Search Results for - Narrowed by: Computer security. - EBSCO SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AEBSCO$002509EBSCO$0026ps$003d300? 2024-05-26T05:34:38Z The myths of security : what the computer security industry doesn't want you to know ent://SD_ILS/0/SD_ILS:2106561 2024-05-26T05:34:38Z 2024-05-26T05:34:38Z by&#160;Viega, John.<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=414821">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=414821</a><br/>Format:&#160;Electronic Resources<br/> Terminal compromise ent://SD_ILS/0/SD_ILS:2105731 2024-05-26T05:34:38Z 2024-05-26T05:34:38Z by&#160;Schwartau, Winn.<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2009627">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2009627</a><br/>Format:&#160;Electronic Resources<br/>