Search Results for - Narrowed by: Computer security. - EBSCOSirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AEBSCO$002509EBSCO$0026ps$003d300?2024-05-26T05:34:38ZThe myths of security : what the computer security industry doesn't want you to knowent://SD_ILS/0/SD_ILS:21065612024-05-26T05:34:38Z2024-05-26T05:34:38Zby Viega, John.<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=414821">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=414821</a><br/>Format: Electronic Resources<br/>Terminal compromiseent://SD_ILS/0/SD_ILS:21057312024-05-26T05:34:38Z2024-05-26T05:34:38Zby Schwartau, Winn.<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2009627">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2009627</a><br/>Format: Electronic Resources<br/>