Search Results for Core. - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCore.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?
2025-12-24T17:49:52Z
Core Data Analysis: Summarization, Correlation, and Visualization
ent://SD_ILS/0/SD_ILS:486081
2025-12-24T17:49:52Z
2025-12-24T17:49:52Z
Author Mirkin, Boris. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-00271-8">https://doi.org/10.1007/978-3-030-00271-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
A guide to kernel exploitation attacking the core
ent://SD_ILS/0/SD_ILS:148059
2025-12-24T17:49:52Z
2025-12-24T17:49:52Z
Author Perla, Enrico. Massimiliano, Oldani.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494861">http://www.sciencedirect.com/science/book/9781597494861</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security management : a critical thinking approach
ent://SD_ILS/0/SD_ILS:539725
2025-12-24T17:49:52Z
2025-12-24T17:49:52Z
Author Land, Michael (Industrial engineer), author. Ricks, Truett A., author. Ricks, Bob, author.<br/>Preferred Shelf Number HD61.5 .L36 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466561786">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>