Arama Sonu&ccedil;lar&#305; Systems engineering. - Daralt&#305;lm&#305;&#351;: Computer security. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dSystems$002bengineering.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300;jsessionid=9171CC0BB65B8EEF8297F23F9F8D3BA4? 2026-01-24T17:27:07Z Engineering secure and dependable software systems ent://SD_ILS/0/SD_ILS:1148337 2026-01-24T17:27:07Z 2026-01-24T17:27:07Z by&#160;Pretschner, Alexander, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5899580">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Using security patterns in web-application ent://SD_ILS/0/SD_ILS:1135621 2026-01-24T17:27:07Z 2026-01-24T17:27:07Z by&#160;Alam, Shahnawaz, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5291824">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Innovations in Computer Science and Engineering Proceedings of the Fourth ICICSE 2016 ent://SD_ILS/0/SD_ILS:481764 2026-01-24T17:27:07Z 2026-01-24T17:27:07Z by&#160;Saini, H. S. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3818-1">http://dx.doi.org/10.1007/978-981-10-3818-1</a><br/>Format:&#160;Elektronik Kaynak<br/> Information Science and Applications 2017 ICISA 2017 ent://SD_ILS/0/SD_ILS:481784 2026-01-24T17:27:07Z 2026-01-24T17:27:07Z by&#160;Kim, Kuinam. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-4154-9">http://dx.doi.org/10.1007/978-981-10-4154-9</a><br/>Format:&#160;Elektronik Kaynak<br/> Smart Grids: Security and Privacy Issues ent://SD_ILS/0/SD_ILS:480572 2026-01-24T17:27:07Z 2026-01-24T17:27:07Z by&#160;Boroojeni, Kianoosh G. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45050-6">http://dx.doi.org/10.1007/978-3-319-45050-6</a><br/>Format:&#160;Elektronik Kaynak<br/> Aggressive network self-defense ent://SD_ILS/0/SD_ILS:1188490 2026-01-24T17:27:07Z 2026-01-24T17:27:07Z by&#160;Wyler, Neil R.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">http://www.sciencedirect.com/science/book/9781931836203</a><br/>Format:&#160;Elektronik Kaynak<br/> Advanced Computing and Systems for Security Volume Four ent://SD_ILS/0/SD_ILS:481731 2026-01-24T17:27:07Z 2026-01-24T17:27:07Z by&#160;Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3391-9">http://dx.doi.org/10.1007/978-981-10-3391-9</a><br/>Format:&#160;Elektronik Kaynak<br/> Advanced Computing and Systems for Security Volume Three ent://SD_ILS/0/SD_ILS:481732 2026-01-24T17:27:07Z 2026-01-24T17:27:07Z by&#160;Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3409-1">http://dx.doi.org/10.1007/978-981-10-3409-1</a><br/>Format:&#160;Elektronik Kaynak<br/> Sockets, shellcode, porting &amp; coding : reverse engineering exploits and tool coding for security professionals ent://SD_ILS/0/SD_ILS:1188242 2026-01-24T17:27:07Z 2026-01-24T17:27:07Z by&#160;Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490054">http://www.sciencedirect.com/science/book/9781597490054</a><br/>Format:&#160;Elektronik Kaynak<br/>