Arama Sonuçları Systems engineering. - Daraltılmış: Computer security.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dSystems$002bengineering.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300;jsessionid=9171CC0BB65B8EEF8297F23F9F8D3BA4?2026-01-24T17:27:07ZEngineering secure and dependable software systemsent://SD_ILS/0/SD_ILS:11483372026-01-24T17:27:07Z2026-01-24T17:27:07Zby Pretschner, Alexander, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5899580">Click to View</a><br/>Format: Elektronik Kaynak<br/>Using security patterns in web-applicationent://SD_ILS/0/SD_ILS:11356212026-01-24T17:27:07Z2026-01-24T17:27:07Zby Alam, Shahnawaz, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5291824">Click to View</a><br/>Format: Elektronik Kaynak<br/>Innovations in Computer Science and Engineering Proceedings of the Fourth ICICSE 2016ent://SD_ILS/0/SD_ILS:4817642026-01-24T17:27:07Z2026-01-24T17:27:07Zby Saini, H. S. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3818-1">http://dx.doi.org/10.1007/978-981-10-3818-1</a><br/>Format: Elektronik Kaynak<br/>Information Science and Applications 2017 ICISA 2017ent://SD_ILS/0/SD_ILS:4817842026-01-24T17:27:07Z2026-01-24T17:27:07Zby Kim, Kuinam. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-4154-9">http://dx.doi.org/10.1007/978-981-10-4154-9</a><br/>Format: Elektronik Kaynak<br/>Smart Grids: Security and Privacy Issuesent://SD_ILS/0/SD_ILS:4805722026-01-24T17:27:07Z2026-01-24T17:27:07Zby Boroojeni, Kianoosh G. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45050-6">http://dx.doi.org/10.1007/978-3-319-45050-6</a><br/>Format: Elektronik Kaynak<br/>Aggressive network self-defenseent://SD_ILS/0/SD_ILS:11884902026-01-24T17:27:07Z2026-01-24T17:27:07Zby Wyler, Neil R.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836203">http://www.sciencedirect.com/science/book/9781931836203</a><br/>Format: Elektronik Kaynak<br/>Advanced Computing and Systems for Security Volume Fourent://SD_ILS/0/SD_ILS:4817312026-01-24T17:27:07Z2026-01-24T17:27:07Zby Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3391-9">http://dx.doi.org/10.1007/978-981-10-3391-9</a><br/>Format: Elektronik Kaynak<br/>Advanced Computing and Systems for Security Volume Threeent://SD_ILS/0/SD_ILS:4817322026-01-24T17:27:07Z2026-01-24T17:27:07Zby Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3409-1">http://dx.doi.org/10.1007/978-981-10-3409-1</a><br/>Format: Elektronik Kaynak<br/>Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionalsent://SD_ILS/0/SD_ILS:11882422026-01-24T17:27:07Z2026-01-24T17:27:07Zby Foster, James C.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490054">http://www.sciencedirect.com/science/book/9781597490054</a><br/>Format: Elektronik Kaynak<br/>