160;Hunter, Laura E.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836814">http://www.sciencedirect.com/science/book/9781931836814</a><br/>Format:&#160;Elektronik Kaynak<br/> Information security best practices : 205 basic rules ent://SD_ILS/0/SD_ILS:1188318 2026-01-14T13:20:30Z 2026-01-14T13:20:30Z by&#160;Stefanek, George L.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781878707963">https://www.sciencedirect.com/science/book/9781878707963</a><br/>Format:&#160;Elektronik Kaynak<br/> Advances in computers. Volume 83 ent://SD_ILS/0/SD_ILS:1183782 2026-01-14T13:20:30Z 2026-01-14T13:20:30Z by&#160;Zelkowitz, Marvin V., 1945-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123855107">http://www.sciencedirect.com/science/book/9780123855107</a><br/>Format:&#160;Elektronik Kaynak<br/> A guide to kernel exploitation : attacking the core ent://SD_ILS/0/SD_ILS:1181770 2026-01-14T13:20:30Z 2026-01-14T13:20:30Z by&#160;Perla, Enrico.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597494861">https://www.sciencedirect.com/science/book/9781597494861</a><br/>Format:&#160;Elektronik Kaynak<br/> Practical embedded security : building secure resource-constrained systems ent://SD_ILS/0/SD_ILS:1189168 2026-01-14T13:20:30Z 2026-01-14T13:20:30Z by&#160;Stapko, Timothy John.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780750682152">https://www.sciencedirect.com/science/book/9780750682152</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack the stack : using snort and ethereal to master the 8 layers of an insecure network ent://SD_ILS/0/SD_ILS:1186427 2026-01-14T13:20:30Z 2026-01-14T13:20:30Z by&#160;Gregg, Michael (Michael C.)<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491099">http://www.sciencedirect.com/science/book/9781597491099</a><br/>Format:&#160;Elektronik Kaynak<br/> Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 1 ent://SD_ILS/0/SD_ILS:481578 2026-01-14T13:20:30Z 2026-01-14T13:20:30Z by&#160;Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1675-2">http://dx.doi.org/10.1007/978-981-10-1675-2</a><br/>Format:&#160;Elektronik Kaynak<br/> Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 2 ent://SD_ILS/0/SD_ILS:481579 2026-01-14T13:20:30Z 2026-01-14T13:20:30Z by&#160;Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1678-3">http://dx.doi.org/10.1007/978-981-10-1678-3</a><br/>Format:&#160;Elektronik Kaynak<br/> Hack proofing your network ent://SD_ILS/0/SD_ILS:1188357 2026-01-14T13:20:30Z 2026-01-14T13:20:30Z by&#160;Ahmad, David R. Mirza.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994701">https://www.sciencedirect.com/science/book/9781928994701</a><br/>Format:&#160;Elektronik Kaynak<br/>